{"title":"Practical Exploitation of the Energy-Latency Tradeoff for Sensor Network Broadcast","authors":"Matthew J. Miller, Indranil Gupta","doi":"10.1109/PERCOMW.2007.94","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.94","url":null,"abstract":"As devices become more reliant on battery power, it is essential to design energy efficient protocols. While there is a vast amount of research into power save protocols for unicast traffic, relatively little attention has been given to broadcast traffic. In previous work, we proposed probability-based broadcast forwarding (PBBF) to address broadcast power save by allowing users to select a desired tradeoff between energy consumption, latency, and reliability. In this paper we extend our previous work in two ways. First, we introduce a new parameter that allows a tradeoff between reliability and packet overhead to give users more options. Second, we implement PBBF on the TinyOS platform to evaluate it beyond the analysis and simulation from our previous work. Our evaluation demonstrates the tradeoffs possible using PBBF on sensor hardware","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Operator-driven Peer-to-Peer Service Platform for Mobile Environments (Invited Talk)","authors":"W. Kellerer","doi":"10.1109/PERCOMW.2007.92","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.92","url":null,"abstract":"Summary form only given. Peer-to-peer (P2P) technology is regarded as being disruptive for traditional fixed and mobile operators. However, it can also be considered as an opportunity for new ways of service provisioning. First, P2P concepts allow a more efficient usage of existing platform resources through relying on existing infrastructure including even the customer equipment and thus provide a cheap service platform. Second, P2P technology brings new business opportunities through extending the service portfolio to user provided services and to ubiquitous environments. Along these lines, we outline the requirements and building blocks for a P2P based service platform as a new overlay infrastructure for mobile environments. With mobile environments we largely refer to heterogeneous systems that provide the platforms for the peers including low capability, low data rate wireless devices as well as high capability, fixed-network equipment. Thus, in comparison to conventional fixed-network based P2P systems, in which homogeneous nodes are assumed, with P2P in mobile environments, we refer to the heterogeneity of networks, devices, and users that constitute the challenges. A main building block for our service platform is a P2P lookup system that addresses the requirements of heterogeneous environments in terms of varying resources and high churn with a hierarchical P2P system. This P2P system consists of a DHT-based core overlay network interconnecting high capability super peers that interface to low resource leaf peers. In addition to this P2P lookup component, the building blocks of the service platform address reliability, scalability, controllability, bootstrapping as core building blocks, and further application-specific components such as reputation management, complex query handling","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127358152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yukimune Kuroki, T. Okino, T. Haraikawa, Y. Sakane, Y. Takebayashi
{"title":"Multimodal Cruising Assist to Enhance the Drivers' Abilities to Perceive Surrounding Contexts Using Panoramic Presentation with Dynamic Multiple Windows","authors":"Yukimune Kuroki, T. Okino, T. Haraikawa, Y. Sakane, Y. Takebayashi","doi":"10.1109/PERCOMW.2007.83","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.83","url":null,"abstract":"We have developed a multimodal cruising assist system to achieve safety and comfort driving using dynamic multiple windows. The system enhances the drivers' abilities to perceive surrounding contexts in driving. Integrating various input/output devices and media processing functions, based on multiple ultrawide-angle cameras and multiple displays on a vehicle, we have developed a \"panoramic imaging system\" for displaying the wide-angle video data in surrounding contexts using \"single screen multiple windows\" presentation environment that empowers the drivers' perceptual abilities. The presentation environment presents the camera images interactively to drivers by utilizing a single front display that we have developed. Experimental results have shown the effectiveness of the proposed system for achieving safety and comfort driving","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126363209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Shin, H. Jasso, S. Tilak, N. Cotofana, T. Fountain, L. Yan, M. Fraser, A. Elgamal
{"title":"Automatic Vehicle Type Classification Using Strain Gauge Sensors","authors":"P. Shin, H. Jasso, S. Tilak, N. Cotofana, T. Fountain, L. Yan, M. Fraser, A. Elgamal","doi":"10.1109/PERCOMW.2007.25","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.25","url":null,"abstract":"In this paper we describe the use of machine learning algorithms (Naive Bayesian, neural network, and support vector machine) on data collected from strain gauge sensors to automatically classify vehicles into classes, ranging from small vehicles to combination trucks, along the lines of Federal Highway Administration vehicle classification guide. Knowing the types of vehicles can help reduce operating costs and improve the health monitoring of infrastructure and would help to make transportation safer and personalized; use of such non-image-based data permits user privacy. Our results indicate that the support vector machine technique outperforms the rest with an accuracy of 94.8%","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124821973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evan Welbourne, M. Balazinska, G. Borriello, Waylon Brunette
