{"title":"Study of server processing load evaluations in ubiquitous communication environment","authors":"M. Matsumoto, T. Itoh","doi":"10.1109/SAINT-W.2006.38","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.38","url":null,"abstract":"This paper evaluates the influence of communication characteristics on server processing load. In future ubiquitous communication environments, terminal-initiated communications will become more popularized than human-initiated communications like current Internet communications. The tiny terminal having a short-range wireless communication method like a sensor node is expected to report the presence data involved in a daily life to the server. However, if these terminals become popularized, the server must process a lot of presence data compared with current Internet communications. Therefore, from the viewpoint of network scalability, we performed hardware simulations to evaluate the influence of communication characteristics on server processing load and clarified its critical factor.","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134110383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of low-power baseband-processor for RFID tag","authors":"He Yan, Jianyun Hu, Li Qiang, Hao Min","doi":"10.1109/SAINT-W.2006.15","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.15","url":null,"abstract":"This paper analyzes the power consumption of an RFID tag and presents a new architecture of a low-power baseband-processor for this special passive tag. The tag consists of a power reception system, an emitter/receiver analog module, an EEPROM and a low-power baseband-processor, compatible with the newest EPCtrade C1G2 UHF RFID protocol. Meanwhile some novel and advanced low-power technologies are adopted for the special low-power baseband-processor, which not only implements the anti-collision schemes and authorization scheme, but also executes read/write operation to EEPROM. The chip was designed and fabricated using 0.35 mum 3 metal layers CMOS technology successfully","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120904416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service composition architecture for programmability and flexibility in ubiquitous communication networks","authors":"Y. Yokohata, Y. Yamato, M. Takemoto, H. Sunaga","doi":"10.1109/SAINT-W.2006.36","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.36","url":null,"abstract":"This paper addresses a new service composition method suitable for the forthcoming ubiquitous computing era. The latest developments in network computer technology have made various entities connected to the Internet, such as Web services, sensors, and home information appliances, accessible to those who want to create their own service capabilities. The architecture we have thus far proposed is a key to achieving the ubiquitous concept, but approaches that spread the use of the architecture are required. We establish the architecture more widely usable in mobile Internet environments and suggest applicable domains for two types of proxy servers to compensate for the shortage of mobile terminal capacities. Practical service examples and business models are also discussed","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129432224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-collision performance of Gen2 air protocol in random error communication link","authors":"Yuusuke Kawakita, J. Mitsugi","doi":"10.1109/SAINT-W.2006.8","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.8","url":null,"abstract":"When a multitude of RFID tags are in the interrogating field, an anti-collision technology must be used. In literatures, the reading performance was mainly investigated on the error-free communication links between reader and tags. In the practical situations, particularly where a number of readers and other wireless devices share the same frequency band, the performance on the erroneous links would be significant interest. In this paper, we evaluated Gen2 air protocol paying attention to the anti-collision performance in random error communication link. As a result of simulation, two findings were obtained. Firstly, there is an appropriate number of slots depending on the number of tags. This number hardly changes even if a random error is incurred on the link. Secondly, the singulation speed might be significantly degraded particularly in erroneous links, if the optimal number of slots is not chosen. The findings can be interpreted such that the necessary link quality can be derived if the number of tags and permissible time are known a priori to the implementation. For instance, if 64 tags are required to be read in one second, it is necessary to ensure the link quality to be better than BER=10/sup -4/ in random error environment.","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131552855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of an active RFID system platform","authors":"Hyuntae Cho, Yunju Baek","doi":"10.1109/SAINT-W.2006.14","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.14","url":null,"abstract":"An active RFID system has the active tag that incorporates an internal battery providing a robust, long-range transmission signal. Typical application using the active RFID is the identification and the position tracking of warehouse inventory-item and freight container. This paper presents the design and implementation of an active RFID system