IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second最新文献

筛选
英文 中文
A path-based RDF query language for CC/PP and UAProf 用于CC/PP和uapprof的基于路径的RDF查询语言
Keita Matsuyama, Michael Kraus, Kazuhiro Kitagawa, N. Saito
{"title":"A path-based RDF query language for CC/PP and UAProf","authors":"Keita Matsuyama, Michael Kraus, Kazuhiro Kitagawa, N. Saito","doi":"10.1109/PERCOMW.2004.1276895","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276895","url":null,"abstract":"By introducing a new method to apply a path expression to RDF queries, we present a new path-based RDF query language, RPath, for CC/PP and UAProf. CC/PP and UAProf, two of the applications of RDF, are standards that describe the context of both users and devices. To achieve high service levels, content adaptation systems must address user and device information effectively. RPath is designed to intemperate seamlessly with CC/PP and UAProf. RPath is also capable of processing features of CC/PP and UAProf. Example RPath queries and comparisons of RPath relative to other RDF query languages are also provided.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134196220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Towards a better understanding of context attributes 以更好地理解上下文属性
T. Zimmer
{"title":"Towards a better understanding of context attributes","authors":"T. Zimmer","doi":"10.1109/PERCOMW.2004.1276899","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276899","url":null,"abstract":"The use of context as an input is one of the major characteristics of ubiquitous computing systems. We look into the structural and the systematic features of context in ubiquitous computing environments and their possible influence on context computing and the design of context-aware applications. We give a definition regarding an understanding of context and how it is derived at a systematic level. Context interaction is investigated by a consumer-producer schema that models the exchange of context among artefacts. Validity, relevance, reliability and context history are identified and discussed as relevant systematic attributes of context.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125070184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Towards scalable P2P computing for mobile ad hoc networks 面向移动自组织网络的可扩展P2P计算
M. Conti, E. Gregori, Giovanni Turi
{"title":"Towards scalable P2P computing for mobile ad hoc networks","authors":"M. Conti, E. Gregori, Giovanni Turi","doi":"10.1109/PERCOMW.2004.1276915","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276915","url":null,"abstract":"In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for the Internet, which support the development of peer-to-peer distributed systems, providing an interface for subject-based data routing. These platforms put emphasis on decentralization and resilience, and guarantee bounded lookup costs. Hence, we consider these platforms appealing for ad hoc environments. We show how a cross-layer protocol stack design for ad hoc nodes, simplifies the tasks of a subject-based routing substrate in ad hoc environments. We give details for a platform like Pastry, emphasizing the cross-layer interaction with a pro-active routing protocol at the network layer.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Automatic resource and service management for ubiquitous computing environments 面向普适计算环境的自动化资源和服务管理
S. Maffioletti, S. Mostéfaoui, B. Hirsbrunner
{"title":"Automatic resource and service management for ubiquitous computing environments","authors":"S. Maffioletti, S. Mostéfaoui, B. Hirsbrunner","doi":"10.1109/PERCOMW.2004.1276935","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276935","url":null,"abstract":"The high degree of dynamism and heterogeneity of the resources involved in a pervasive computing environment makes service adaptation and interoperability a difficult task. We present UBIDEV, a service framework that faces the heterogeneity problem by hiding at the application level the dynamism of the underlying environment. We describe the UBIDEV architecture focusing on the description and the management of services and resources. We also describe how this approach decreases the complexity of the design and development of service-oriented applications. A prototype implementation of a unified messaging system is presented as a validation of the architectural design.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123776641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
"Yoking-proofs" for RFID tags RFID标签的“Yoking-proofs
A. Juels
{"title":"\"Yoking-proofs\" for RFID tags","authors":"A. Juels","doi":"10.1109/PERCOMW.2004.1276920","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276920","url":null,"abstract":"RFID (radio-frequency identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility in automating supply-chain logistics, RFID tags promise eventually to supplant the optical barcode as a means of identifying goods. We propose the concept of a yoking-proof, namely a proof that a pair of RFID tags has been scanned simultaneously. Our particular aim is to permit tags to generate a proof that is verifiable off-line by a trusted entity, even when readers are potentially untrusted. We suggest that such proofs are a useful tool for maintaining integrity in supply chains, particularly as RFID data will commonly flow across multiple, loosely affiliated organizations.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 305
Contextual ConcurTaskTrees: integrating dynamic contexts in task based design 上下文ConcurTaskTrees:在基于任务的设计中集成动态上下文
J. V. D. Bergh, K. Coninx
{"title":"Contextual ConcurTaskTrees: integrating dynamic contexts in task based design","authors":"J. V. D. Bergh, K. Coninx","doi":"10.1109/PERCOMW.2004.1276897","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276897","url":null,"abstract":"Much research has been done on how context can be gathered and how the task of harvesting the context information can be made as easy as possible for application developers. However, less research has been done on how to design a system that adapts to the context while being active. We present contextual ConcurTaskTrees, a notation that combines the specification of dynamic context and tasks. The effect of the integration of the new notation on a current task-based approach is demonstrated and discussed. Special attention is paid to how the context is integrated and which parts of the context can be specified using the presented notation.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131948880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers 使用不同标识符的射频识别设备的基于哈希的位置隐私增强
Dirk Henrici, P. Müller
{"title":"Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers","authors":"Dirk Henrici, P. Müller","doi":"10.1109/PERCOMW.2004.1276922","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276922","url":null,"abstract":"Radio-frequency identification devices (RFID) may emerge as one of the most pervasive computing technologies in history. On the one hand, with tags affixed to consumer items as well as letters, packets or vehicles costs in the supply chain can be greatly reduced and new applications introduced. On the other hand, unique means of identification in each tag like serial numbers enable effortless traceability of persons and goods. But data protection and privacy are worthwhile civil liberties. We introduce a simple scheme relying on one way hash-functions that greatly enhances location privacy by changing traceable identifiers on every read getting by with only a single, unreliable message exchange. Thereby the scheme is safe from many threats like eavesdropping, message interception, spoofing, and replay attacks.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126009208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 569
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信