Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)最新文献

筛选
英文 中文
Worst-Case Routing Performance Metrics for Sensor Networks 传感器网络的最坏情况路由性能指标
E. Soedarmadji
{"title":"Worst-Case Routing Performance Metrics for Sensor Networks","authors":"E. Soedarmadji","doi":"10.1109/PERCOMW.2007.139","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.139","url":null,"abstract":"Successful integration of pervasive sensor networks in mission critical applications depends on the ability of these networks to cope with and reasonably perform under the worst-case scenarios. One of the key performance measures is the network's ability to route information from the source node to the intended destination. This paper introduces a general framework with which worst-case routing performance of sensor networks can be evaluated and compared. Ultimately, our method can either be used as a design optimization tool, or a decision making tool to select and price contending sensor network designs","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115321517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Expressing Sensor Network Interaction Patterns Using Data-Driven Macroprogramming 用数据驱动的宏编程表达传感器网络交互模式
Animesh Pathak, L. Mottola, A. Bakshi, V. Prasanna, G. Picco
{"title":"Expressing Sensor Network Interaction Patterns Using Data-Driven Macroprogramming","authors":"Animesh Pathak, L. Mottola, A. Bakshi, V. Prasanna, G. Picco","doi":"10.1109/PERCOMW.2007.46","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.46","url":null,"abstract":"Wireless sensor networks (WSNs) are increasingly being employed as a key building block of pervasive computing infrastructures, owing to their ability to be embedded within the real world. So far, pervasive applications for WSNs have been developed in an ad-hoc manner using node-centric programming models, focusing on the behavior of single nodes. Instead, macro-programming models provide much higher levels of abstractions, allowing developers to reason on the sensor network as a whole. In this paper, we demonstrate how a wide range of interaction patterns commonly found in pervasive, embedded applications can be expressed using ATaG, a data-driven macro-programming language. To support this, we showcase real-world applications developed in ATaG, and consider both homogeneous, sense-only scenarios, and heterogeneous settings involving actuation on the environment under control","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115575827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Dynamic Context Bindings in Pervasive Middleware 普及中间件中的动态上下文绑定
T. Broens, M. V. Sinderen, A. V. Halteren, D. Quartel
{"title":"Dynamic Context Bindings in Pervasive Middleware","authors":"T. Broens, M. V. Sinderen, A. V. Halteren, D. Quartel","doi":"10.1109/PERCOMW.2007.42","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.42","url":null,"abstract":"Context-awareness (CA) enables the development of personalized pervasive services. Current context-aware infrastructures focus on middleware solutions to support acquisition, usage and management of context. However, using context requires the CA application to create a binding between itself and one or more context producing entities. Creating this binding is the responsibility of the CA application developer, which is often an extensive manual task. The ad hoc availability of context-producing entities further complicates this responsibility. This paper proposes an application infrastructure, coined CACI, which offers a binding transparency to support rapid development of CA applications. CACI enables developers to specify context requirements at a high abstraction level using a declarative binding language. CACI also provides the creation and maintenance of bindings to context producing entities based on such specifications. This paper discusses the design and implementation of CACI. Additionally, it discusses the validation of CACI using a pervasive healthcare scenario","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128412999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems 事件驱动与多线程传感器节点操作系统的实验比较
C. Duffy, U. Roedig, J. Herbert, C. Sreenan
{"title":"An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems","authors":"C. Duffy, U. Roedig, J. Herbert, C. Sreenan","doi":"10.1109/PERCOMW.2007.21","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.21","url":null,"abstract":"Two different operating system types are currently considered for sensor networks: event driven and multi-threaded. This paper compares the two well-known operating systems TinyOS (event driven) and MANTIS (multi-threaded) regarding their memory usage, power consumption and processing capabilities. TinyOS and MANTIS are both ported to the DSYS25 sensor platform. Both operating systems are used to execute the same sensor network application and the aforementioned parameters of interest are measured. The results presented in this paper show for which set of applications each operating system is preferable","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128631287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Cryptanalysis of Two Lightweight RFID Authentication Schemes 两种轻量级RFID认证方案的密码分析
Benessa Defend, Kevin Fu, A. Juels
{"title":"Cryptanalysis of Two Lightweight RFID Authentication Schemes","authors":"Benessa Defend, Kevin Fu, A. Juels","doi":"10.1109/PERCOMW.2007.34","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.34","url":null,"abstract":"Vajda and Buttyan proposed several lightweight authentication protocols for authenticating RFID tags to readers, and left open the quantifiable cryptographic strength. Our cryptanalysis answers this open question by implementing and measuring attacks against their XOR and SUBSET protocols. A passive eavesdropper can impersonate a tag in the XOR protocol after observing only 70 challenge-response transactions between the tag and reader. In contrast, the theoretical maximum strength of the XOR protocol could have required 16! * 2 observed transactions to break the key. Our experiments also show that a passive eavesdropper can recover the shared secret used in the XOR protocol by observing an expected 1,092 transactions. Additionally, a nearly optimal active attack against the SUBSET protocol extracts almost one bit of information for each bit emitted by the tag","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks 无线传感器网络容错重路由的自适应算法
Michael Gregoire, I. Koren
