{"title":"Greenhouse Asset Management Using Wireless Sensor-Actor Networks","authors":"V. L. Narasimhan, Alex A. Arvind, Ken Bever","doi":"10.1109/UBICOMM.2007.47","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.47","url":null,"abstract":"Greenhouse plays an increasingly important role in modern horticulture in order to meet the needs of the world's growing and demand driven economy. The primary issue of greenhouse based horticulture is to manage the greenhouse environment optimally in order to comply with the economic and environmental requirements. This paper discusses the advantages of using asset management strategy along wireless sensor-actor network technology for such cost-effective and environmental friendly greenhouse management.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126201386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Oral Interaction Control Method with Web pages by VXML Metadata Definition","authors":"N. Hayashi, K. Takami","doi":"10.1109/UBICOMM.2007.9","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.9","url":null,"abstract":"In ubiquitous society, there will be a demand for enhancing the mechanism that allows the user to talk with PCs or mobile terminals connected to the Internet so that anyone can access the network and retrieve information regardless of where he or she is, and the aggravation of the digital divide can be prevented. In this paper, we propose a method of providing a voice interface for access to Web pages using a Web browser. Specifically, VoiceXMI metadata, which contains an oral interaction scenario, is placed in the Web server along with the associated HTMI data. Two alternative methods are considered for the client terminal to acquire this metadata: the built-in address method and the self-acquisition method. We have also developed a method of synchronizing oral interactions with the Web page display. We have built an experimental system, and used it to confirm that the proposed method operates as intended.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"P2P Copyright Protection:Current States and Future Prospective with Particular on China","authors":"Chuanfu Chen, Congjing Ran","doi":"10.1109/UBICOMM.2007.34","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.34","url":null,"abstract":"Based on the discussion of the main types of P2P file sharing technology, and the introduction to the main legal actions for copyright infringement caused by P2P technology in China, this paper analyzed the current states of P2P copyright protection in China from three aspects including direct infringement, contributory or vicarious infringement, technology neutral, and then predicted the future prospective of P2P file sharing in China.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"25 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133754773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. D'Anna, G. Percannella, Carlo Sansone, M. Vento
{"title":"A Multi-Stage Approach for News Video Segmentation Based on Automatic Anchorperson Number Detection","authors":"L. D'Anna, G. Percannella, Carlo Sansone, M. Vento","doi":"10.1109/UBICOMM.2007.3","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.3","url":null,"abstract":"In this paper we present an algorithm for anchor shot detection that is a fundamental step for segmenting news video into stories. This is among key issues for achieving efficient treatment of news-based digital libraries. The proposed algorithm creates a set of audio/video templates of anchorperson shots in an unsupervised way, then classifies shots by comparing them to all the templates when there is one anchor and to a single best template when there are two anchors. In this paper we also propose an automatic selector, based only on the audio track, that is able to classify a news video as presented by one or two anchorpersons. The method has been tested on a wide database demonstrating its effectiveness.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132503711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Enterprise User Productivity with Embedded Context-Aware Voice Applications","authors":"A. Kavimandan, R. Klemm, A. Gokhale, D. Seligmann","doi":"10.1109/UBICOMM.2007.22","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.22","url":null,"abstract":"The increasing amount of software and computational capabilities in voice endpoints, switches, and networks creates an opportunity for embedding advanced applications in voice communication paths. Particularly in an enterprise environment, such applications can alter the traditional behavior of voice communications from simply connecting two or more people to software-assisted connection establishment and enhanced on-call features. In this paper, we claim that embedding context-aware applications in communication paths can greatly increase the efficiency, effectiveness, and convenience of enterprise communications and thus the productivity of enterprise users. We identify the challenges associated with embedding context-aware applications in communication paths and exemplify our central claim by presenting a context-aware voice communications application CallerID++. CallerID++ aims at improving the aged concept of caller ID as the basis for a callee 's decision to accept or reject an incoming call. Through a call acceptance negotiation between caller and callee prior to call establishment, CallerID++ allows the callee to assess the importance of an incoming call relative to the callee's current activity. CallerID++ thus helps minimizing unwanted interruptions without rejecting important calls.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130245477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SLAP - A Secure but Light Authentication Protocol for RFID Based on Modular Exponentiation","authors":"B. Toiruul, K. Lee, Jin Mook Kim","doi":"10.1109/UBICOMM.2007.41","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.41","url":null,"abstract":"The advantage of using RFID technology is gaining much attention as is seen by an increase in its deployment. