Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)最新文献

筛选
英文 中文
An Aspect-Oriented Approach to the Modularisation of Context 面向方面的上下文模块化方法
J. Munnelly, S. Fritsch, S. Clarke
{"title":"An Aspect-Oriented Approach to the Modularisation of Context","authors":"J. Munnelly, S. Fritsch, S. Clarke","doi":"10.1109/PERCOM.2007.7","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.7","url":null,"abstract":"Handling context is required for applications to dynamically and appropriately adapt to their changing environment. Incorporating context into applications involves the consideration of a set of concerns related to the handling of various context types and the adaptation of the application behaviour relative to the current context. These concerns are usually heavily tangled with the base code of the applications, resulting in code that is badly modularised and therefore is hard to understand, manage and modify. We propose a modularised design for the handling of different kinds of context using aspect-oriented programming techniques. We demonstrate that a context-aware application built in this manner exhibits improved modularity, with corresponding improvements in comprehensibility, manageability and maintainability. The proposed aspect-oriented modularisation is evaluated against traditional object-oriented techniques, and also against a popular context framework, using metrics indicating coupling, cohesion and complexity. The results show the positive effect of modular code on context-aware applications by quantitatively illustrating the improvements in modularisation quality factors","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115470506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Using Digital Cameras for Text Input on Mobile Devices 在移动设备上使用数码相机进行文本输入
F. Siegemund, M. Haroon
{"title":"Using Digital Cameras for Text Input on Mobile Devices","authors":"F. Siegemund, M. Haroon","doi":"10.1109/PERCOM.2007.38","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.38","url":null,"abstract":"This paper presents novel text input methods for mobile devices. In particular, it shows how users can capture text from books, newspapers, and other objects by using the digital cameras that are integrated into an increasing number of smartphones. The idea is to select text from a live video stream generated by these digital cameras. Different interaction patterns are discussed that allow users to select text: (1) automatic detection of the word closest to a fixed position on the mobile device's screen, (2) delayed movement of the text selection to improve the precision of the selection procedure, and (3) using the stylus to select words and word groups. The proposed interaction patterns are evaluated based on the results of a user study, and their application is shown in an example scenario. The presented research has practical relevance because it can improve the usability of mobile applications such as online searching","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Overhearing the Wireless Interface for 802.11-Based Positioning Systems 监听基于802.11的定位系统无线接口
Thomas King, T. Haenselmann, S. Kopf, W. Effelsberg
{"title":"Overhearing the Wireless Interface for 802.11-Based Positioning Systems","authors":"Thomas King, T. Haenselmann, S. Kopf, W. Effelsberg","doi":"10.1109/PERCOM.2007.25","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.25","url":null,"abstract":"Not only the communication capabilities of 802.11, but also the capability to determine the position of mobile devices make 802.11 highly appealing for many application areas. Typically, a mobile device that wants to identify its position regularly performs active or passive scans to obtain the signal strength measurements of neighboring access points. However, so far, no investigations are known to have been launched into how regular scanning affects concurrent data transmissions from an end-user point of view. In this paper, we explore how common data communication is affected while actively or passively scanning at the same time. Furthermore, we present a novel scan scheme called monitor sniffing. Monitor sniffing exploits the fact that 802.11 operates on overlapping channels by overhearing the wireless interface. We have implemented our monitor sniffing algorithm using commodity 802.11g hardware, and we demonstrate that it does not disturb concurrent data communication","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133641666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario 面向网络嵌入式系统的RUNES中间件及其在灾害管理场景中的应用
Paolo Costa, G. Coulson, R. Gold, M. Lad, C. Mascolo, L. Mottola, G. Picco, Thirunavukkarasu Sivaharan, Nirmal Weerasinghe, S. Zachariadis
{"title":"The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario","authors":"Paolo Costa, G. Coulson, R. Gold, M. Lad, C. Mascolo, L. Mottola, G. Picco, Thirunavukkarasu Sivaharan, Nirmal Weerasinghe, S. Zachariadis","doi":"10.1109/PERCOM.2007.36","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.36","url":null,"abstract":"Due to the inherent nature of their heterogeneity, resource scarcity and dynamism, the provision of middleware for future networked embedded environments is a challenging task. In this paper we present a middleware approach that addresses these key challenges; we also discuss its application in a realistic networked embedded environment. Our application scenario involves fire management in a road tunnel that is instrumented with networked sensor and actuator devices. These devices are able to reconfigure their behaviour and their information dissemination strategies as they become damaged under emergency conditions, and firefighters are able to coordinate their operations and manage sensors and actuators through dynamic reprogramming. Our supporting middleware is based on a two-level architecture: the foundation is a language-independent, component-based programming model that is sufficiently minimal to run on any of the devices typically found in networked embedded environments. Above this is a layer of software components that offer the necessary middleware functionality. Rather than providing a monolithic middleware 'layer', we separate orthogonal areas of middleware functionality into self-contained components that can be selectively and individually deployed according to current resource constraints and application needs. Crucially, the set of such components can be updated at runtime to provide the basis of a highly dynamic and reconfigurable system","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128165039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 154
A Scalable Geographic Service Provision Framework for Mobile Ad Hoc Networks 移动自组织网络的可扩展地理服务提供框架
Xiaojing Xiang, Xin Wang