{"title":"Challenges for Pervasive RFID-Based Infrastructures","authors":"Evan Welbourne, M. Balazinska, G. Borriello, Waylon Brunette","doi":"10.1109/PERCOMW.2007.26","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.26","url":null,"abstract":"The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deployments that involve humans raise new and critical problems related to privacy, security, uncertainty, and a more diverse and evolving set of applications. At the University of Washington, we are deploying a building-wide RFID-based infrastructure with hundreds of antennas and thousands of tags. Our goal is to uncover the issues of pervasive RFID deployments and devise techniques for addressing these issues before such deployments become common place. In this paper, we present the challenges encountered and lessons learned during a smaller-scale pilot deployment of the system. We show some preliminary results and, for each challenge, discuss how we addressed it or how we are planning on addressing it","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130695145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining the Position and Orientation of Multi-Tagged Objects Using RFID Technology","authors":"S. Hinske","doi":"10.1109/PERCOMW.2007.38","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.38","url":null,"abstract":"The idea of smart shelves or tables equipped with RFID technology has been around for some time now. A number of commercial products are already available, especially for retailing. All presented solutions, however, are designed to only identify objects currently in range. While this may be sufficient for some applications, there are others that do not only require identification, but furthermore the exact position and orientation of the objects. In this paper, we present an approach to determine the position and orientation of multi-tagged objects. We introduce the general idea, describe our developed system, and present preliminary findings. We also summarize our next steps and describe a planned evaluation","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134482095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A System of Secure Virtual Coupons Using NFC Technology","authors":"M. Aigner, Sandra Dominikus, Martin Feldhofer","doi":"10.1109/PERCOMW.2007.15","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.15","url":null,"abstract":"Coupons are a very well established way of providing a benefit to a customer for a specific activity to improve the business (e.g. looking at an advertisement). They represent a small value, but a high number of uncontrolled copies of coupons can result in a significant loss. Compared to paper based coupons, systems of virtual coupons differ significantly by the fact that unprotected data is easily copied or modified without significant costs by anyone. In this paper, we propose a system of virtual coupons (so-called mCoupons) that is protected against illicit use. NFC in combination with inexpensive passive tags is used to prevent attacks in a decentralized approach. The paper motivates the use of NFC for such a system and gives a short list of possible attacks. The underlying protocol to prevent attacks is shortly described and the requirements for all major components of such a system are defined. From a user's perspective, the system is based on the very intuitive usability of NFC, by simply touching NFC targets with a mobile device for pick-up and cash-in of mCoupons","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132054630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context Aware Routing of Enterprise User Communications","authors":"M. Choudhury, H. Sundaram, A. John, D. Seligmann","doi":"10.1109/PERCOMW.2007.29","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.29","url":null,"abstract":"This paper develops a context aware framework to address the diverse communication needs of a modern enterprise. Such enterprises are characterized by workers in different locations, subject to different policies, using different communication devices, and having varying degrees of skill sets. This diversity poses challenges in finding the most effective human worker (agent) for tasks like fielding a customer request, helping another agent with additional expert knowledge, or more generally help complete a task like a supply chain exception. We focus on the problem of routing communications to the most effective agent using a spectrum of contextual knowledge: availability, media type, activity, expertise, and location. We determine an optimal 'request-to-agent' routing based on several metrics of effectiveness depending on the communication context. The optimal agent is selected to communicate on a specific media who minimizes the expected duration of interaction while maximizes the probability of successful call completion. Based on our model we have conducted simulations involving context aware and non-context aware routing scenarios. The results indicate that the context aware routing outperforms other conventional request-routing techniques. The work presented here can impact routing algorithms, as well as address problems related to enterprise staffing and temporal variation of context for the agent","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect That Screen Size has on Video-Based M-Learning.","authors":"Nipan Maniar, Emily Bennett, Diane Gal","doi":"10.1109/PERCOMW.2007.112","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.112","url":null,"abstract":"This paper focuses on using m-learning to teach university students. It reports on an empirical investigation that studied the effect that screen-size has on video-based m-learning. The results suggest that screen sizes typical of a PDA device may facilitate more effective learning, in comparison to screen sizes typical of a mobile telephone. The implications of this finding for the design of m-learning environments are discussed","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localization for Intermittently Connected Ad Hoc Networks","authors":"Wing Ho A. Yuen, H. Schulzrinne","doi":"10.1109/PERCOMW.2007.62","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.62","url":null,"abstract":"We consider localization for intermittently connected networks. Traditional localization approaches rely on network infrastructure such as access points (AP) as reference nodes or anchors, and do not work well when infrastructure is sparse. We propose a new class of localization scheme, where mobile nodes act as anchors for each other. Each node maintains an anchor table, storing its encounter history with APs and mobile nodes. When two nodes meet, they share their encounter history with each other, and jointly estimate the current location to form a new anchor. This dramatically increases the number of anchors for a mobile node, and reduces the localization error when position estimation is triggered by a user application. Both anchor formation and position estimation are formulated as a maximum likelihood (ML) estimation problem, by exploiting constraints of node location based on encounter history and mobility profile of nodes. Numerical examples are provided to illustrate properties of the ML estimator. We performed simulations and showed that localization error is independent of the anchor table size under a random walk mobility model. Thus, it suffices to store the most recent anchor, which simplifies implementation and is conducive to privacy. More importantly, localization error decreases as node density increases, and approaches the transmission range of mobile nodes when node density is sufficiently high","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}