2009 IEEE International Conference on Pervasive Computing and Communications最新文献

筛选
英文 中文
EB-MAC: An event based medium access control for wireless sensor networks EB-MAC:无线传感器网络基于事件的媒介访问控制
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912863
Z. Merhi, M. Elgamel, M. Bayoumi
{"title":"EB-MAC: An event based medium access control for wireless sensor networks","authors":"Z. Merhi, M. Elgamel, M. Bayoumi","doi":"10.1109/PERCOM.2009.4912863","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912863","url":null,"abstract":"Efficiency in any wireless sensor based application relies significantly on the medium access control it implements. It is not likely that we will see in the near future a unified MAC protocol for wireless sensor networks that is suitable for all wireless sensor applications. In this context, we propose an event based medium access control (EB-MAC) that is tailored for event based systems. Typically, event based systems are characterized by having long periods of inactivity and short abrupt periods of high data contention when an event is detected. High data traffic is generated simultaneously from all sensors detecting the event to deliver captured data. EB-MAC arranges data transfer dynamically using an election based scheduling technique. When data transfer begins, each sensor at a time starts sending data packets in a contention free environment. The protocol is implemented on MicaZ sensor motes where it showed efficiency in reliability, throughput and energy conservation. The algorithm is compared with an implementation of B-MAC with RTS/CTS on MicaZ where it showed its superiority in throughput and latency.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121910689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Continuum: A service-based software infrastructure for ubiquitous computing Continuum:用于普适计算的基于服务的软件基础设施
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912790
C. Costa, Felipe Kellermann, Rodolfo Stoffel Antunes, L. Silva, A. Yamin, C. Geyer
{"title":"Continuum: A service-based software infrastructure for ubiquitous computing","authors":"C. Costa, Felipe Kellermann, Rodolfo Stoffel Antunes, L. Silva, A. Yamin, C. Geyer","doi":"10.1109/PERCOM.2009.4912790","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912790","url":null,"abstract":"The latest technological advances, which introduced innovative and more affordable devices, have contributed to boost the practical application of research in the field of ubiquitous computing (ubicomp). For the development of applications in this area, we need an adequate software infrastructure. In order to do so, we have proposed Continuum, an infrastructure based on service-oriented architecture (SOA), making use of framework and middleware, and employing a redefinition of follow-me semantics. In this redefined vision, users can go anywhere carrying the data and application they want, which they can use in a seamlessly integrated fashion with the real world. In this article, we focus on the description of the service-based architecture proposed for Continuum. The proposal widens the web services standards to support the mobility of services, allowing them to be deployed, copied, or moved. Besides, the abstraction provided enables the adaptation of legacy applications as Continuum pluggable services.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131165534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proximiter: Enabling mobile proximity-based content sharing on portable devices Proximiter:在便携式设备上启用基于移动接近度的内容共享
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912802
Bo Xing, K. Seada, N. Venkatasubramanian
{"title":"Proximiter: Enabling mobile proximity-based content sharing on portable devices","authors":"Bo Xing, K. Seada, N. Venkatasubramanian","doi":"10.1109/PERCOM.2009.4912802","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912802","url":null,"abstract":"The recent years have witnessed an explosive amount of user-generated contents, along with users' soaring demands on sharing these contents. An evidence of that is the blossom of hundreds of sharing sites on the web, among which the most famous are MySpace [1], Flickr [2], YouTube [3], Facebook [4] and LinkedIn [5]. Through these sites, users upload the contents they generate (blogs, pictures, videos, resumes, etc.), and make them available to their friends or the general public. A common characteristic of such Internet-based content sharing scenarios is that all contents are hosted by third-party servers on the Internet, and sharing happens when content consumers (regardless of where they are) access the hosting web sites.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131202310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
WIS : A well-being index based health care system in smart home WIS:智能家居中基于幸福指数的医疗保健系统
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912804
Jung Wook Park, Y. Jung, H. Park, Soon-Dong Kim, W. Cho
{"title":"WIS : A well-being index based health care system in smart home","authors":"Jung Wook Park, Y. Jung, H. Park, Soon-Dong Kim, W. Cho","doi":"10.1109/PERCOM.2009.4912804","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912804","url":null,"abstract":"In this paper, we present a health care system which can diagnose chronic diseases such as metabolic syndrome. In case of chronic invalids health information has to be check periodically, causing major inconvenience to the patient. In this paper, we propose an automatic diagnostic method for detecting metabolic syndrome, by utilizing a collaborative community computing approach in conjunction with a well-being index.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133597476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using situation lattices in sensor analysis 态势格在传感器分析中的应用
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912762
Juan Ye, Lorcan Coyle, S. Dobson, P. Nixon
{"title":"Using situation lattices in sensor analysis","authors":"Juan Ye, Lorcan Coyle, S. Dobson, P. Nixon","doi":"10.1109/PERCOM.2009.4912762","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912762","url":null,"abstract":"Highly sensorised systems present two parallel challenges: how to design a sensor suite that can efficiently and cost-effectively support the needs of given services; and to extract the semantically relevant interpretations, or “situations”, from the flood of context data collected by the sensors. We describe mathematical structures called situation lattices that can be used to address these two problems simultaneously, allowing designers to both design and refine situation identification whilst offering insights into the design of sensor suites. We validate the accuracy and efficiency of our technique against a third-party data set and demonstrate how it can be used to evaluate sensor suite designs.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131885662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Randomizing RFID private authentication 随机RFID私有认证
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912773
