International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)最新文献

筛选
英文 中文
Greenhouse Asset Management Using Wireless Sensor-Actor Networks 利用无线传感器-行动者网络进行温室资产管理
V. L. Narasimhan, Alex A. Arvind, Ken Bever
{"title":"Greenhouse Asset Management Using Wireless Sensor-Actor Networks","authors":"V. L. Narasimhan, Alex A. Arvind, Ken Bever","doi":"10.1109/UBICOMM.2007.47","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.47","url":null,"abstract":"Greenhouse plays an increasingly important role in modern horticulture in order to meet the needs of the world's growing and demand driven economy. The primary issue of greenhouse based horticulture is to manage the greenhouse environment optimally in order to comply with the economic and environmental requirements. This paper discusses the advantages of using asset management strategy along wireless sensor-actor network technology for such cost-effective and environmental friendly greenhouse management.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126201386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
An Oral Interaction Control Method with Web pages by VXML Metadata Definition 基于VXML元数据定义的网页口头交互控制方法
N. Hayashi, K. Takami
{"title":"An Oral Interaction Control Method with Web pages by VXML Metadata Definition","authors":"N. Hayashi, K. Takami","doi":"10.1109/UBICOMM.2007.9","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.9","url":null,"abstract":"In ubiquitous society, there will be a demand for enhancing the mechanism that allows the user to talk with PCs or mobile terminals connected to the Internet so that anyone can access the network and retrieve information regardless of where he or she is, and the aggravation of the digital divide can be prevented. In this paper, we propose a method of providing a voice interface for access to Web pages using a Web browser. Specifically, VoiceXMI metadata, which contains an oral interaction scenario, is placed in the Web server along with the associated HTMI data. Two alternative methods are considered for the client terminal to acquire this metadata: the built-in address method and the self-acquisition method. We have also developed a method of synchronizing oral interactions with the Web page display. We have built an experimental system, and used it to confirm that the proposed method operates as intended.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
P2P Copyright Protection:Current States and Future Prospective with Particular on China P2P版权保护:现状与未来展望,特别是中国
Chuanfu Chen, Congjing Ran
{"title":"P2P Copyright Protection:Current States and Future Prospective with Particular on China","authors":"Chuanfu Chen, Congjing Ran","doi":"10.1109/UBICOMM.2007.34","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.34","url":null,"abstract":"Based on the discussion of the main types of P2P file sharing technology, and the introduction to the main legal actions for copyright infringement caused by P2P technology in China, this paper analyzed the current states of P2P copyright protection in China from three aspects including direct infringement, contributory or vicarious infringement, technology neutral, and then predicted the future prospective of P2P file sharing in China.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"25 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133754773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Multi-Stage Approach for News Video Segmentation Based on Automatic Anchorperson Number Detection 一种基于主播数量自动检测的新闻视频多阶段分割方法
L. D'Anna, G. Percannella, Carlo Sansone, M. Vento
{"title":"A Multi-Stage Approach for News Video Segmentation Based on Automatic Anchorperson Number Detection","authors":"L. D'Anna, G. Percannella, Carlo Sansone, M. Vento","doi":"10.1109/UBICOMM.2007.3","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.3","url":null,"abstract":"In this paper we present an algorithm for anchor shot detection that is a fundamental step for segmenting news video into stories. This is among key issues for achieving efficient treatment of news-based digital libraries. The proposed algorithm creates a set of audio/video templates of anchorperson shots in an unsupervised way, then classifies shots by comparing them to all the templates when there is one anchor and to a single best template when there are two anchors. In this paper we also propose an automatic selector, based only on the audio track, that is able to classify a news video as presented by one or two anchorpersons. The method has been tested on a wide database demonstrating its effectiveness.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132503711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing Enterprise User Productivity with Embedded Context-Aware Voice Applications 通过嵌入式上下文感知语音应用程序增强企业用户生产力
A. Kavimandan, R. Klemm, A. Gokhale, D. Seligmann
{"title":"Enhancing Enterprise User Productivity with Embedded Context-Aware Voice Applications","authors":"A. Kavimandan, R. Klemm, A. Gokhale, D. Seligmann","doi":"10.1109/UBICOMM.2007.22","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.22","url":null,"abstract":"The increasing amount of software and computational capabilities in voice endpoints, switches, and networks creates an opportunity for embedding advanced applications in voice communication paths. Particularly in an enterprise environment, such applications can alter the traditional behavior of voice communications from simply connecting two or more people to software-assisted connection establishment and enhanced on-call features. In this paper, we claim that embedding context-aware applications in communication paths can greatly increase the efficiency, effectiveness, and convenience of enterprise communications and thus the productivity of enterprise users. We identify the challenges associated with embedding context-aware applications in communication paths and exemplify our central claim by presenting a context-aware voice communications application CallerID++. CallerID++ aims at improving the aged concept of caller ID as the basis for a callee 's decision to accept or reject an incoming call. Through a call acceptance negotiation between caller and callee prior to call establishment, CallerID++ allows the callee to assess the importance of an incoming call relative to the callee's current activity. CallerID++ thus helps minimizing unwanted interruptions without rejecting important calls.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130245477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SLAP - A Secure but Light Authentication Protocol for RFID Based on Modular Exponentiation 基于模幂运算的RFID安全轻认证协议
