{"title":"Proactive and adaptive fuzzy profile control for mobile phones","authors":"Miika Valtonen, A. Vainio, J. Vanhala","doi":"10.1109/PERCOM.2009.4912801","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912801","url":null,"abstract":"In this paper we describe a context-sensitive way to change an active mobile phone profile. We present a method to create a proactive and adaptive phone profile control system that automatically adapts the profile to the best alternative based on the current context. The adaptation is based on recognizing patterns of human practices, which may change over time. The control system is implemented with a fuzzy controller that supports reinforcement learning. The operation of the system is demonstrated with a mobile phone that is controlled by a PC. The PC lets a user to simulate the context parameters, and the phone works as a user interface for profile selection and display.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130758091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eskindir Asmare, A. Gopalan, M. Sloman, Naranker Dulay, Emil C. Lupu
{"title":"A policy-based management architecture for mobile collaborative teams","authors":"Eskindir Asmare, A. Gopalan, M. Sloman, Naranker Dulay, Emil C. Lupu","doi":"10.1109/PERCOM.2009.4912765","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912765","url":null,"abstract":"Many missions are deemed dangerous or impractical to perform by humans, but can use collaborating, self-managing Unmanned Autonomous Vehicles (UAVs) which adapt their behaviour to current context, recover from component failure or optimise performance. This paper describes a policy-based distributed self-management framework for both individual and teams of UAVs. We use three levels of specifications — policy, mission class and mission instance to enable reuse of both policies and mission classes. The architecture has been tested on devices ranging from small laptops to body area networks. Initial evaluation shows the distributed architecture is scalable and outperforms a centralised mission management scheme.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130826801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chittabrata Ghosh, C. Cordeiro, D. Agrawal, M. B. Rao
{"title":"Markov chain existence and Hidden Markov models in spectrum sensing","authors":"Chittabrata Ghosh, C. Cordeiro, D. Agrawal, M. B. Rao","doi":"10.1109/PERCOM.2009.4912868","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912868","url":null,"abstract":"The primary function of a cognitive radio is to detect idle frequencies or sub-bands, not used by the primary users (PUs), and allocate these frequencies to secondary users. The state of the sub-band at any time point is either free (unoccupied by a PU) or busy (occupied by a PU). The states of a sub-band are monitored over L consecutive time periods, where each period is of a given time interval. Existing research assume the presence of a Markov chain for sub-band utilization by PUs over time, but this assumption has not been validated. Therefore, in this paper we validate existence of a Markov chain for sub-band utilization using real-time measurements collected in the paging band (928–948 MHz). Furthermore, since the detection of idle sub-bands by a cognitive radio is prone to errors, we probabilistically model the errors and then formulate a spectrum sensing paradigm as a Hidden Markov model that predicts the true states of a sub-band. The accuracy of our proposed method in predicting the true states of the sub-band is substantiated using extensive simulations.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127870913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A bandwidth management approach for quality of service support in mobile ad hoc networks","authors":"A. Agbaria, G. Gershinsky, Nir Naaman, K. Shagin","doi":"10.1109/PERCOM.2009.4912838","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912838","url":null,"abstract":"Bandwidth management is a key feature for providing quality of service (QoS) in contemporary mobile ad hoc networks (MANETs). In this paper, we present a novel approach to bandwidth reservation which is designed for highly mobile environments. In this scheme, a node takes into account the bandwidth requirements of its 2-hop neighbors. The design of this scheme does not depend on any routing protocol. We evaluate the proposed approach by incorporating it in the well known AODV protocol. The comparison between the original AODV and its extended version, with our approach, shows that the latter achieves a significantly lower latency and higher reliability.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122249802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongmin Yang, Jongmin Shin, Jeonggyu Kim, Cheeha Kim
{"title":"Asynchronous probing scheme for the optimal energy-efficient neighbor discovery in opportunistic networking","authors":"Dongmin Yang, Jongmin Shin, Jeonggyu Kim, Cheeha Kim","doi":"10.1109/PERCOM.2009.4912789","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912789","url":null,"abstract":"In opportunistic networking, it is hard to predict when a node gets and how long it keeps in contact with another. The persistent probing for prompt neighbor discovery consumes too much energy for battery-operated devices to afford. The most important issue is to carefully manage the power states at all stages of network operations. For the problem consisting of one sender and one receiver, we have presented a novel neighbor discovery scheme which is optimal in a sense that it does not miss a contact with the minimum energy consumed. In this paper, we extend the previous result to the optimal neighbor discovery scheme for the general case.