Yu Huang, Xiaoxing Ma, Jiannong Cao, Xianping Tao, Jian Lu
{"title":"Concurrent Event Detection for Asynchronous consistency checking of pervasive context","authors":"Yu Huang, Xiaoxing Ma, Jiannong Cao, Xianping Tao, Jian Lu","doi":"10.1109/PERCOM.2009.4912761","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912761","url":null,"abstract":"Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environments. Various schemes have been proposed to check context consistency for pervasive applications. However, existing schemes implicitly assume that the contexts being checked belong to the same snapshot of time. This limitation makes existing schemes do not work in pervasive computing environments, which are characterized by the asynchronous coordination among computing devices. The main challenge imposed on context consistency checking by asynchronous environments is how to interpret and detect concurrent events. To this end, we propose in this paper the Concurrent Events Detection for Asynchronous consistency checking (CEDA) algorithm. An analytical model, together with corresponding numerical results, is derived to study the performance of CEDA. We also conduct extensive experimental evaluation to investigate whether CEDA is desirable for context-aware applications. Both theoretical analysis and experimental evaluation show that CEDA accurately detects concurrent events in time in asynchronous pervasive computing environments, even with dynamic changes in message delay, duration of events and error rate of context collection.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122381682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Auction-based congestion management for target tracking in wireless sensor networks","authors":"Lei Chen, B. Szymanski, Joel W. Branch","doi":"10.1109/PERCOM.2009.4912768","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912768","url":null,"abstract":"This paper addresses the problem of providing congestion-management for a shared wireless sensor network-based target tracking system. In many large-scale wireless sensor network target tracking scenarios (e.g., a surveillance system for tracking vehicles in urban environments), multiple targets may converge within close proximity of each other. Such scenarios may cause network congestion as nearby sensors attempt to concurrently send updates to a data aggregation point (e.g., base station). We consider the case in which this problem is further complicated by two factors. First, such a large-scale sensor network may very well be deployed to serve multiple target tracking applications with different and dynamic priorities and interests in different (types of) targets. Second, each application will most likely place a different premium on the timeliness of the target information (principally defined by some quality metric) they receive. All the above challenges introduce formidable challenges in providing the expeditious delivery of target information to all prioritized applications. In this paper, we advocate the use of a distributed auction-based approach to locally manage network bandwidth allocation in the described context. We use the Second Price Auction mechanism (to ensure incentive compatibility) in which the congested node acts as the auctioneer and the packets carrying target updates act as bidders. Their bid values are defined by the loss of information utility to the applications associated with the packets. The winning packet receives the current transmission slot of the auctioneer node. We demonstrate through simulation that the resulting auction allocates bandwidth efficiently, maximizing the collective applications' goals, even when the application priorities change dynamically.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125795044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A logic-based formalism for pervasive workflow","authors":"Sourish Dasgupta","doi":"10.1109/PERCOM.2009.4912816","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912816","url":null,"abstract":"In order to deal with dynamic events occurring in the system, we designed three basic operations over this ALNet: (i) search for end services that can trigger the target event, (ii) search for source nodes that have reachability to at least one of the end nodes, and (iii) select the source node that gives the best composition cost. However, with the addition of more and more services, the ALNet becomes larger and complex and then performing these three tasks might be computationally costly. In order to solve the problem, we proposed an abstraction method that improves the performance significantly and demonstrated that this can be an effective platform for realizing event handling in pervasive systems. As an evaluation of the ALNet, an experimental setup has been designed and the abstraction runtime performance has been tested over different sizes service network. We have found out that the abstraction runtime performance is improved (compared to one without the abstraction) and has shown a steady increase even with the increasing size of the ALNet network.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125181578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aligning activity sequences for continuous tracking of cellphone users","authors":"Driss Choujaa, Naranker Dulay","doi":"10.1109/PERCOM.2009.4912833","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912833","url":null,"abstract":"The aim of activity recognition is to identify automatically what a person is doing at a given point in time from a series of observations. Activity recognition is a very active topic and is considered an essential step towards the design of many advanced systems. Recently, mobile and embedded systems have received growing interest as context-sensing platforms for activity recognition. However, these devices have limited battery life and do not allow continuous user tracking. In this paper, we present a novel activity tracking method integrating a dynamic programming algorithm for sequence alignment into a nearest-neighbour classifier. Our scheme is capable of filling gaps in sensed data by exploiting long-range dependencies in human behaviour. Initial experiments on a standard dataset show very promising results even with little training data.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128519988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Nakamura, M. Kamio, Tetsushi Watanabe, Shinsuke Kobayashi, N. Koshizuka, K. Sakamura