B. Toiruul, K. Lee, Jin Mook Kim
{"title":"SLAP - A Secure but Light Authentication Protocol for RFID Based on Modular Exponentiation","authors":"B. Toiruul, K. Lee, Jin Mook Kim","doi":"10.1109/UBICOMM.2007.41","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.41","url":null,"abstract":"The advantage of using RFID technology is gaining much attention as is seen by an increase in its deployment. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. This work describes simple, inexpensive, and untraceable mutual identification protocols based on modular exponentiation for RFID tags. The proposed authentication mechanism is a low-cost but high-security for protecting consumer's information in RFID tag against unwanted read-attacks. We analyzed with issues of the security and privacy of RFID systems. This paper also showed the 8-bit architecture of a low-power and low die-size implementation of modular exponentiation. The 8-bit modular exponentiation implementation has a chip area of less than 1 K gates and the encryption of 64 bits requires about 1000 clock cycles. The executing time of the proposed protocol would range from 12.36 ms to 20.6 ms, with 6-8 tags authenticated per second.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121887043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Method of Deducing a User's State of Mind from an Analysis of the Pictographic Characters Used in Mobile Phone Emails 从手机电子邮件的象形文字分析中推断用户心理状态的方法
K. Takami, Y. Honma, S. Goto
{"title":"A Method of Deducing a User's State of Mind from an Analysis of the Pictographic Characters Used in Mobile Phone Emails","authors":"K. Takami, Y. Honma, S. Goto","doi":"10.1109/UBICOMM.2007.1","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.1","url":null,"abstract":"As the ubiquitous environment is taking root, there are calls for services that deliver content appropriate for the individual user's personal interests and preferences. In fact, services are already being provided that deduce the interests or preferences of the user by analyzing his or her log data containing behavior history, the text of his or her emails, access history, etc., and provide content appropriate for his or her physical/mental/emotional state. However, it is difficult to deduce the ever-changing preferences of people who live in a complicated society. Such deduction is still at a research stage. In this paper, we focus on mobile phones, whose users are growing in number and which offer many sophisticated functions besides the ability to talk. We propose a method of deducing the state of mind of the user by analyzing the pictographic characters used in his or her emails. Pictographic characters are used to convey feelings that the user thinks are too complicated to express in text. Specifically, from among many pictographic characters, we have selected those that show facial expressions and are used to express feelings (states of mind). We have extracted the state-of-mind elements that are associated with each pictographic character, and assigned state-of-mind elements and corresponding vector values to each pictographic character. We have developed an algorithm to deduce the user's state of mind from an email by analyzing the pictographic characters used in that email. We have developed a prototype evaluation system, and evaluated the effectiveness of the proposed algorithm.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114435508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Integrating Radio Frequency Object Discovery and Bluetooth for Semantic-Based M-Commerce 基于语义的移动商务集成射频对象发现和蓝牙
M. Ruta, T. Di Noia, E. Di Sciascio, F. Scioscia
{"title":"Integrating Radio Frequency Object Discovery and Bluetooth for Semantic-Based M-Commerce","authors":"M. Ruta, T. Di Noia, E. Di Sciascio, F. Scioscia","doi":"10.1109/UBICOMM.2007.25","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.25","url":null,"abstract":"RFID and current ubiquitous protocols and technologies call for an integration, to provide innovative and advanced wireless services, with semantics being a candidate glue for such an integration. To this aim, in this paper we study an enhancement to the original RFID data exchange protocol and its integration in a semantic-based Bluetooth resource discovery framework. The semantic annotation of products and goods can then be exploited to allow an effective retrieval process. The proposed approach is presented and motivated in a novel m-commerce context.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129039067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing Web Service Contracts 分析Web服务契约
E. Cambronero, Joseph C. Okika, A. Ravn
{"title":"Analyzing Web Service Contracts","authors":"E. Cambronero, Joseph C. Okika, A. Ravn","doi":"10.1109/UBICOMM.2007.10","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.10","url":null,"abstract":"Web services should be dependable, because businesses rely on them. For that purpose the service oriented architecture has standardized specifications at a syntactical level. In this paper, we demonstrate how such specifications are used to derive semantic models in the form of (timed) automata. These can be used to model check functional and behavioural properties of a given service. Since there might be several specifications dealing with different aspects, one must also check that these automata are consistent, where we propose to set up a suitable simulation relation. The proposed techniques are illustrated with a small case study.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Content Management and Delivery for Mobile Devices 移动设备的动态内容管理和交付
S. Manoharan
{"title":"Dynamic Content Management and Delivery for Mobile Devices","authors":"S. Manoharan","doi":"10.1109/UBICOMM.2007.20","DOIUrl":"https://doi.org/10.1109/UBICOMM.2007.20","url":null,"abstract":"Unlike desktop computers, mobile devices vary widely in terms of their capability. Screen size, colour depth, and supported file types are just some examples of where the variations are. Tailoring content to suit the capability of a device has been a research and practical problem for some time, and a variety of solutions exist. Content adaptation to cater for device variations is the focus of this paper. It presents the design and implementation of a content management and delivery system that adapts content based on device capability. The system is capable of handling a variety of content types and is extensible to allow inclusion of others.","PeriodicalId":305315,"journal":{"name":"International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127003968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信