{"title":"UbiStore: Ubiquitous and Opportunistic Backup Architecture","authors":"F. Tan, S. Ardon, M. Ott","doi":"10.1109/PERCOMW.2007.121","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.121","url":null,"abstract":"This paper presents UbiStore, a novel distributed and opportunistic backup architecture, where mobile devices backup their data over short-range, ad-hoc wireless links to other devices encountered as a result of user mobility. We base our design on the assumption that typical user mobility patterns will incur some repetitive encounters in the course of daily life (public transports, home/office) which can facilitate the recovery of data in case of a device failure. This paper presents the UbiStore design, an evaluation framework, and early results","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117332473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Weal, Don Cruickshank, D. Michaelides, D. Millard, D. D. Roure, K. Howland, G. Fitzpatrick
{"title":"A Card Based Metaphor for Organising Pervasive Educational Experiences","authors":"M. Weal, Don Cruickshank, D. Michaelides, D. Millard, D. D. Roure, K. Howland, G. Fitzpatrick","doi":"10.1109/PERCOMW.2007.3","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.3","url":null,"abstract":"This paper looks at the card metaphor used successfully in the Equator Ambient Wood and Chawton House projects to structure and author content as part of innovative school field trips using wireless and ubiquitous technologies. The framework provided by the metaphor is laid out and observations made as to how it has been used by domain experts in creating educational experiences. The trade-off between formalisation and restricting pedagogy is examined and key benefits that the metaphor provides are given","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114873898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative MAC Protocol with Automatic Relay Selection in Distributed Wireless Networks","authors":"Chun-Ting Chou, Jun Yang, Dong Wang","doi":"10.1109/PERCOMW.2007.33","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.33","url":null,"abstract":"Cooperative transmission can obtain spatial diversity without using multiple antennas, thus achieving more reliable transmission or consuming less power. To realize cooperative communication in a distributed wireless network, two key questions need to be answered, namely when to cooperate and whom to cooperate with. In this paper, we propose a distributed MAC protocol with automatic relay selection to address these questions. We show by theoretical analysis and simulation results that the proposed solution outperforms conventional noncooperation transmission by 8 to 10 dB, for various target outage probabilities","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130340929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akhilesh Saxena, S. Ganguly, S. Bhatnagar, R. Izmailov
{"title":"RFInD: An RFID-Based System to Manage Virtual Spaces","authors":"Akhilesh Saxena, S. Ganguly, S. Bhatnagar, R. Izmailov","doi":"10.1109/PERCOMW.2007.99","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.99","url":null,"abstract":"We present RFInD, a cost-effective utilitarian system for locating objects using RFID technology. RFInD separates the notion of location from that of physical co-ordinates by using the abstraction of a virtual space. A virtual space is created by using RFID tags to label entities and locations in the physical space as references. RFInD manages the virtual space by using the references to create a spatial map, over which objects can be tracked and located. The target objects are labeled and embedded in a virtual space by associating them with proximate reference tags. RFInD creates the technology to automatically and efficiently manage these associations. In this work, we first characterize the capabilities of a commercially available RFID reader. We show how to use these capabilities for two tasks, namely proximity detection and tag association. RFInD uses these capabilities as primitives to create virtual spaces, embed objects in the virtual space, and navigate the space to track the embedded objects. Further, our experiments establish the effectiveness of our approach in managing virtual spaces","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130383754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Promoting Efficiency and Separation of Concerns through a Hybrid Model Based on Ontologies for Context-Aware Computing","authors":"R. Rocha, M. Casanova, M. Endler","doi":"10.1109/PERCOMW.2007.97","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.97","url":null,"abstract":"Several projects in context-aware computing have adopted ontologies for modeling context information, due to their powerful constructors for modeling highly dependent concepts and their mechanisms for describing complex inferences. However, the implementation of ontologies introduces some scalability and performance problems for context-aware systems, which usually have to handle high-volume of distributed information. To circumvent this drawback, some research efforts have proposed the adoption of hybrid context models. This paper presents a hybrid context model for the MoCA, a middleware for developing and deploying context-aware collaborative applications for mobile users","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"449 