{"title":"A Scalable Geographic Service Provision Framework for Mobile Ad Hoc Networks","authors":"Xiaojing Xiang, Xin Wang","doi":"10.1109/PERCOM.2007.3","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.3","url":null,"abstract":"Supporting scalable and efficient routing and service provision in mobile ad hoc networks (MANET) has been a big research challenge. Conventional topology-based unicast and multicast protocols are normally hard to scale due to the big overhead in their routing schemes. Supported by these routing protocols, conventional service discovery schemes also have limited scalability and efficiency. Basing their forwarding decisions only on the local topology, geographic-based unicast routing protocols have drawn a lot of attentions in recent years. However, current geographic unicast routing can not adapt to different traffic conditions in a service provision network and current geographic multicast protocols can hardly scale to a large network size and group size. We propose a geographic routing and service provision framework for MANET which possesses the features of scalability, efficiency, robustness and adaptability. In the framework, an efficient hierarchical structure is built and maintained, based on which a scalable membership management is deployed to efficiently track the resource and service states. An adaptive and reactive geographic unicast routing protocol and a scalable and robust multicast protocol are designed to meet the different routing requirements in a service provision network. With the support of all of these components, the service provision functions, such as service discovery, delivery and coordination, can be deployed in the framework","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129407459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Wall-Sized Focus Plus Context Display 一个墙壁大小的焦点加上上下文显示
Sebastian Boring, Otmar Hilliges, A. Butz
{"title":"A Wall-Sized Focus Plus Context Display","authors":"Sebastian Boring, Otmar Hilliges, A. Butz","doi":"10.1109/PERCOM.2007.5","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.5","url":null,"abstract":"In this paper we present a wall-sized input system with high accuracy input in the center and lower precision tracking on the remaining parts of the wall. This work complements the concept of focus plus context displays where output quality in the center is better than in the periphery. Our contribution is to realize a similar concept for the input direction. A high precision tracking unit in the center provides a workspace with high interactivity, while four additional cameras placed in the corners of the wall provide lower precision tracking and hence much coarser interactivity on the entire wall. In our prototype this multi-precision input solution is combined with a focus plus context display, thus providing two levels of interactivity in both the input and output direction. With this setup, we have implemented two example applications to demonstrate the benefits of variable precision input","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120982676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Severless Search and Authentication Protocols for RFID RFID的无分割搜索和认证协议
C. C. Tan, Bo Sheng, Qun A. Li
{"title":"Severless Search and Authentication Protocols for RFID","authors":"C. C. Tan, Bo Sheng, Qun A. Li","doi":"10.1109/PERCOM.2007.30","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.30","url":null,"abstract":"With the increasing popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection to users. Most recent RFID protocols use a central database to store the RFID tag data. An RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this paper, we proposed a more flexible authentication protocol that provides comparable protection without the need for a central database. We also suggest a protocol for secure search for RFID tags. We believe that as RFID applications become widespread, the ability to search for RFID tags will be increasingly useful","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"R-29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
A Capacitive Sensing Toolkit for Pervasive Activity Detection and Recognition 一个用于普适活动检测和识别的电容传感工具包
Raphael Wimmer, M. Kranz, Sebastian Boring, A. Schmidt
{"title":"A Capacitive Sensing Toolkit for Pervasive Activity Detection and Recognition","authors":"Raphael Wimmer, M. Kranz, Sebastian Boring, A. Schmidt","doi":"10.1109/PERCOM.2007.1","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.1","url":null,"abstract":"In this paper we present a toolkit for realizing capacitive sensing applications for human-computer interaction in pervasive computing systems. We argue that capacitive sensors - due to their unique properties - are well suited for many pervasive and ubiquitous computing applications and scenarios. We describe the CapToolKit designed to rapidly realize prototypes and systems that are able to detect the presence of humans and objects. Our toolkit also allows the integration of 3D interaction with everyday objects as well as instrumented environments. We illustrate its capabilities by presenting several applications implemented using CapToolKit. The entire system will be open-sourced to allow utilization of our technology within other research projects. By building on the existing toolkit researchers are provided a foundation for developing their own sensor systems, algorithms, and applications","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121276272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Supporting Domain Experts in Creating Pervasive Experiences 支持领域专家创造普适体验
M. Weal, Don Cruickshank, D. Michaelides, K. Howland, G. Fitzpatrick
{"title":"Supporting Domain Experts in Creating Pervasive Experiences","authors":"M. Weal, Don Cruickshank, D. Michaelides, K. Howland, G. Fitzpatrick","doi":"10.1109/PERCOM.2007.34","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.34","url":null,"abstract":"Located pervasive experiences are often constructed as one off deployments with domain experts acting in a consultancy role to technical specialists who construct the experience. In this paper we will look at how pervasive infrastructures might be constructed that can support domain experts as direct experience authors. We present a case study based around a locative pervasive system supporting school field trips, and describe how aspects of the construction and running of the experience were handed over to the domain experts. Based on our experiences we suggest a number of key principles that we believe make it possible for non-specialists to become pervasive authors: separation of the information layer, use of metaphor, in-situ authoring, robustness, varied location modelling and coarse orchestration","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection 通过贝叶斯网络进行宏编程:分布式推理和异常检测
M. Mamei, R. Nagpal
{"title":"Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection","authors":"M. Mamei, R. Nagpal","doi":"10.1109/PERCOM.2007.19","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.19","url":null,"abstract":"Macro programming a distributed system, such as a sensor network, is the ability to specify application tasks at a global level while relying on compiler-like software to translate the global tasks into the individual component activities. Bayesian networks can be regarded as a powerful tool for macro programming a distributed system in a variety of data analysis applications. In this paper we present our architecture to program a sensor network by means of Bayesian networks. We also present some applications developed on a microphone-sensor network, that demonstrate calibration, classification and anomaly detection","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"24 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120867636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信