A. Hurson, Sahra Sedigh Sarvestani, Leslie L. Miller, B. Shirazi
{"title":"Enriching STEM education through personalization and teaching collaboration","authors":"A. Hurson, Sahra Sedigh Sarvestani, Leslie L. Miller, B. Shirazi","doi":"10.1109/PERCOMW.2011.5766949","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766949","url":null,"abstract":"Advances in databases, computational intelligence, and pervasive computing, which allow “anytime, anywhere” transparent access to information, provide fertile ground for radical changes in pedagogy. Cyberinfrastructure leveraging these technological advances can yield improvements in both instruction and learning, supporting a networked curricular model, facilitating collaboration within and among groups of students and instructors, and providing continuous access to instructional material. The trajectory followed by each student through the curriculum can be intelligently personalized, based on prior knowledge and skills, learning styles, and interests of the student, among other attributes. We propose to achieve these objectives by developing Pervasive Cyberinfrastructure for Personalized Learning and Instructional Support (PERCEPOLIS), which serves as the centerpiece of an experiment to create a community of faculty and students over a set of campuses, focusing on STEM disciplines. While numerous distance learning methods exist, we believe that the best way to provide STEM education is to use a blended approach - one that embraces both online components and classroom mentoring by qualified faculty members. The goal is to provide high-quality STEM education for the students, while raising the skill set of the entire community through teaching collaboration.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127419425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Mashima, Prateek Sarkar, E. Shi, Chris Li, Richard Chow, D. Song
{"title":"Privacy settings from contextual attributes: A case study using Google Buzz","authors":"D. Mashima, Prateek Sarkar, E. Shi, Chris Li, Richard Chow, D. Song","doi":"10.1109/PERCOMW.2011.5766879","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766879","url":null,"abstract":"Social networks provide users with privacy settings to control what information is shared with connections and other users. In this paper, we analyze factors influencing changes in privacy-related settings in the Google Buzz social network. Specifically, we show statistics on contextual data related to privacy settings that are derived from crawled datasets and analyze the characteristics of users who changed their privacy settings. We also investigate potential neighboring effects among such users.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116940816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. D. Kristensen, M. Kjærgaard, Thomas Toftkjær, S. Bhattacharya, P. Nurmi
{"title":"Improving pervasive positioning through three-tier cyber foraging","authors":"M. D. Kristensen, M. Kjærgaard, Thomas Toftkjær, S. Bhattacharya, P. Nurmi","doi":"10.1109/PERCOMW.2011.5766855","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766855","url":null,"abstract":"Cyber foraging is a pervasive computing technique where small, mobile devices offload resource intensive work to stronger, nearby surrogate computers in order to preserve energy and achieve better performance. The problem with relying only on local resources is, that the availability of such resources may be scarce in many environments. In this paper we therefore argue that a third tier should be added when considering cyber foraging; namely cloud computing. By considering the local device, nearby surrogates, and the cloud when scheduling, the mobile device may be able to continue using remote resources even when such resources are not available in its vicinity. An important challenge of pervasive computing is estimating the physical position of mobile devices. As the requirements increase for continuous and accurate positioning so does the computational requirements of positioning—even limiting the possible accuracy in many cases. In this paper we describe how a three tier cyber foraging approach can help improve the positioning capabilities of mobile devices. We demonstrate initial results for how such an approach applies to particle filtering-based GSM positioning.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting faulty wireless sensor nodes through Stochastic classification","authors":"A. Farruggia, G. Re, M. Ortolani","doi":"10.1109/PERCOMW.2011.5766858","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766858","url":null,"abstract":"In many distributed systems, the possibility to adapt the behavior of the involved resources in response to unforeseen failures is an important requirement in order to significantly reduce the costs of management. Autonomous detection of faulty entities, however, is often a challenging task, especially when no direct human intervention is possible, as is the case for many scenarios involving Wireless Sensor Networks (WSNs), which usually operate in inaccessible and hostile environments. This paper presents an unsupervised approach for identifying faulty sensor nodes within a WSN. The proposed algorithm uses a probabilistic approach based on Markov Random Fields, requiring exclusively an analysis of the sensor readings, thus avoiding additional control overhead. In particular, abnormal behavior of a sensor node will be inferred by analyzing the spatiotemporal correlation of its data with respect to its neighborhood. The algorithm is tested on a public dataset, over which different classes of faults were artificially superimposed.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123341997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud computing oriented network operating system and service platform","authors":"Jianwei Yin, Yanming Ye, Bin Wu, Zuoning Chen","doi":"10.1109/PERCOMW.2011.5766851","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766851","url":null,"abstract":"In recent years, cloud computing sweeps the world and becomes the new direction for future network applications. The traditional operating systems lack constructivity and evolvability, support less for the application perception and multi-core platform so that they cannot satisfy the requirements of cloud computing applications well. So the development of next-generation cloud-oriented network operating system is very significant. In this position paper, we first explained the background of the new network operating system. Then we listed some existing cloud computing operating systems. After describing the challenges that the project meets, we proposed the prototype architecture. We also discussed some key technologies and elaborated the expected typical scenario of developing and deploying applications in the proposed system.