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiangyang Li, Yunhao Liu
{"title":"Randomizing RFID private authentication","authors":"Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiangyang Li, Yunhao Liu","doi":"10.1109/PERCOM.2009.4912773","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912773","url":null,"abstract":"Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Such designs, being efficient, often fail to achieve forward secrecy and resistance to attacks, such as compromising and desynchronization. Indeed, these attacks may still take effect even after a tag successfully finishes the authentication and key-updating procedure. To address the issue, we propose a lightweight RFID private authentication protocol, RWP, based on the random walk concept. RWP also provides the forward security and temporal resistance to the tracking attack. The analysis results show that RWP effectively enhances the security protection for RFID private authentication, and increases the authentication efficiency from O(logN) to O(1).","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116483373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Look-ahead geographic routing for sensor networks 传感器网络的前瞻性地理路由
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912859
J. You, D. Lieckfeldt, Qi Han, J. Salzmann, D. Timmermann
{"title":"Look-ahead geographic routing for sensor networks","authors":"J. You, D. Lieckfeldt, Qi Han, J. Salzmann, D. Timmermann","doi":"10.1109/PERCOM.2009.4912859","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912859","url":null,"abstract":"As sensor networks are deployed over various terrains, the complexity of their topology continues to grow. Voids in networks often cause existing geographic routing algorithms to fail. In this paper, we propose a novel geographic routing algorithm called “Greedy Forwarding with VIrtual Position (ViP)”. We introduce virtual position as the middle position of all direct neighbors of a node. Instead of comparing nodes' real geographic positions, ViP employs virtual positions when selecting the next hop. Such virtual position reflects the neighborhood of a sensor node, as well as the tendency of further forwarding. For sparsely-deployed networks, ViP increases success rate of packet routing without introducing significant overhead. Furthermore, multiple levels of virtual position can be obtained with localized iteration. We propose the “Greedy Forwarding with Multi-level Virtual Position (MVP)” algorithm and the “Greedy Forwarding with Hierarchical Virtual Position (HVP)” algorithm. Different levels of virtual positions and their combinations are used alternatively to increase success rate of packet routing in sensor networks.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121984645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Extending the event-based programming model to support sensor-driven ubiquitous computing applications 扩展基于事件的编程模型,以支持传感器驱动的泛在计算应用程序
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912849
Sean Reilly, M. Haahr
{"title":"Extending the event-based programming model to support sensor-driven ubiquitous computing applications","authors":"Sean Reilly, M. Haahr","doi":"10.1109/PERCOM.2009.4912849","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912849","url":null,"abstract":"We propose an extension to the event-based programming model for sensor-driven ubiquitous computing applications. The extension consists of three abstractions: Multi-Event Handlers, Event Streams and Execution Policies. We believe that these additional abstractions simplify the task of writing applications in this domain. In this position paper we present the extensions and demonstrate our prototype middleware implemented in C.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125749665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Pebbles and Urns a tangible, presence-based messaging service 鹅卵石和urn是一个有形的、基于存在的消息传递服务
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912813
William O. Plymale
{"title":"Pebbles and Urns a tangible, presence-based messaging service","authors":"William O. Plymale","doi":"10.1109/PERCOM.2009.4912813","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912813","url":null,"abstract":"The incorporation of contextual elements of location, time, and identity into traditional computer and network systems and services is resulting in enhanced, intuitive, more natural user experiences. This work defines an instance of a presence-based messaging system called Pebbles and Urns. A survey of current messaging systems has indicated key missing elements that are addressed by functionality in the Pebbles and Urns architecture. Current context-based messaging research focuses on the social activities and social interactions of the user. While that is important, this work proposes how Pebbles and Urns would augment the numerous ways a person deploys, obtains, and realizes information in their daily activities. Next, it considers agent design and tuplespaces as implementation components of Pebbles and Urns. An agent's ability to react to context, combined with tuplespace characteristics of distributed, associative memory, persistent storage, and destination - space - time uncoupling allow the investigation of new messaging schemes offering interesting advantages over existing messaging systems. This work closes with several Pebbles and Urns user scenarios and suggested future work to extend the Pebbles and Urns messaging system.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130143814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID based localization for a miniaturized robotic platform for wireless protocols evaluation 基于RFID的小型机器人平台无线协议评估定位
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912794
Vikram P. Munishwar, Shailendra Singh, Christopher Mitchell, Xiaoshuang Wang, Kartik Gopalan, N. Abu-Ghazaleh
{"title":"RFID based localization for a miniaturized robotic platform for wireless protocols evaluation","authors":"Vikram P. Munishwar, Shailendra Singh, Christopher Mitchell, Xiaoshuang Wang, Kartik Gopalan, N. Abu-Ghazaleh","doi":"10.1109/PERCOM.2009.4912794","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912794","url":null,"abstract":"The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the development of robust wireless networking protocols is an ability to conduct effective and efficient evaluation of the protocol in order to ensure its successful working in real-world settings. We proposed MiNT-2, a fresh re-design of the original MiNT framework developed at Stony Brook University. One of the fundamental requirements of MiNT-2 is to provide location awareness of all the nodes within the network. In this paper, we demonstrate the use of radio-frequency identification (RFID) technology in order to carry out localization of the mobile nodes within the system. We also demonstrate the application of the localization system of constructing different scenarios for wireless protocols evaluation.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131079655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信