2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)最新文献

筛选
英文 中文
Enriching STEM education through personalization and teaching collaboration 通过个性化和教学协作丰富STEM教育
A. Hurson, Sahra Sedigh Sarvestani, Leslie L. Miller, B. Shirazi
{"title":"Enriching STEM education through personalization and teaching collaboration","authors":"A. Hurson, Sahra Sedigh Sarvestani, Leslie L. Miller, B. Shirazi","doi":"10.1109/PERCOMW.2011.5766949","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766949","url":null,"abstract":"Advances in databases, computational intelligence, and pervasive computing, which allow “anytime, anywhere” transparent access to information, provide fertile ground for radical changes in pedagogy. Cyberinfrastructure leveraging these technological advances can yield improvements in both instruction and learning, supporting a networked curricular model, facilitating collaboration within and among groups of students and instructors, and providing continuous access to instructional material. The trajectory followed by each student through the curriculum can be intelligently personalized, based on prior knowledge and skills, learning styles, and interests of the student, among other attributes. We propose to achieve these objectives by developing Pervasive Cyberinfrastructure for Personalized Learning and Instructional Support (PERCEPOLIS), which serves as the centerpiece of an experiment to create a community of faculty and students over a set of campuses, focusing on STEM disciplines. While numerous distance learning methods exist, we believe that the best way to provide STEM education is to use a blended approach - one that embraces both online components and classroom mentoring by qualified faculty members. The goal is to provide high-quality STEM education for the students, while raising the skill set of the entire community through teaching collaboration.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127419425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy settings from contextual attributes: A case study using Google Buzz 基于上下文属性的隐私设置:使用Google Buzz的案例研究
D. Mashima, Prateek Sarkar, E. Shi, Chris Li, Richard Chow, D. Song
{"title":"Privacy settings from contextual attributes: A case study using Google Buzz","authors":"D. Mashima, Prateek Sarkar, E. Shi, Chris Li, Richard Chow, D. Song","doi":"10.1109/PERCOMW.2011.5766879","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766879","url":null,"abstract":"Social networks provide users with privacy settings to control what information is shared with connections and other users. In this paper, we analyze factors influencing changes in privacy-related settings in the Google Buzz social network. Specifically, we show statistics on contextual data related to privacy settings that are derived from crawled datasets and analyze the characteristics of users who changed their privacy settings. We also investigate potential neighboring effects among such users.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116940816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improving pervasive positioning through three-tier cyber foraging 通过三层网络觅食改善无处不在的定位
M. D. Kristensen, M. Kjærgaard, Thomas Toftkjær, S. Bhattacharya, P. Nurmi
{"title":"Improving pervasive positioning through three-tier cyber foraging","authors":"M. D. Kristensen, M. Kjærgaard, Thomas Toftkjær, S. Bhattacharya, P. Nurmi","doi":"10.1109/PERCOMW.2011.5766855","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766855","url":null,"abstract":"Cyber foraging is a pervasive computing technique where small, mobile devices offload resource intensive work to stronger, nearby surrogate computers in order to preserve energy and achieve better performance. The problem with relying only on local resources is, that the availability of such resources may be scarce in many environments. In this paper we therefore argue that a third tier should be added when considering cyber foraging; namely cloud computing. By considering the local device, nearby surrogates, and the cloud when scheduling, the mobile device may be able to continue using remote resources even when such resources are not available in its vicinity. An important challenge of pervasive computing is estimating the physical position of mobile devices. As the requirements increase for continuous and accurate positioning so does the computational requirements of positioning—even limiting the possible accuracy in many cases. In this paper we describe how a three tier cyber foraging approach can help improve the positioning capabilities of mobile devices. We demonstrate initial results for how such an approach applies to particle filtering-based GSM positioning.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detecting faulty wireless sensor nodes through Stochastic classification 随机分类检测故障无线传感器节点
A. Farruggia, G. Re, M. Ortolani
{"title":"Detecting faulty wireless sensor nodes through Stochastic classification","authors":"A. Farruggia, G. Re, M. Ortolani","doi":"10.1109/PERCOMW.2011.5766858","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766858","url":null,"abstract":"In many distributed systems, the possibility to adapt the behavior of the involved resources in response to unforeseen failures is an important requirement in order to significantly reduce the costs of management. Autonomous detection of faulty entities, however, is often a challenging task, especially when no direct human intervention is possible, as is the case for many scenarios involving Wireless Sensor Networks (WSNs), which usually operate in inaccessible and hostile environments. This paper presents an unsupervised approach for identifying faulty sensor nodes within a WSN. The proposed algorithm uses a probabilistic approach based on Markov Random Fields, requiring exclusively an analysis of the sensor readings, thus avoiding additional control overhead. In particular, abnormal behavior of a sensor node will be inferred by analyzing the spatiotemporal correlation of its data with respect to its neighborhood. The algorithm is tested on a public dataset, over which different classes of faults were artificially superimposed.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123341997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cloud computing oriented network operating system and service platform 面向云计算的网络操作系统和服务平台
Jianwei Yin, Yanming Ye, Bin Wu, Zuoning Chen
