By Topic

Pervasive Services, 2006 ACS/IEEE International Conference on

Date 26-29 June 2006

Filter Results

Displaying Results 1 - 25 of 62
  • Proceedings for ICPS:2006 International Conference on Pervasive Services

    Publication Year: 2006 , Page(s): i - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (336 KB)  
    Freely Available from IEEE
  • Position/Tracking and Interfaces

    Publication Year: 2006 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (91 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking Nearest Surrounders in Moving Object Environments

    Publication Year: 2006 , Page(s): 3 - 12
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (396 KB) |  | HTML iconHTML  

    This paper presents a system framework to support continuous nearest surrounder (NS) queries in moving object environments. NS query finds the nearest objects at individual distinct angles from a query point. This query distinguishes itself from other conventional spatial queries such as range queries and nearest neighbor queries by considering both distance and angular aspects of objects with respect to a query point. One of NS query applications is to monitor the nearest objects around an observation point. In our framework, a centralized server is dedicated to collect object location updates, to determine affected NS queries of each object location update, to compute the incremental result change of affected queries and to deliver result updates to corresponding interested users/applications that initiate the queries. In particular, we propose algorithms namely, safe region formation and partial query evaluation, that can significantly improve the system performance. Through simulations, we validate our proposed algorithms over a wide range of settings View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crossmodal Attention in Public-Private Displays

    Publication Year: 2006 , Page(s): 13 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (696 KB) |  | HTML iconHTML  

    Striking a balance between the public visibility of a display, and the ease with which individuals have access to information, is a key challenge for the developers of interfaces to pervasive services. In this paper we utilize the cognitive phenomenon of crossmodal attention as a means of providing users with personalized cues to content on public displays. We describe two prototype applications that use crossmodal cues to temporally multiplex publicly visible information: CrossFlow, an ambient navigation system; and CrossBoard, a dense multiuser public information display. We outline the results of pilot preliminary user studies and describe the infrastructure required to support crossmodal displays View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Positioning Support in Pervasive Environments

    Publication Year: 2006 , Page(s): 19 - 26
    Cited by:  Papers (2)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (559 KB) |  | HTML iconHTML  

    In order to implement reactive and proactive functionalities in a pervasive environment, contextual data must be processed. One of the most important features of the context is the position of the users and the devices. In this paper, we describe a method to determine the position of a WiFi enabled device. The prediction is based on the signal strength of the available access points. The prediction model is built from a database containing the signal strength measured in some known locations. The result is the name of the room/office where the device is localised. We also present a usage scenario, in which the user/device position is used to start proactive actions in our pervasive service environment called PerSE View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environments

    Publication Year: 2006 , Page(s): 27 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (91 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COCOA : ConversationBased Service Composition for Pervasive Computing Environments

    Publication Year: 2006 , Page(s): 29 - 38
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (585 KB) |  | HTML iconHTML  

    Due to the large success of wireless networks and handheld devices, the pervasive computing paradigm is becoming a reality. One of the most challenging objectives to be achieved in pervasive computing environments is to assist users in realizing tasks anytime, anywhere, on the fly, by composing functionalities provided by the networked services of the pervasive computing environment. Towards this goal, we present COCOA, a conversation-based service composition middleware support for the dynamic composition of networked services in pervasive computing environments. Both networked services of the pervasive computing environment and user tasks are modeled as conversations using OWL-S. The distinctive feature of COCOA is then, the ability of integrating on the fly the conversations of networked services to realize the conversation of the user task. Thereby, COCOA allows the dynamic realization of user tasks according to the specifics of the pervasive computing environment in terms of available services and by enforcing valid service consumption View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Community Manager: A Dynamic Collaboration Solution on Heterogeneous Environment

    Publication Year: 2006 , Page(s): 39 - 46
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (862 KB) |  | HTML iconHTML  

