Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)最新文献

筛选
英文 中文
Non-cooperative versus Cooperative Approaches for Distributed Network Synchronization 分布式网络同步的非合作与合作方法
A. Scaglione, R. Pagliari
{"title":"Non-cooperative versus Cooperative Approaches for Distributed Network Synchronization","authors":"A. Scaglione, R. Pagliari","doi":"10.1109/PERCOMW.2007.85","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.85","url":null,"abstract":"In this paper we compare the so called pulse coupled oscillator (PCO) protocol with an alternative gossiping algorithm, known as average consensus protocol, considering the application of decentralized network synchronization. The main difference between the PCO algorithm and the average consensus protocol is that the latter is based on the explicit exchange of time-stamps in the pay load of packets, which are delivered with contention to the neighbors. The PCO scheme, instead, implicitly encodes the computed state into the transmission time, driving the nodes to transmit packets in synchrony. Our results show clearly how as more nodes tend to transmit at unison, cooperative transmission emerges boosting up the signal level and, therefore, speeding up the algorithm convergence. Conversely, the average consensus protocol, requires increasing energy as the number of nodes increases","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124630983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Ontology-Directed Generation of Frameworks for Pervasive Service Development 面向本体的普适服务开发框架生成
C. Consel, Wilfried Jouve, Julien Lancia, Nicolas Palix
{"title":"Ontology-Directed Generation of Frameworks for Pervasive Service Development","authors":"C. Consel, Wilfried Jouve, Julien Lancia, Nicolas Palix","doi":"10.1109/PERCOMW.2007.91","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.91","url":null,"abstract":"Pervasive computing applications are tedious to develop because they combine a number of problems ranging from device heterogeneity, to middleware constraints, to lack of programming support. In this paper, we present an approach to integrating the ontological description of a pervasive computing environment into a programming language, namely Java. From this ontological description of a pervasive computing environment, a framework is automatically generated. It provides the developer with dedicated programming support to manage, discover and invoke services. Besides, it performs a number of verifications both at compile and run time, ensuring the robustness of applications","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114316508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
LightPeers: A Lightweight Mobile P2P Platform LightPeers:轻量级移动P2P平台
B. Christensen
{"title":"LightPeers: A Lightweight Mobile P2P Platform","authors":"B. Christensen","doi":"10.1109/PERCOMW.2007.59","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.59","url":null,"abstract":"This paper describes the LightPeers platform for lightweight mobile pure P2P networking, developed to support groups of pupils outside the school buildings in the field using a variety of mobile devices such as Tablet PCs, PDAs, and mobile phones, to produce, organize, present, and share digital material","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115565299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Support of Stateful Services in Pervasive Environments 在普及环境中支持有状态服务
Caroline Funk, C. Ehm, Claudia Linnhoff-Popien, Christoph Kuhmünch
{"title":"Support of Stateful Services in Pervasive Environments","authors":"Caroline Funk, C. Ehm, Claudia Linnhoff-Popien, Christoph Kuhmünch","doi":"10.1109/PERCOMW.2007.110","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.110","url":null,"abstract":"In pervasive environments we envision that services always adapt to the user's needs. So far, this is done by either using context information to deliver personalized services or by composing services from atomic services taking ambient information into account. Our approach goes further in a way that we dynamically adapt composite services and recompose during runtime. This is necessary due to changing availability of services in pervasive environments and high user mobility. Recomposition may have different characteristics e.g. removal or substitution of atomic services. In case of substitution, if the substituted services are stateful it is necessary to support state transfer in order to ensure continuous service usage. Therefore, we developed a framework that enables state management, backup and recovery for pervasive services. The paper gives an overview of requirements, related work and the proposed solution concept and implementation","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130149560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Soldier-Robot Ad Hoc Network 士兵-机器人自组织网络
B. Luu, Barry J. O'Brien, D. Baran, R. Hardy
{"title":"A Soldier-Robot Ad Hoc Network","authors":"B. Luu, Barry J. O'Brien, D. Baran, R. Hardy","doi":"10.1109/PERCOMW.2007.13","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.13","url":null,"abstract":"The mobility and convenience of wireless LANs have resulted in a proliferation of IEEE 802.11 a/b/g devices. However, their capabilities depend on a network infrastructure which military operations cannot reliably obtain in a battlefield environment. The U.S. Army Research Laboratory (ARL) has researched mobile ad hoc networks (MANET) which do not depend on an infrastructure but possess ad hoc routing capabilities that allow mobile nodes to self-configure and adapt to changes in network topology in order to sustain connectivity. This paper presents and discusses an implementation of a soldier-robot ad hoc network to support reconnaissance, surveillance and target acquisition (RSTA) capabilities. The realization of this wireless MANET was achieved by using commercial off-the-shelf (COTS) wireless network hardware and open-source software. We will describe the seamless integration of MANET capability into a soldier system used to remotely control a small unmanned ground vehicle (SUGV). We will explain the use of MANET technology in extending the operational range of the robot in both line-of-sight and non-light-of-sight environments, such as in buildings, using intermediate MANET nodes","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125510940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
MaLM: Machine Learning Middleware to Tackle Ontology Heterogeneity MaLM:解决本体异构的机器学习中间件
L. Capra