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. This work describes simple, inexpensive, and untraceable mutual identification protocols based on modular exponentiation for RFID tags. The proposed authentication mechanism is a low-cost but high-security for protecting consumer's information in RFID tag against unwanted read-attacks. We analyzed with issues of the security and privacy of RFID systems. This paper also showed the 8-bit architecture of a low-power and low die-size implementation of modular exponentiation. The 8-bit modular exponentiation implementation has a chip area of less than 1 K gates and the encryption of 64 bits requires about 1000 clock cycles. The executing time of the proposed protocol would range from 12.36 ms to 20.6 ms, with 6-8 tags authenticated per second.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121887043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Deducing a User's State of Mind from an Analysis of the Pictographic Characters Used in Mobile Phone Emails","authors":"K. Takami, Y. Honma, S. Goto","doi":"10.1109/UBICOMM.2007.1","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.1","url":null,"abstract":"As the ubiquitous environment is taking root, there are calls for services that deliver content appropriate for the individual user's personal interests and preferences. In fact, services are already being provided that deduce the interests or preferences of the user by analyzing his or her log data containing behavior history, the text of his or her emails, access history, etc., and provide content appropriate for his or her physical/mental/emotional state. However, it is difficult to deduce the ever-changing preferences of people who live in a complicated society. Such deduction is still at a research stage. In this paper, we focus on mobile phones, whose users are growing in number and which offer many sophisticated functions besides the ability to talk. We propose a method of deducing the state of mind of the user by analyzing the pictographic characters used in his or her emails. Pictographic characters are used to convey feelings that the user thinks are too complicated to express in text. Specifically, from among many pictographic characters, we have selected those that show facial expressions and are used to express feelings (states of mind). We have extracted the state-of-mind elements that are associated with each pictographic character, and assigned state-of-mind elements and corresponding vector values to each pictographic character. We have developed an algorithm to deduce the user's state of mind from an email by analyzing the pictographic characters used in that email. We have developed a prototype evaluation system, and evaluated the effectiveness of the proposed algorithm.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114435508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating Radio Frequency Object Discovery and Bluetooth for Semantic-Based M-Commerce","authors":"M. Ruta, T. Di Noia, E. Di Sciascio, F. Scioscia","doi":"10.1109/UBICOMM.2007.25","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.25","url":null,"abstract":"RFID and current ubiquitous protocols and technologies call for an integration, to provide innovative and advanced wireless services, with semantics being a candidate glue for such an integration. To this aim, in this paper we study an enhancement to the original RFID data exchange protocol and its integration in a semantic-based Bluetooth resource discovery framework. The semantic annotation of products and goods can then be exploited to allow an effective retrieval process. The proposed approach is presented and motivated in a novel m-commerce context.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129039067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing Web Service Contracts","authors":"E. Cambronero, Joseph C. Okika, A. Ravn","doi":"10.1109/UBICOMM.2007.10","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.10","url":null,"abstract":"Web services should be dependable, because businesses rely on them. For that purpose the service oriented architecture has standardized specifications at a syntactical level. In this paper, we demonstrate how such specifications are used to derive semantic models in the form of (timed) automata. These can be used to model check functional and behavioural properties of a given service. Since there might be several specifications dealing with different aspects, one must also check that these automata are consistent, where we propose to set up a suitable simulation relation. The proposed techniques are illustrated with a small case study.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Content Management and Delivery for Mobile Devices","authors":"S. Manoharan","doi":"10.1109/UBICOMM.2007.20","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.20","url":null,"abstract":"Unlike desktop computers, mobile devices vary widely in terms of their capability. Screen size, colour depth, and supported file types are just some examples of where the variations are. Tailoring content to suit the capability of a device has been a research and practical problem for some time, and a variety of solutions exist. Content adaptation to cater for device variations is the focus of this paper. It presents the design and implementation of a content management and delivery system that adapts content based on device capability. The system is capable of handling a variety of content types and is extensible to allow inclusion of others.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127003968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}