{"title":"Cloud computing oriented network operating system and service platform","authors":"Jianwei Yin, Yanming Ye, Bin Wu, Zuoning Chen","doi":"10.1109/PERCOMW.2011.5766851","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766851","url":null,"abstract":"In recent years, cloud computing sweeps the world and becomes the new direction for future network applications. The traditional operating systems lack constructivity and evolvability, support less for the application perception and multi-core platform so that they cannot satisfy the requirements of cloud computing applications well. So the development of next-generation cloud-oriented network operating system is very significant. In this position paper, we first explained the background of the new network operating system. Then we listed some existing cloud computing operating systems. After describing the challenges that the project meets, we proposed the prototype architecture. We also discussed some key technologies and elaborated the expected typical scenario of developing and deploying applications in the proposed system.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115283105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Distributed context-aware visualization 分布式上下文感知可视化
H. Sanftmann, N. Cipriani, D. Weiskopf
{"title":"Distributed context-aware visualization","authors":"H. Sanftmann, N. Cipriani, D. Weiskopf","doi":"10.1109/PERCOMW.2011.5766878","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766878","url":null,"abstract":"We present a visualization framework integrated in a context-aware system that uses a common underlying stream processing middleware for tight integration of data accessing, processing, and visualization. Context-aware systems are often realized on mobile devices that do not have the computational power to perform complex tasks. Therefore, a dedicated hardware infrastructure might be required for data processing. In our case, stream processing is used, supporting parallelism on distributed and shared memory multiprocessors. We present the integration of visualization modules into a Java-based stream processing framework for context-aware systems, with focus on efficient communication and parallelization. Our approach is demonstrated for the example of a flow visualization scenario.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125096358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed object tracking with robot and disjoint camera networks 基于机器人和分离摄像机网络的分布式目标跟踪
Junbin Liu, T. Wark, Steven Martin, Peter Corke, Matthew J. A. D'Souza
{"title":"Distributed object tracking with robot and disjoint camera networks","authors":"Junbin Liu, T. Wark, Steven Martin, Peter Corke, Matthew J. A. D'Souza","doi":"10.1109/PERCOMW.2011.5766911","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766911","url":null,"abstract":"We describe a novel two stage approach to object localization and tracking using a network of wireless cameras and a mobile robot. In the first stage, a robot travels through the camera network while updating its position in a global coordinate frame which it broadcasts to the cameras. The cameras use this information, along with image plane location of the robot, to compute a mapping from their image planes to the global coordinate frame. This is combined with an occupancy map generated by the robot during the mapping process to track the objects. We present results with a nine node indoor camera network to demonstrate that this approach is feasible and offers acceptable level of accuracy in terms of object locations.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133362360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementing powerful Web Services for highly resource-constrained devices 为资源高度受限的设备实现强大的Web服务
C. Lerche, Nico Laum, Guido Moritz, E. Zeeb, F. Golatowski, D. Timmermann
{"title":"Implementing powerful Web Services for highly resource-constrained devices","authors":"C. Lerche, Nico Laum, Guido Moritz, E. Zeeb, F. Golatowski, D. Timmermann","doi":"10.1109/PERCOMW.2011.5766899","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766899","url":null,"abstract":"Web Service technologies are state of the art in current enterprise distributed applications. To integrate highly resource-constrained devices, such as sensor nodes, into enterprise applications via Web Services, gateways are commonly used. Our aim was to investigate the intermediate, homogeneous communication between enterprise applications and highly resource-constrained devices. We therefore present the prototype implementation of an embedded enterprise compatible W3C Web Service solution. Furthermore, we give an evaluation of memory requirements and a timing analysis for a representative platform with 48 KiB of ROM, 10 KiB of RAM and IEEE 802.15.4 radio. As the prototype implementation requires only 8:5 KiB of ROM and 3 KiB of RAM, our results claim that enterprise Web Services, despite of prevailing assumptions, are feasible in this context.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
A ubiquitous activity-monitor to prevent sedentariness 一个无处不在的活动监视器,防止久坐不动
Josué Iglesias, Jesús Cano, A. Bernardos, J. Casar
{"title":"A ubiquitous activity-monitor to prevent sedentariness","authors":"Josué Iglesias, Jesús Cano, A. Bernardos, J. Casar","doi":"10.1109/PERCOMW.2011.5766894","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766894","url":null,"abstract":"The Activity Monitor described in this paper is an easy-to-configure context-aware mobile application, capable of estimating and evaluating the user's activity all day long. It relies on fusion strategies for movement and location estimation, which combine acceleration and radio data from in-device and external sensors. The final objective of the Activity Monitor is to deliver adequate context-aware notifications in order to make the user aware of his level of activity. The reasoning process to decide when and how to deliver notifications is fully done in the mobile device by using an embedded reasoner, avoiding privacy issues related to personal sensitive data sharing.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Loss Minimization in adapter chaining for mobile ubiquitous computing environments 移动普适计算环境下适配器链中的损耗最小化
Byoungoh Kim
{"title":"A Loss Minimization in adapter chaining for mobile ubiquitous computing environments","authors":"Byoungoh Kim","doi":"10.1109/PERCOMW.2011.5766919","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766919","url":null,"abstract":"In ubiquitous computing environments, users' devices collaborate and interact with surrounding devices to achieve a defined goal. However, there are cases in which those interactions and collaborations cannot be achieved due to incompatibilities among services installed on the involved devices. Existing approaches propose a way to handle the interoperability problems with composition of adapters. Nevertheless this is not a complete or applicable solution due to the existence of adaptation loss. As an alternative, we propose a Loss Minimization Scheme to support users' interaction with a set of similar services using a single service client. The incompatibilities between client and services on a device are evaluated and resolved using adapters and/or a composition of them.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123795398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信