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130112539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Physical Clocks for Replication in MANETs","authors":"M. Scholz, Frank Bregulla, A. Hinze","doi":"10.1109/PERCOMW.2007.123","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.123","url":null,"abstract":"When update-anywhere data replication is performed in a MANET, operations on replicated data are often executed concurrently. To achieve a global total ordering of all operations, we propose a hybrid timestamp mechanism that combines physical clocks and logical timestamps. Our approach overcomes the ordering problem that arises from imprecisely synchronized physical clocks. We overlay the timestamps of operations with a grid of time-slots. To order the operations, we use physical clocks for operations in different time-slots and logical clocks for operations within the same time-slot. We prove that our method guarantees a total ordering when using an appropriate grid width","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130113209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lease-Based Resource Management in Smart Spaces","authors":"Marko Jurmu, M. Perttunen, J. Riekki","doi":"10.1109/PERCOMW.2007.58","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.58","url":null,"abstract":"We present a lease-based method for managing various resources in smart spaces. We argue that leases introduce a flexible way of utilizing context information in the management, and thus facilitate the optimization of resource usage. This work-in-progress paper presents our initial concept and methodology, along with ideas for further development","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mirko Knoll, Arno Wacker, Gregor Schiele, Torben Weis
{"title":"Decentralized Bootstrapping in Pervasive Applications","authors":"Mirko Knoll, Arno Wacker, Gregor Schiele, Torben Weis","doi":"10.1109/percomw.2007.36","DOIUrl":"https://doi.org/10.1109/percomw.2007.36","url":null,"abstract":"Deploying world-scale pervasive applications usually requires substantial investments in server infrastructure. A better option is to use P2P techniques, because it distributes the load from the servers to the peers. However, this creates a new problem. Users do not know each others upfront and we do not want to rely on a central server infrastructure and therefore a single point of failure. Thus, we must provide a bootstrapping protocol that allows users to discover at least one peer of the overlay network. In this paper we give a survey of possible bootstrapping protocols and propose one approach that satisfies all of our requirements","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130036266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Metzger, C. Floerkemeier, P. Bourquin, E. Fleisch
{"title":"Making Radio Frequency Identification Visible--A Watchdog Tag","authors":"C. Metzger, C. Floerkemeier, P. Bourquin, E. Fleisch","doi":"10.1109/PERCOMW.2007.63","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.63","url":null,"abstract":"To address the privacy concerns associated with RFID, previous work proposed an approach, where RFID readers do not only broadcast commands to inventory tag populations, but also transmit meta-information that describe the ongoing data collection. It was argued that RFID readers should explicitly declare the scope and purpose of their tag data collection by making this meta-information available to consumers and regulators through a watchdog tag. In this paper, we present the prototype of such a watchdog tag that is capable of decoding and displaying the meta-information broadcasted over the RFID communication channel for the visual inspection by the user. The paper details the design and implementation with discrete components, but also discusses limitations and future improvements. Our watchdog tag operates reliably and therefore, it suggests potential to enhance one's control over the data collected by RFID readers","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122351204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Non Uniform Quality of Service for Extending WSN Lifetime","authors":"Anna Förster, A. Murphy","doi":"10.1109/PERCOMW.2007.45","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.45","url":null,"abstract":"Interest in extracting and exploiting information from wireless sensor networks has been increasing for several years. Most scenarios focus on collecting and evaluating large amounts of data at a single sink, and many protocols and algorithms have been designed to accomplish this efficiently. However, not all applications require all data, nor do they have a single collection point Instead, multiple moving base stations collect and exploit information, concentrating on data gathered in their immediate vicinity and requiring less precise knowledge about the data collected far away. While such a scenario can be supported by traditional approaches that present perfect information, they actually require less data, therefore providing a clear opportunity for increasing network lifetime without sacrificing the data quality requirements of the application. This idea of non uniform quality of service is the focus of this paper, along with two preliminary protocols demonstrating its potential and motivating future work","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121162374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}