{"title":"An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks","authors":"Michael Gregoire, I. Koren","doi":"10.1109/PERCOMW.2007.20","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.20","url":null,"abstract":"A substantial amount of research on routing in sensor networks has focused upon methods for constructing the best route, or routes, from data source to sink before sending the data. We propose an algorithm that works with this chosen route to increase the probability of data reaching the sink node in the presence of communication failures. This is done using an algorithm that watches radio activity to detect when faults occur and then takes actions at the point of failure to re-route the data through a different node without starting over on an alternative path from the source. We show that we are able to increase the percentage of data received at the source node without increasing the energy consumption of the network beyond a reasonable level","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130604398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Role of Probabilistic Schemes in Multisensor Context-Awareness 概率方案在多传感器上下文感知中的作用
W. Dargie
{"title":"The Role of Probabilistic Schemes in Multisensor Context-Awareness","authors":"W. Dargie","doi":"10.1109/PERCOMW.2007.115","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.115","url":null,"abstract":"This paper investigates the role of existing \"probabilistic\" schemes to reason about various everyday situations on the basis of data from multiple heterogeneous physical sensors. The schemes we discuss are fuzzy logic, hidden Markov models, Bayesian networks, and Dempster-Schafer theory of evidence. The paper also presents a conceptual architecture and identifies the suitable scheme to be employed by each component of the architecture. As a proof-of-concept, we will introduce the architecture we implemented to model various places on the basis of data from temperature, light intensity and relative humidity sensors","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
mu-ware: A Middleware Framework for Wearable Computer and Ubiquitous Computing Environment mu-ware:面向可穿戴计算机和普适计算环境的中间件框架
Yong-Hak Song, SangKwon Moon, Gyudong Shim, D. Park
{"title":"mu-ware: A Middleware Framework for Wearable Computer and Ubiquitous Computing Environment","authors":"Yong-Hak Song, SangKwon Moon, Gyudong Shim, D. Park","doi":"10.1109/PERCOMW.2007.2","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.2","url":null,"abstract":"We expect that futuristic wearable computers including our UFC (ubiquitous fashionable computer) will spread like current prosperous PC in the near future. With the wearable computer on their body, users utilize their own private computing environment wherever they are. Moreover, using the wearable computer, they are able to interact with a variety of user-centric services provided by ubiquitous computing infrastructure (U-infra). In this paper, we focus on our proposed extensible middleware, U-ware, for both user's UFC and U-infra which is managed by ubiquitous service providers, mu-ware is composed of light-weight service discovery protocol (USD protocol), distributed information sharing (Ubispace), context manager and instant service loader on our extensible middleware platform, called KUSP. mu-ware not only provides upper applications with an efficient stand-alone computing environment but also helps them easily take advantage of various ubiquitous services, even new services in a first-visited place","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121259717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Middleware for Context-Aware Applications and Services Based on Messenger Protocols 基于信使协议的上下文感知应用和服务中间件
Martin Saternus, Torben Weis, Mirko Knoll, Frank Dürr
{"title":"A Middleware for Context-Aware Applications and Services Based on Messenger Protocols","authors":"Martin Saternus, Torben Weis, Mirko Knoll, Frank Dürr","doi":"10.1109/PERCOMW.2007.7","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.7","url":null,"abstract":"Nowadays most context-aware applications are independent proprietary pieces of software. A general framework or middleware deployed in the field does not exist; therefore the implementation of context-aware applications and services assumes the development of the whole application stack for each application. Along these development issues, deployment and privacy problems are to be solved. This imposes the following challenges concerning a middleware for context-aware applications: (1) we need an architecture that allows to implement and deploy services easily on the network. (2) We need a user interface that is widespread, well known to users and allows to manage one's privacy settings for every single service transparently. In this paper we describe our middleware's architecture for context-aware applications, based on messenger protocols","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Middleware Support for Quality of Context in Pervasive Context-Aware Systems 普及上下文感知系统中对上下文质量的中间件支持
K. Sheikh, M. Wegdam, M. V. Sinderen
{"title":"Middleware Support for Quality of Context in Pervasive Context-Aware Systems","authors":"K. Sheikh, M. Wegdam, M. V. Sinderen","doi":"10.1109/PERCOMW.2007.81","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.81","url":null,"abstract":"Middleware support for pervasive context-aware systems relieves context-aware applications from dealing with the complexity of context-specific operations such as context acquisition, aggregation, reasoning and distribution. The middleware decouples applications from the underlying heterogeneous context sensors, and offers advantages such as rapid development of context-aware applications and efficient usage of the context sensors. Context sensors have inherent limitations with respect to the quality of the context information they produce. Without breaking the decoupling, the middleware needs to explicitly model and quantify this quality of context in order to allow application to adapt their behavior based on the quality of context, for efficiency reasons and to enable quality-of-context-aware privacy policies. In this paper we identify and define five quality-of-context indicators for context-aware middleware, and discuss different alternatives for their quantification. These quality-of-context indicators are: precision, freshness, spatial resolution, temporal resolution and probability of correctness","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134542497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信