{"title":"MaLM: Machine Learning Middleware to Tackle Ontology Heterogeneity","authors":"L. Capra","doi":"10.1109/PERCOMW.2007.64","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.64","url":null,"abstract":"We envisage pervasive computing applications to be predominantly engaged in knowledge-based interactions, where services and information will be found and exchanged based on some formal knowledge representation. To enable knowledge sharing and reuse, current middleware make the assumption that a single, universally accepted, ontology exists with which queries and assertions are exchanged. We argue that such an assumption is unrealistic. Rather, different communities will speak different `dialects'; in order to enable cross-community interactions, thus increasing the range of services and information available to users, on-the-fly translations are required. In this paper we introduce MaLM, a middleware for pervasive computing devices that exploits an unsupervised machine learning technique called self-organising map to tackle the problem of ontology heterogeneity. At any given time, the MaLM instance running on a device operates in one of two possible modes: `training', that is, MaLM is autonomically learning how to group together semantically closed concepts; and `expert', that is, given in input a query or assertion expressed in a foreign dialect, MaLM identifies the concept, expressed in the device mother-tongue, that most closely represents it","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123761479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Pervasive Fabrication: Making Construction Ubiquitous in Education 无孔不入的捏造:使建构在教育中无处不在
M. Eisenberg, L. Buechley
{"title":"Pervasive Fabrication: Making Construction Ubiquitous in Education","authors":"M. Eisenberg, L. Buechley","doi":"10.1109/PERCOMW.2007.93","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.93","url":null,"abstract":"The notion of \"pervasive computing\" has traditionally been identified with a focus on what might be called \"pervasive processing\". This paper, in contrast, argues that the notion of pervasive computing can be profitably extended to accommodate the burgeoning potential of educational fabrication. We present several projects under way in our lab-projects that illustrate how fabrication devices can be employed in educational settings. We then use these examples to motivate a broader discussion of scenarios for \"pervasive fabrication\" in education","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125223224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Fundamental Mobility Properties for Realistic Performance Analysis of Intermittently Connected Mobile Networks 间歇连接移动网络实际性能分析的基本移动特性
A. Jindal, K. Psounis
{"title":"Fundamental Mobility Properties for Realistic Performance Analysis of Intermittently Connected Mobile Networks","authors":"A. Jindal, K. Psounis","doi":"10.1109/PERCOMW.2007.52","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.52","url":null,"abstract":"Traditional mobile ad hoc routing protocols fail to deliver any data in intermittently connected mobile ad hoc networks (ICMN's) because of the absence of complete end-to-end paths in these networks. To overcome this issue, researchers have proposed to use node mobility to carry data around the network. These schemes are referred to as mobility-assisted routing schemes. A mobility-assisted routing scheme forwards data only when appropriate relays meet each other. The time it takes for them to first meet each other is referred to as the meeting time. The time duration they remain in contact with each other is called the contact time. If they fail to exchange the packet during the contact time (due to contention in the network), then they have to wait till they meet each other again. This time duration is referred to as the inter meeting time. A realistic performance analysis of any mobility-assisted routing scheme requires a knowledge of the statistics of these three quantities. These quantities vary largely depending on the mobility model at hand. This paper studies these three quantities for the three most popularly used mobility models: random direction, random waypoint and random walk models. Hence, this work allows for a realistic performance analysis of any routing scheme under any of these three mobility models","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"21 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131776741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Privacy-Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag 增强隐私的射频识别标签:剪辑标签的实现
P. Moskowitz, Andris Lauris, Stephen S. Morris
{"title":"A Privacy-Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag","authors":"P. Moskowitz, Andris Lauris, Stephen S. Morris","doi":"10.1109/PERCOMW.2007.11","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.11","url":null,"abstract":"The use of RFID tags for the tagging of individual consumer items is a distinct possibility The \"clipped tag\" has been suggested for individual items in order to enhance consumer privacy. The clipped tag allows the consumer to tear off a portion of the tag in order to transform a tag that may be read at a range of 10 meters to one than can only be read at a few cm. The use of these tags puts privacy protection in the hands of the consumer, provides a visual indication that the tag has been modified, but makes it possible for the tag to be used later for returns, recalls, or recycling. This paper describes an implementation of the clipped tag as a garment hang tag","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132954505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Managing an Integrated Ubicomp Environment Using Ontologies and Reasoning 使用本体和推理管理集成的Ubicomp环境
Michael Blackstock, R. Lea, C. Krasic
{"title":"Managing an Integrated Ubicomp Environment Using Ontologies and Reasoning","authors":"Michael Blackstock, R. Lea, C. Krasic","doi":"10.1109/PERCOMW.2007.65","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.65","url":null,"abstract":"One issue hindering the deployment of integrated ubicomp environments is the lack of a shared model for applications to utilize resources across administrative and network domains. Through the use of concrete examples, we describe our proposed common model for ubicomp environments to address this issue. We then present use cases and additional examples for how our ubicomp common model (UCM) is used by our integration framework. The ubicomp integration framework (UIF) uses an ontology driven architecture (ODA) (P. Tetlow et al., 2001) and enterprise application integration (EAI) techniques to integrate existing ubiquitous computing middleware to the common model. The use cases illustrate how the integrated model and reasoning is used to maintain a dynamic integrated model of an environment","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131367186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信