Billibon H. Yoshimi, Noi Sukaviriya, H. Derby, B. Carmeli, Brad Bolam, Jeff Elliott, Jim Morgan
{"title":"Lessons learned in deploying a wireless, intranet application on mobile devices","authors":"Billibon H. Yoshimi, Noi Sukaviriya, H. Derby, B. Carmeli, Brad Bolam, Jeff Elliott, Jim Morgan","doi":"10.1109/MCSA.2002.1017483","DOIUrl":"https://doi.org/10.1109/MCSA.2002.1017483","url":null,"abstract":"Wireless mobile applications provide a new set of design challenges for application designers. While many programmers are familiar with creating traditional desktop applications, they are not familiar with the challenges of the wireless mobile domain. Instead of having keyboards, mice, and high-resolution screens, the mobile application designer is constantly reminded that the handheld, mobile application is a very different (not deprived) input/output device. We describe our attempt to use these devices in creating a wireless corporate information application. The paper can be broken into several key efforts. First, we examine the hardware/networking requirements of the problem. Second, we examine our development environment for application coding and testing. Finally, we describe design issues encountered while developing applications for this environment.","PeriodicalId":419864,"journal":{"name":"Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115569494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks","authors":"Yih-Chun Hu, David B. Johnson, A. Perrig","doi":"10.1109/MCSA.2002.1017480","DOIUrl":"https://doi.org/10.1109/MCSA.2002.1017480","url":null,"abstract":"An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vector approaches, they have generally assumed a trusted environment. We design and evaluate the Secure Efficient Ad hoc Distance vector routing protocol (SEAD), a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector routing protocol (DSDV). In order to support use with nodes of limited CPU processing capability, and to guard against denial-of-service (DoS) attacks in which an attacker attempts to cause other nodes to consume excess network bandwidth or processing time, we use efficient one-way hash functions and do not use asymmetric cryptographic operations in the protocol. SEAD performs well over the range of scenarios we tested, and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node, even in spite of any active attackers or compromised nodes in the network.","PeriodicalId":419864,"journal":{"name":"Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131486526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The location stack: a layered model for location in ubiquitous computing","authors":"Jeffrey Hightower, B. Brumitt, G. Borriello","doi":"10.1109/MCSA.2002.1017482","DOIUrl":"https://doi.org/10.1109/MCSA.2002.1017482","url":null,"abstract":"Based on five design principles extracted from a survey of location systems, we present the location stack, a layered software engineering model for location in ubiquitous computing. Our model is similar in spirit to the seven-layer Open System Interconnect (OSI) model for computer networks. We map two existing ubiquitous computing systems to the model to illustrate the leverage the location stack provides. By encouraging system designers to think of their applications in this way, we hope to drive location-based computing toward a common vocabulary and standard infrastructure, permitting members of the ubiquitous computing community to easily evaluate and build on each other's work.","PeriodicalId":419864,"journal":{"name":"Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129067862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context aggregation and dissemination in ubiquitous computing systems","authors":"Guanling Chen, D. Kotz","doi":"10.1109/MCSA.2002.1017490","DOIUrl":"https://doi.org/10.1109/MCSA.2002.1017490","url":null,"abstract":"Many \"ubiquitous computing\" applications need a constant flow of information about their environment to be able to adapt to their changing context. To support these \"context-aware\" applications we propose a graph-based abstraction for collecting, aggregating, and disseminating context information. The abstraction models context information as events, produced by sources and flowing through a directed acyclic graph of event-processing operators, then delivered to subscribing applications. Applications describe their desired event stream as a tree of operators that aggregate low level context information published by existing sources into the high-level context information needed by the application. The operator graph is thus the dynamic combination of all applications' subscription trees. We motivate and describe our graph abstraction, and discuss a variety of critical design issues. We also sketch our Solar system, an implementation that represents one point in the design space for our graph abstraction, and present the specific choices made by Solar and how its future evolution will be guided by the design discussion.","PeriodicalId":419864,"journal":{"name":"Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User devices cooperating to support resource aggregation","authors":"Casey Carter, R. Kravets","doi":"10.1109/MCSA.2002.1017486","DOIUrl":"https://doi.org/10.1109/MCSA.2002.1017486","url":null,"abstract":"MOPED (MObile grouPEd Device) is a network model that treats a user's set of personal devices as a single, virtual device. The nodes of the MOPED dynamically aggregate available communication resources to provide the user with the best possible network service. We demonstrate MOPED's resource management capability with a short series of experiments that show how the MOPED paradigm enables effective group mobility.","PeriodicalId":419864,"journal":{"name":"Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet suspend/resume","authors":"M. Kozuch, M. Satyanarayanan","doi":"10.1109/MCSA.2002.1017484","DOIUrl":"https://doi.org/10.1109/MCSA.2002.1017484","url":null,"abstract":"We identify a new capability for mobile computing that mimics the opening and closing of a laptop, but