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115283105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed context-aware visualization","authors":"H. Sanftmann, N. Cipriani, D. Weiskopf","doi":"10.1109/PERCOMW.2011.5766878","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766878","url":null,"abstract":"We present a visualization framework integrated in a context-aware system that uses a common underlying stream processing middleware for tight integration of data accessing, processing, and visualization. Context-aware systems are often realized on mobile devices that do not have the computational power to perform complex tasks. Therefore, a dedicated hardware infrastructure might be required for data processing. In our case, stream processing is used, supporting parallelism on distributed and shared memory multiprocessors. We present the integration of visualization modules into a Java-based stream processing framework for context-aware systems, with focus on efficient communication and parallelization. Our approach is demonstrated for the example of a flow visualization scenario.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125096358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junbin Liu, T. Wark, Steven Martin, Peter Corke, Matthew J. A. D'Souza
{"title":"Distributed object tracking with robot and disjoint camera networks","authors":"Junbin Liu, T. Wark, Steven Martin, Peter Corke, Matthew J. A. D'Souza","doi":"10.1109/PERCOMW.2011.5766911","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766911","url":null,"abstract":"We describe a novel two stage approach to object localization and tracking using a network of wireless cameras and a mobile robot. In the first stage, a robot travels through the camera network while updating its position in a global coordinate frame which it broadcasts to the cameras. The cameras use this information, along with image plane location of the robot, to compute a mapping from their image planes to the global coordinate frame. This is combined with an occupancy map generated by the robot during the mapping process to track the objects. We present results with a nine node indoor camera network to demonstrate that this approach is feasible and offers acceptable level of accuracy in terms of object locations.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133362360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Lerche, Nico Laum, Guido Moritz, E. Zeeb, F. Golatowski, D. Timmermann
{"title":"Implementing powerful Web Services for highly resource-constrained devices","authors":"C. Lerche, Nico Laum, Guido Moritz, E. Zeeb, F. Golatowski, D. Timmermann","doi":"10.1109/PERCOMW.2011.5766899","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766899","url":null,"abstract":"Web Service technologies are state of the art in current enterprise distributed applications. To integrate highly resource-constrained devices, such as sensor nodes, into enterprise applications via Web Services, gateways are commonly used. Our aim was to investigate the intermediate, homogeneous communication between enterprise applications and highly resource-constrained devices. We therefore present the prototype implementation of an embedded enterprise compatible W3C Web Service solution. Furthermore, we give an evaluation of memory requirements and a timing analysis for a representative platform with 48 KiB of ROM, 10 KiB of RAM and IEEE 802.15.4 radio. As the prototype implementation requires only 8:5 KiB of ROM and 3 KiB of RAM, our results claim that enterprise Web Services, despite of prevailing assumptions, are feasible in this context.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Josué Iglesias, Jesús Cano, A. Bernardos, J. Casar
{"title":"A ubiquitous activity-monitor to prevent sedentariness","authors":"Josué Iglesias, Jesús Cano, A. Bernardos, J. Casar","doi":"10.1109/PERCOMW.2011.5766894","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766894","url":null,"abstract":"The Activity Monitor described in this paper is an easy-to-configure context-aware mobile application, capable of estimating and evaluating the user's activity all day long. It relies on fusion strategies for movement and location estimation, which combine acceleration and radio data from in-device and external sensors. The final objective of the Activity Monitor is to deliver adequate context-aware notifications in order to make the user aware of his level of activity. The reasoning process to decide when and how to deliver notifications is fully done in the mobile device by using an embedded reasoner, avoiding privacy issues related to personal sensitive data sharing.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Loss Minimization in adapter chaining for mobile ubiquitous computing environments","authors":"Byoungoh Kim","doi":"10.1109/PERCOMW.2011.5766919","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766919","url":null,"abstract":"In ubiquitous computing environments, users' devices collaborate and interact with surrounding devices to achieve a defined goal. However, there are cases in which those interactions and collaborations cannot be achieved due to incompatibilities among services installed on the involved devices. Existing approaches propose a way to handle the interoperability problems with composition of adapters. Nevertheless this is not a complete or applicable solution due to the existence of adaptation loss. As an alternative, we propose a Loss Minimization Scheme to support users' interaction with a set of similar services using a single service client. The incompatibilities between client and services on a device are evaluated and resolved using adapters and/or a composition of them.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123795398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}