platform which complies with the ISO/TEC 18000-7 standard. Our system design focus on three parts: 1) the standard compliance with the ISO/TEC 18000-7, 2) the energy saving mechanism to maintain the longevity of tags as long as possible, and 3) the high identification rate in the presence of multiple tags. We describe the detailed design of the system and the commercial off-the-shelf (COTS) implementation. The performance evaluation of the system is also included.","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an enterprise location service","authors":"C. Roduner, C. Floerkemeier","doi":"10.1109/SAINT-W.2006.41","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.41","url":null,"abstract":"Radio frequency identification (RFID) technology has a lot of potential to automate business processes and improve visibility across the supply chain. To realize the full potential of RFID, an IT infrastructure is required that manages readers, filters and aggregates raw RFID data, but also facilitates data exchange among the supply chain partners. In this paper we first provide an overview of the EPC network, an architecture developed by the Auto-ID center and its successor organisation EPCglobal, that addresses the above requirements. We then propose the concept of an enterprise location service that captures all location information about products and assets within the enterprise to enable what we call business process debugging.","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129957737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparison of two programming models for pervasive computing","authors":"Hen-I Yang, Erwin Jansen, A. Helal","doi":"10.1109/SAINT-W.2006.1","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.1","url":null,"abstract":"Establishing suitable programming models for pervasive spaces is essential in improving the productivity, enhancing the quality of pervasive systems, and creating an open platform for interoperability. Two different models, namely, the context-driven model and the service-oriented model, have been proposed and studied for their feasibilities as the foundation for implementing programmable pervasive spaces. We present these two alternatives and contrast their advantages and disadvantages.","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117292354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MapWiki: a ubiquitous collaboration environment on shared maps","authors":"Y. Teranishi, J. Kamahara, S. Shimojo","doi":"10.1109/SAINT-W.2006.29","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.29","url":null,"abstract":"In this paper, we propose a new map-based collaboration environment 'MapWiki' for ubiquitous content distribution. In MapWiki, users can publish Wiki contents which contains links or inline images of the objects in the ubiquitous environment by simple formatting rules. The status change of the content are updated on the map in real-time which enables users to communicate between real field and virtual environment. Publishers and receivers are authenticated using social network to ensure the trustfulness of the content. We implemented MapWiki mechanism on Google Maps and evaluated its feasibility and usefulness.","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115064183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Zöls, Michael Eichhorn, A. Tarlano, W. Kellerer
{"title":"Content-based hierarchies in DHT-based peer-to-peer systems","authors":"Stefan Zöls, Michael Eichhorn, A. Tarlano, W. Kellerer","doi":"10.1109/SAINT-W.2006.12","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.12","url":null,"abstract":"Peer-to-peer systems allowing fast and easy search for information shared by the users of a communication network, are considered to have a huge impact on next generation mobile service platforms. To support applications that employ content categories or limit services to certain contexts more efficiently, we describe a hierarchical P2P system in this paper. In particular, our system introduces hierarchies in a DHT-based P2P system to allow topic-based queries. Based on the query statement, which is based on XPath, queries can traverse the hierarchy if the content is not found in one topic-space. Examples illustrate how our concept is used for file sharing and location-aware applications","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133156803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of transmission schemes for framed ALOHA based RFID protocols","authors":"C. Floerkemeier, M. Wille","doi":"10.1109/SAINT-W.2006.10","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.10","url":null,"abstract":"The performance of RFID anti-collision protocols that are based on framed ALOHA depends on a transmission scheme that controls access to the shared channel. In this paper, we outline the characteristics of the RFID domain that impact the performance of such transmission schemes and compare four different transmission strategies. A novel technique introduced in this paper that recursively estimates the backlog on a slot-by-slot basis exhibits a superior performance in our simulations. The results also illustrate that our implementation of the Q algorithm proposed in (EPCglobal, 2005) only performs well, if the frame size changes are restricted to incremental updates","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123358270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}