By Topic

Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06)

Date 13-17 March 2006

Filter Results

Displaying Results 1 - 25 of 48
  • Proceedings. Fourth Annual IEEE International Conference on Pervasive Computing and Communications

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Fourth Annual IEEE International Conference on Pervasive Computing and Communications - Title Page

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Fourth Annual IEEE International Conference on Pervasive Computing and Communications - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Fourth Annual IEEE International Conference on Pervasive Computing and Communications - Table of contents

    Publication Year: 2006, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2006, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair and Vice Chairs

    Publication Year: 2006, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (42 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Program Committee Members

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • A keystroke and pointer control input interface for wearable computers

    Publication Year: 2006, Page(s):10 pp. - 11
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    The widespread adoption of mobile electronic devices and the advent of wearable computing have encouraged the development of compact alternatives to the keyboard and mouse. These include one-handed keyboards, digitizing tablets, and glove-based devices. This paper describes a combination pointer position and non-chorded keystroke input device that relies on miniature wrist-worn wireless video came... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cantag: an open source software toolkit for designing and deploying marker-based vision systems

    Publication Year: 2006, Page(s):10 pp. - 21
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    This paper presents Cantag, an open source software toolkit for building marker-based vision (MBV) systems that can identify and accurately locate printed markers in three dimensions. The extensibility of the system makes it ideal for dynamic location and poses determination in pervasive computing systems. Unlike prior MBV systems, Cantag supports multiple fiducial shapes, payload types, data size... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A collaborative Web browsing system for multiple mobile users

    Publication Year: 2006, Page(s):12 pp. - 35
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (893 KB) | HTML iconHTML

    In mobile computing environments, handheld devices with low functionality restrict the services provided for mobile users. We propose a new concept of collaborative browsing, where mobile users collaboratively browse Web pages designed for desktop PC. In collaborative browsing, a Web page is divided into multiple components, and each is distributed to a different device. In mobile computing enviro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Bluetooth connectivity with RFID

    Publication Year: 2006, Page(s):6 pp. - 41
    Cited by:  Papers (6)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    One of the challenges in pervasive computing is communication between a mobile user's terminal and the continuously changing local environment. Bluetooth is one potential option for providing connectivity, but its usage is hindered by the time consuming device discovery and service discovery processes. We propose using RFID technology to enhance the Bluetooth connection establishment procedure. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JiTS: just-in-time scheduling for real-time sensor data dissemination

    Publication Year: 2006, Page(s):5 pp. - 46
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    Most existing real-time protocols for sensor data dissemination use packet scheduling schemes to prioritize packets according to their deadlines. However, packet prioritization by itself cannot completely support real-time data dissemination requirements. In this paper, we propose new just-in-time scheduling (JiTS) algorithms that take advantage of the available slack, if any, to reduce contention... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application-based routing optimization in static/semi-static wireless sensor networks

    Publication Year: 2006, Page(s):5 pp. - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    This paper presents a power aware routing algorithm for WSN exploiting application features and the radio frequency map of the deployed sensors. The suggested methodology can be applied to applications requiring data acquisition from semi-static medium-size networks. The improvement over traditional routing solutions derives from the fact that routing paths and optimal transmission powers are iden... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A wearable wireless sensor platform for interactive dance performances

    Publication Year: 2006, Page(s):6 pp. - 59
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (661 KB) | HTML iconHTML

    This paper reports on recent development of a wearable wireless sensor platform for interactive dance performances. At a fraction of a cubic-centimeter in volume, this platform is truly wearable and scalable informing wireless networks. Integrated with a wide variety of different sensing devices, it is a real-time monitoring system for activities and physical conditions of the human body. The effe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dialing for displays: session initiation protocol for opportunistic augmentation

    Publication Year: 2006, Page(s):6 pp. - 65
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow a large display and keyboard from a desktop personal computer. This uniquely ubiquitous computing activity requires effective device and service discovery as well as appropriate media usable across two or more devices. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-user mobile applications and a public display: novel ways for social interaction

    Publication Year: 2006, Page(s):5 pp. - 70
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    In this paper we introduce prerequisites for the empowerment of social interaction when using a multi-user mobile service. The paper is based on a case study of user experiences of a multiplayer mobile game where the players attend the game via their mobile phones whilst their activity is materialized on a common public display. Based on the results of user evaluation we introduce three enabling f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inverted browser: a novel approach towards display symbiosis

    Publication Year: 2006, Page(s):6 pp. - 76
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    In this paper we introduce the inverted browser, a novel approach to enable mobile users to view content from their personal devices on public displays. The inverted browser is a network service to start and control a browser that is then used to view the content. In contrast to a traditional Web browser, which runs on the client device and pulls content from a server, content is pushed to the inv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Omero: ubiquitous user interfaces in the plan B operating system

    Publication Year: 2006, Page(s):5 pp. - 83
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3897 KB) | HTML iconHTML

    It is difficult to build user interfaces that must be distributed over a set of dynamic and heterogeneous I/O devices. This difficulty increases when we want to split, merge, replicate, and relocate the UI across a set of heterogeneous devices, without the application intervention. Furthermore, using generic tools, e.g. to search for UI components or to save/restore them, is usually not feasible. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context aware service using intra-body communication

    Publication Year: 2006, Page(s):8 pp. - 91
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1125 KB) | HTML iconHTML

    An intuitive context aware service between two devices is possible using touch with the direct digital intra-body communication. Using this technology, users with multimedia devices may simply touch them to establish network connection, transfer data, and provide the required service; hence the name touch-and-play (TAP). Using TAP, users can disclose their context by touching the specific device. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concept for hierarchical and distributed processing of area based triggers

    Publication Year: 2006, Page(s):11 pp. - 102
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Area based triggers denote notifications being generated if a mobile client changes its spatial relation to a defined area, e.g. if it enters or leaves it. By these triggers, new valuable services can be provided for mobile users. One of the main challenges is to design a suited approach for the computation of the triggers based on the defined areas and the current whereabouts of the mobile client... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual channel management for densely deployed IEEE 802.15.4 LR-WPANs

    Publication Year: 2006, Page(s):11 pp. - 115
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    The number of channels specified for IEEE 802.15.4 low-rate wireless personal area networks (LR-WPANs) is too few to operate many applications of WPANs in the same area. To overcome this limit, we introduce virtual channel, a novel concept to increase the number of available channels when various WPAN applications coexist. A virtual channel is basically created via superframe scheduling within the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive multi-constraint partitioning algorithm for offloading in pervasive systems

    Publication Year: 2006, Page(s):10 pp. - 125
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Offloading is a kind of mechanism utilized in pervasive systems to leverage the severity of resource constraints of mobile devices by migrating part of the classes of a pervasive service/application to some resource-rich nearby surrogates. A pervasive service application needs to be partitioned prior to offloading. Such partitioning algorithms play a critical role in a high-performance offloading ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plan B: an operating system for ubiquitous computing environments

    Publication Year: 2006, Page(s):10 pp. - 135
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8358 KB) | HTML iconHTML

    The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environments by exporting system resources through distributed virtual file systems. This requires no middleware, simplifies interoperation, and permits applying general purpose tools to any system resource. A constraint-based f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.