{"title":"Reliable ranging technique based on statistical RSSI analyses for an ad-hoc proximity detection system","authors":"K. Nakamura, M. Kamio, Tetsushi Watanabe, Shinsuke Kobayashi, N. Koshizuka, K. Sakamura","doi":"10.1109/PERCOM.2009.4912870","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912870","url":null,"abstract":"We propose a proximity detection system that supports pedestrian traffic. Active radio tags are utilized for building the system to reduce the overall system cost. But accurate ranging based on utilizing active radio tags only is difficult to achieve, since the RSSI is affected by small-scale fading of a radio signal in real-world environments. In this paper, 4 simple statistical RSSI filtering methods and a packet exchange protocol for reducing the fading effect are proposed. Combinations of proposed methods are thoroughly experimented in real-world environments and discussed for determining the best combination for the system. Our results show that the variation of detecting distance is successfully reduced to 4 meters for particular combinations.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125258384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NoShake: Content stabilization for shaking screens of mobile devices","authors":"Ahmad Rahmati, Clayton W. Shepard, Lin Zhong","doi":"10.1109/PERCOM.2009.4912750","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912750","url":null,"abstract":"Consumer electronics and mobile devices intended for pervasive applications are often subject to shaking that makes their screen difficult to read. To address this usability challenge, we present NoShake, a system for screen content stabilization. NoShake utilizes a single accelerometer, now present in numerous consumer electronics and mobile devices. The core of NoShake is a physics inspired model that dynamically compensates for the device shaking by shifting the screen content opposite the direction of the shake. The model is efficient, parametric, and can be fine tuned based on shaking pattern detection. We implement a prototype of NoShake on an Apple iPhone and conduct user studies in a number of scenarios, which highlight the strengths as well as limitations of NoShake in coping with shaking devices.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121920008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Rate Adaptation in Mobile environments","authors":"X. Chen, Prateek Gangwal, D. Qiao","doi":"10.1109/PERCOM.2009.4912769","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912769","url":null,"abstract":"Channel asymmetry and high fluctuation of channel conditions are two salient characteristics of wireless channels in mobile environments. Therefore, when using IEEE 802.11 devices in mobile environments such as vehicular networks, it is critical to have an effective rate adaptation scheme that can deal with these issues. In this paper, we propose a practical rate adaptation scheme called RAM (Rate Adaptation in Mobile environments) and implement it in the Madwifi device driver. RAM uses a receiver-based approach to handle channel asymmetry and a conservative SNR prediction algorithm to deal with high channel fluctuation. More importantly, RAM allows the receiver to convey the feedback information in a creative manner via ACK transmission rate variation, which does not require changes to the device firmware and hence is implementable at the device driver level. The effectiveness of RAM is demonstrated through experimental evaluation in indoor static and mobile environments and outdoor vehicular environments, as well as simulation study based on SNR traces collected from the experiments.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121943876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online algorithms for maximizing quality of link transmissions over a jammed wireless channel","authors":"R. Kannan, Shuangqing Wei, C. Busch, A. Vasilakos","doi":"10.1109/PERCOM.2009.4912840","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912840","url":null,"abstract":"We consider the problem of a transmitter transmitting to its receiver over a wireless link subject to jamming and develop two online power control algorithms for maximizing wireless link quality (transmission rate). We assume that the transmitter transmits and the jammer interferes over a period of M time slots. The impact of the jammer is to deteriorate the quality of the wireless channel during time slots in which it is present. We assume a powerful random jammer with the ability to arbitrarily decrease the channel quality and affect any (unknown) number of time slots. Since the presence of the jammer is arbitrary, the complete jamming pattern (channel quality) over the given time period is unknown apriori. The current channel quality is revealed to the transmitter at the start of the current time slot while future channel quality remains unknown. The transmitter must then allocate power optimally to maximize the total transmission rate over M slots given only its knowledge of the current channel quality, thus giving rise to an online power control problem. We develop two online power control algorithms for maximizing the wireless link quality (transmission rate). The first algorithm is based on constant power scaling and has O(1) competitive ratio when the average received power quality over M time slots (ĥhgPT/M) is either very small or very large. However when ĥhgPT = O(M), this algorithm has an upper bound on its competitive ratio of O(logM/log logM}. This upper bound is tight. The second online algorithm based on constant rate scaling has a worst case competitive ratio of given equation. By judiciously choosing which algorithm to use based on the offline available parameter of average received power, we can assure an almost constant competitive ratio for maximizing link quality under all cases.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128180856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Devlic, R. Reichle, M. Wagner, M. Kirsch-Pinheiro, Yves Vanrompay, Y. Berbers, M. Valla
{"title":"Context inference of users' social relationships and distributed policy management","authors":"A. Devlic, R. Reichle, M. Wagner, M. Kirsch-Pinheiro, Yves Vanrompay, Y. Berbers, M. Valla","doi":"10.1109/PERCOM.2009.4912890","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912890","url":null,"abstract":"Inference of high-level context is becoming crucial in development of context-aware applications. An example is social context inference - i.e., deriving social relations based upon the user's daily communication with other people. The efficiency of this mechanism mainly depends on the method(s) used to draw inferences based on existing evidence and sample information, such as a training data. Our approach uses rule-based data mining, Bayesian network inference, and user feedback to compute the probabilities of another user being in the specific social relationship with a user whose daily communication is logged by a mobile phone. In addition, a privacy mechanism is required to ensure the user's personal integrity and privacy when sharing this user's sensitive context data. Therefore, the derived social relations are used to define a user's policies for context access control, which grant the restricted context information scope depending on the user's current context. Finally, we propose a distributed architecture capable of managing this context information based upon these context access policies.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"74 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards shrink-wrapped security: A taxonomy of security-relevant context","authors":"Gleneesha Johnson","doi":"10.1109/PERCOM.2009.4912819","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912819","url":null,"abstract":"The emerging mobile computing paradigm makes it feasible for workers to access corporate resources anytime and anywhere. While ubiquitous access has its benefits, it creates unique challenges for maintaining the security of these resources - challenges that traditional, context-insensitive approaches to security are not appropriate to handle. We propose the notion of shrink-wrapped security, in which a tight coupling is provided between a user's situation and security. In order to support shrink-wrapped security, a more comprehensive notion of context than what is currently used by context-aware security systems is necessary. This paper presents a first step towards achieving shrink-wrapped security by addressing a key challenge that developers of context-aware systems face…identifying relevant context.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115811615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}