    This paper suggests CM (community manager) as a dynamic and reflective collaboration solution which supports a seamless collaboration of services by adapting to the runtime environment. For the seamless and consistent collaboration service among the diverse middlewares, services and devices, service developers have to care about the latent complexity and troubles generated from integration into the execution environment. Whenever a service is designed, worrying about how to detect environment's context and how to adapt the runtime environment is so complex and redundant that the service model needs to be separated and abstracted from the runtime environment. And then service developers can focus on service logic development. As an abstract service model, we defined community model which defines the relationship of services and their action for collaboration and coordination and developed CM which interprets the model and transforms it into real execution model in physical space. CM consists of three core modules, which are community organizer, community executor and situation generator. Community organizer interprets the community model and manages interactions with user. Community executor binds the community model into runtime environment. Situation generator recognizes the environment and generates situation context. With the support of CM, the developers can describe easily a new collaboration service through defining a community without any consideration about complexity of its running environment or platform and the service providers can provide new or more complex service through adapting CM without cost for change for existing service interface, platform and environment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Model of Context-aware Service Provisioning Implemented on Smart Phones

    Publication Year: 2006 , Page(s): 47 - 56
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (382 KB) |  | HTML iconHTML  

    Mobile users of future ubiquitous environments require novel means for locating relevant services available in their daily surroundings, where relevance has a user-specific definition. In this paper, we propose the hybrid service provisioning model which complements the traditional model of interaction service provider to consumer with peer-to-peer functionalities. In addition to being notified proactively and in a context-aware manner about services available in the surroundings, users can generate several types of contextual messages, attach them to services or to the environment, and share them with other peers. We have designed and implemented a platform that supports this hybrid service provisioning model. The current application prototype runs on commercial smart phones. To demonstrate the feasibility and technical deployability of our approach, we conducted field trials in which the research subject was a community of recreational boaters View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for supporting Development and Execution of Context-Aware Component applications

    Publication Year: 2006 , Page(s): 57 - 66
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (599 KB) |  | HTML iconHTML  

    Context-awareness is rarely considered in component-based middleware. In this paper, we present CAMidO, a context-aware middleware based on an ontology meta-model. CAMidO, enables designers to create component-based context-aware applications. It provides an ontology meta-model for context description. The described information are used by the middleware to automatically adapt the application to relevant context-changes. Context-awareness is managed by component containers through nonfunctional properties. CAMidO manages all tasks related to context collection and application adaptation according to application designer description. Thus, it relieves application developers from programming these painful tasks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile

    Publication Year: 2006 , Page(s): 67 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (91 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Web Services using Mobile Agents and Ontologies

    Publication Year: 2006 , Page(s): 69 - 77
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (441 KB) |  | HTML iconHTML  

    We discuss the integration of two contemporary service technologies: Web services and mobile agents. We exploit the capabilities offered by mobile agents to query and invoke semantically enriched Web services without the need for simultaneous, online presence of the service requestor. Such service setting is ideal for wireless/mobile computing, where user terminals are not necessarily online during their entire session. To improve the capabilities of service registries met in the Web services reference architecture, we exploit the advantages of the semantic Web framework. Specifically, we use enhanced registries enriched with semantic information that provide semantic matching to service queries and published service descriptions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating and Supporting Dynamic Heterogeneous MAS

    Publication Year: 2006 , Page(s): 78 - 87
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    One of the grand challenges in agent technology research is quasi-automatic development of heterogeneous and dynamic multiagent systems using agent oriented software engineering (AOSE) tools. This paper presents an innovative approach to developing and supporting multiagent systems at run-time. Multiagent systems (MASs) can and should be generated dynamically based on high-level user specifications which are transformed into a mission. Dynamically generating agents could also be offered as a pervasive service. Heterogeneity of MASs refers to diverse functionality and constituency of the system which include mobile as well as host associated software agents. This paper proposes and demonstrates on-demand and just-in-time agent generation approach which is combined with run-time support for MASs. Run-time support is based on mission cost-efficiency and objectives which enable termination, generation, injection and replacement of software agents as the mission evolves. We present the formal underpinning of our approach and describe the prototype tool - called eHermes, which has been implemented using specific agent platforms. Lessons and results of testing eHermes are reported and analyzed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Agile Vertical Handoff Scheme for Heterogeneous Networks

    Publication Year: 2006 , Page(s): 88 - 97
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1709 KB) |  | HTML iconHTML  

