Keita Matsuyama, Michael Kraus, Kazuhiro Kitagawa, N. Saito
{"title":"A path-based RDF query language for CC/PP and UAProf","authors":"Keita Matsuyama, Michael Kraus, Kazuhiro Kitagawa, N. Saito","doi":"10.1109/PERCOMW.2004.1276895","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276895","url":null,"abstract":"By introducing a new method to apply a path expression to RDF queries, we present a new path-based RDF query language, RPath, for CC/PP and UAProf. CC/PP and UAProf, two of the applications of RDF, are standards that describe the context of both users and devices. To achieve high service levels, content adaptation systems must address user and device information effectively. RPath is designed to intemperate seamlessly with CC/PP and UAProf. RPath is also capable of processing features of CC/PP and UAProf. Example RPath queries and comparisons of RPath relative to other RDF query languages are also provided.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134196220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a better understanding of context attributes","authors":"T. Zimmer","doi":"10.1109/PERCOMW.2004.1276899","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276899","url":null,"abstract":"The use of context as an input is one of the major characteristics of ubiquitous computing systems. We look into the structural and the systematic features of context in ubiquitous computing environments and their possible influence on context computing and the design of context-aware applications. We give a definition regarding an understanding of context and how it is derived at a systematic level. Context interaction is investigated by a consumer-producer schema that models the exchange of context among artefacts. Validity, relevance, reliability and context history are identified and discussed as relevant systematic attributes of context.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125070184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards scalable P2P computing for mobile ad hoc networks","authors":"M. Conti, E. Gregori, Giovanni Turi","doi":"10.1109/PERCOMW.2004.1276915","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276915","url":null,"abstract":"In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for the Internet, which support the development of peer-to-peer distributed systems, providing an interface for subject-based data routing. These platforms put emphasis on decentralization and resilience, and guarantee bounded lookup costs. Hence, we consider these platforms appealing for ad hoc environments. We show how a cross-layer protocol stack design for ad hoc nodes, simplifies the tasks of a subject-based routing substrate in ad hoc environments. We give details for a platform like Pastry, emphasizing the cross-layer interaction with a pro-active routing protocol at the network layer.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic resource and service management for ubiquitous computing environments","authors":"S. Maffioletti, S. Mostéfaoui, B. Hirsbrunner","doi":"10.1109/PERCOMW.2004.1276935","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276935","url":null,"abstract":"The high degree of dynamism and heterogeneity of the resources involved in a pervasive computing environment makes service adaptation and interoperability a difficult task. We present UBIDEV, a service framework that faces the heterogeneity problem by hiding at the application level the dynamism of the underlying environment. We describe the UBIDEV architecture focusing on the description and the management of services and resources. We also describe how this approach decreases the complexity of the design and development of service-oriented applications. A prototype implementation of a unified messaging system is presented as a validation of the architectural design.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123776641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"Yoking-proofs\" for RFID tags","authors":"A. Juels","doi":"10.1109/PERCOMW.2004.1276920","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276920","url":null,"abstract":"RFID (radio-frequency identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility in automating supply-chain logistics, RFID tags promise eventually to supplant the optical barcode as a means of identifying goods. We propose the concept of a yoking-proof, namely a proof that a pair of RFID tags has been scanned simultaneously. Our particular aim is to permit tags to generate a proof that is verifiable off-line by a trusted entity, even when readers are potentially untrusted. We suggest that such proofs are a useful tool for maintaining integrity in supply chains, particularly as RFID data will commonly flow across multiple, loosely affiliated organizations.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contextual ConcurTaskTrees: integrating dynamic contexts in task based design","authors":"J. V. D. Bergh, K. Coninx","doi":"10.1109/PERCOMW.2004.1276897","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276897","url":null,"abstract":"Much research has been done on how context can be gathered and how the task of harvesting the context information can be made as easy as possible for application developers. However, less research has been done on how to design a system that adapts to the context while being active. We present contextual ConcurTaskTrees, a notation that combines the specification of dynamic context and tasks. The effect of the integration of the new notation on a current task-based approach is demonstrated and discussed. Special attention is paid to how the context is integrated and which parts of the context can be specified using the presented notation.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131948880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers","authors":"Dirk Henrici, P. Müller","doi":"10.1109/PERCOMW.2004.1276922","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276922","url":null,"abstract":"Radio-frequency identification devices (RFID) may emerge as one of the most pervasive computing technologies in history. On the one hand, with tags affixed to consumer items as well as letters, packets or vehicles costs in the supply chain can be greatly reduced and new applications introduced. On the other hand, unique means of identification in each tag like serial numbers enable effortless traceability of persons and goods. But data protection and privacy are worthwhile civil liberties. We introduce a simple scheme relying on one way hash-functions that greatly enhances location privacy by changing traceable identifiers on every read getting by with only a single, unreliable message exchange. Thereby the scheme is safe from many threats like eavesdropping, message interception, spoofing, and replay attacks.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126009208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}