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient utilization of scratch-pad memory for embedded systems","authors":"Wei Hu, Tianzhou Chen, Qingsong Shi, Feng Sha","doi":"10.1109/PERCOM.2009.4912829","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912829","url":null,"abstract":"Hierarchy memory units are used in embedded systems for their different performance. The scratch-pad memory has been used to meet the real-time constraints in embedded systems. This paper presents an efficient compiler-assisted approach based on scratch-pad memory for heap and stack management of embedded systems. The stack and heap will be mapped to scratch-pad memory and some special code will be inserted into programs. Thus the heap and stack of the same program will be allocated to scratch-pad memory together. Results of the benchmarks show a 17% reduction in runtime from our strategy vs. using the strategy that the heap and stack are allocated to off-chip memory.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125147676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart cevices for smart environments: Device-free passive detection in real environments","authors":"May Moussa, M. Youssef","doi":"10.1109/PERCOM.2009.4912826","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912826","url":null,"abstract":"Device-free Passive (DfP) localization is a system envisioned to detect, track, and identify entities that do not carry any device, nor participate actively in the localization process. A DfP system allows using nominal WiFi equipment for intrusion detection, without using any extra hardware, adding smartness to any WiFi-enabled device. In this paper, we focus on the detection function of the DfP system in a real environment. We show that the performance of our previously developed algorithms for detection in a controlled environments, which achieved 100% recall and precision, degrades significantly when tested in a real environment. We present an alternative algorithm, based on the maximum likelihood estimator (MLE), that has a significant performance increase in a real environment. Our results show that the recall of the system increases by more than 10% when using the proposed MLE without affecting the system's precision.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125295649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An energy-aware relay selection scheme for ALLIANCES","authors":"Xinhua Yang, T. Camp","doi":"10.1109/PERCOM.2009.4912873","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912873","url":null,"abstract":"ALLIANCES is a newly proposed wireless MAC protocol that exploits the cooperation of source nodes and relay nodes to resolve collisions and further improve throughput. A relay selection scheme is a significant piece of ALLIANCES, directly affecting the throughput and the energy distribution. Previously researchers have proposed a location relay selection scheme (LRS); this scheme selects the best relay nodes based on the location of each node. LRS greatly improves the network's throughput compared to the random relay selection scheme (RRS); however, LRS does not take into account energy, which is the most precious commodity of mobile communication. In this paper, we propose an energy-aware relay selection scheme (ERS); ERS maintains the performance benefits of LRS, but more evenly distributes the amount to energy remaining throughout the network. Simulation results show that ERS provides 24.3% longer lifetime of the network than LRS, without a noticeable throughput degradation.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122891246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Farivar, Mirko Montanari, Ellick Chan, R. Campbell
{"title":"An automatic user study demo in indoor environments and its privacy implications","authors":"R. Farivar, Mirko Montanari, Ellick Chan, R. Campbell","doi":"10.1109/PERCOM.2009.4912797","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912797","url":null,"abstract":"User studies usually involve much organization and manual labor. Even when performed correctly, a common problem of the studies is user bias. This occurs when participating users' knowledge of the study influences their actions. Another problem is the willingness of the users to participate at all. Finally, participants will always have privacy concerns. We have developed a framework to help with anonymized user studies, trying to solve the aforementioned problems. We have prepared a demo to show the effectiveness of our system.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122925907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HIPS: A calibration-less hybrid indoor positioning system using heterogeneous sensors","authors":"V. Zheng, Junhui Zhao, Yongcai Wang, Qiang Yang","doi":"10.1109/PERCOM.2009.4912832","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912832","url":null,"abstract":"Positioning is a crucial task in pervasive computing, aimed at estimating the user's positions to provide location-based services. In this paper, we study an interesting problem: when we wish to obtain hybrid positioning granularities in an office environment, how can we incorporate heterogeneous sensors to build an indoor positioning system with minimal human calibration effort? We propose a calibration-less solution by incorporating the ultrasound sensors with the radio-frequency sensors. In our solution, we use these two different types of sensors to satisfy the different granularities requirement; and meanwhile, we use the ultrasound sensors to help calibrate the radio-frequency sensors for positioning, so that we can minimize, or even eliminate the labeling effort for the radio-frequency positioning. Finally, we develop a system prototype with real-world sensor networks, and verify the feasibility and effectiveness of our proposed solution.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}