avoids physical transport of hardware. Through rapid and easy personalization and depersonalization of anonymous hardware, a user is able to suspend work at one machine and to resume it at another. Our key insight is that this capability can be achieved by layering virtual machine technology on a distributed file system. We report on an initial implementation and describe our plans for improving efficiency, portability, and security.","PeriodicalId":419864,"journal":{"name":"Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications","volume":" 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132076168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting aggregate queries over ad-hoc wireless sensor networks","authors":"S. Madden, R. Szewczyk, M. Franklin, D. Culler","doi":"10.1109/MCSA.2002.1017485","DOIUrl":"https://doi.org/10.1109/MCSA.2002.1017485","url":null,"abstract":"We show how the database community's notion of a generic query interface for data aggregation can be applied to ad-hoc networks of sensor devices. As has been noted in the sensor network literature, aggregation is important as a data reduction tool; networking approaches, however, have focused on application specific solutions, whereas our in-network aggregation approach is driven by a general purpose, SQL-style interface that can execute queries over any type of sensor data while providing opportunities for significant optimization. We present a variety of techniques to improve the reliability and performance of our solution. We also show how grouped aggregates can be efficiently computed and offer a comparison to related systems and database projects.","PeriodicalId":419864,"journal":{"name":"Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116137396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hot-spot congestion relief in public-area wireless networks","authors":"Anand Balachandran, P. Bahl, G. Voelker","doi":"10.1109/MCSA.2002.1017487","DOIUrl":"https://doi.org/10.1109/MCSA.2002.1017487","url":null,"abstract":"Wireless LAN administrators are often called upon to deal with the problem of sporadic user congestion at certain popular spaces (\"hot-spots\") within the network. To address this problem, we describe and evaluate two new approaches, explicit channel switching and network-directed roaming for providing hot-spot congestion relief while maintaining pre-negotiated user bandwidth agreements with the network. The goals of these algorithms are: (i) to accommodate more users by dynamically providing capacity where it is needed, when it is needed; (ii) to improve overall network utilization by making more efficient use of deployed resources; and (iii) to guarantee at least a minimum amount of bandwidth to users. We propose that both the network and its users should explicitly and cooperatively adapt themselves to changing load conditions depending on their geographic location within the network. We describe how these algorithms enable the network to transparently adapt to user demands and balance load across its access points (APs). We evaluate the effectiveness of these algorithms on improving user service rates and network utilization using simulations. Our algorithms improve the degree of load balance in the system by over 30%, and user bandwidth allocation by up to 52% in comparison to existing schemes that offer little or no load balancing.","PeriodicalId":419864,"journal":{"name":"Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122643850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User interfaces for network services: what, from where, and how","authors":"S. Ponnekanti, Luis Alberto Robles, A. Fox","doi":"10.1109/MCSA.2002.1017493","DOIUrl":"https://doi.org/10.1109/MCSA.2002.1017493","url":null,"abstract":"An important problem in the context of network services in ubiquitous computing is the support of ad-hoc interaction. Ad-hoc interaction allows a user entering an environment to discover, request, and interact with user interfaces for the locally available network services, even if she has done minimal or no installation in advance. We observe that most recently-proposed ad-hoc interaction frameworks lack two important mechanisms: distribution and personalization. A distribution mechanism would make it easy to add third-party UIs and to centrally administer UIs across multiple independent workspaces forming an administrative or logical unit, such as all workspaces on a campus. A personalization mechanism would enable a user to see familiar UIs as she roams to different workspaces. We propose extensions to an existing ad-hoc interaction system, ICrafter, that enable these two independent behaviors. The mechanisms raise important policy questions; although we have not studied optimal policies, we outline the policy space and the policies we have adopted.","PeriodicalId":419864,"journal":{"name":"Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Cohen, H. Lei, Paul C. Castro, John S. Davis, A. Purakayastha
{"title":"Composing pervasive data using iQL","authors":"N. Cohen, H. Lei, Paul C. Castro, John S. Davis, A. Purakayastha","doi":"10.1109/MCSA.2002.1017489","DOIUrl":"https://doi.org/10.1109/MCSA.2002.1017489","url":null,"abstract":"The emergence of pervasive networked data sources, such as Web services, sensors, and mobile devices, enables context-sensitive, mobile applications. We have developed a programming model for writing such applications, in which entities called composers accept data from one or more sources, and act as sources of higher-level data. We have defined and implemented a nonprocedural language, iQL, specifying the behavior of composers. An iQL programmer expresses requirements for data sources rather than identifying specific sources; a runtime system discovers appropriate data sources, binds to them, and rebinds when properties of data sources change. The language has powerful operators useful in composition, including operators to generate, filter, and abstract streams of values.","PeriodicalId":419864,"journal":{"name":"Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}