    In this paper, on the basis of end-to-end principle, we propose a mobility management scheme to solve the NAT issue. Furthermore, since different communication technologies own different characteristics, during a vertical handoff, a well-behaved mobility management system should adapt an ongoing connection to different communication systems. In this paper, we also propose a handoff-aware TCP adaptation scheme, called CWND-restore. To verify the feasibility of our approach, we implement a prototype system on Linux. The experimental results show that our mobility management scheme can work under various mobility cases. Furthermore, our proposed CWND-restore scheme can offer higher TCP throughput during a vertical handoff. For example, the TCP throughput by proposed adaptation scheme is at most 2.3 times the original TCP View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing Reliability and Load Balancing in Home Link of Mobile IPv6 based Networks

    Publication Year: 2006 , Page(s): 98 - 108
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (767 KB) |  | HTML iconHTML  

    Mobile IPv6 provides support for multiple home agents on a single home link. This home link is single point of failure for mobile IPv6. Current specifications of mobile IPv6 does not provide solution to the home link failure problems. In this paper, we introduce "virtual home link" as an extension to mobile IPv6. It provides reliability and load balancing among the home links by introducing home link redundancy in the home network. It also provides solution to the home link failure problems. We present the results of several experiments to assess the performance of our solution. The results show that our solution provides transparent and home agent initiated home link failure detection, recovery and load balancing mechanisms. There is a significant reduction in message exchange over the air interface. Also, it provides high service availability in the upper layer applications. The home link failure recovery is fast and efficient. Moreover, there is reduced workload on the mobile node. Finally, the load balancing mechanism of our solution provides efficient, dynamic and transparent load balancing among multiple home links. Thus, our solution improves the overall mobile IPv6 and upper layer applications performance View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context I [breaker page]

    Publication Year: 2006 , Page(s): 109 - 110
    Save to Project icon | Request Permissions | PDF file iconPDF (91 KB)  
    Freely Available from IEEE
  • Modeling and Using Context in Adapting Applications to Pervasive Environments

    Publication Year: 2006 , Page(s): 111 - 120
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (597 KB) |  | HTML iconHTML  

    With an increasing diversity of pervasive computing devices integrated in our surroundings and increasing mobility of both users and hardware, it is important for computer systems and applications to be context-aware. Lots of works have already been done in this direction on how to capture context data and how to carry it to the application. Among the remaining challenges are to create the intelligence to analyze the context information and deduce the meaning out of it, and to integrate it into applications. Our work focuses on these challenges by defining generic context storage and processing model and studying its impact on the application core. We propose a reusable context ontology model that is based on two levels: a generic level and a domain specific level. We also propose an adaptation strategy to guarantee the adaptation of applications to context. Our case study shows that our context model and application adaptation strategies provide promising service architecture View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable Execution Control Method for Context-dependent Services

    Publication Year: 2006 , Page(s): 121 - 130
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (454 KB) |  | HTML iconHTML  

    We propose a scalable service execution control method for a service that is triggered when the context satisfies an execution condition. We call such services context-dependent. A context-dependent service needs to monitor the context that affects the execution condition all the time. The proposed method tremendously reduces the cost of context monitoring operations while it surely executes appropriate sendees when their execution conditions are satisfied. Our method assumes that there are a lot of terminals monitoring contexts and a server that collects context information from the terminals to manage sendee executions for a large number of sendees. Each context is modeled by a probabilistic time series, and thus, the probability that an execution condition is satisfied can be calculated at a given time. The time at which the execution condition is likely to be satisfied is anticipated, and the server instructs relevant terminals to monitor contexts and to send their values to it before the anticipated execution. The time to collect context values is decided by the server, which considers the effect of the statistical variance of each context on the probability of satisfying the execution condition. Moreover, each terminal monitors its context and notifies the server when its value is out of the designated range, even if this occurs before the time set by the server. The range of values is set by the server. We conducted simulation experiments that showed the effectiveness of the proposed method View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Situation Awareness: Dealing with Vague Context

    Publication Year: 2006 , Page(s): 131 - 140
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1043 KB) |  | HTML iconHTML  

    Situation awareness is considered as an approach to model user context in ubiquitous information services. Such services can intelligently infer knowledge about user situation. Moreover, situational reasoning is attained taking into consideration similarity-based approaches. This paper proposes approximate decision making about situational similarity using conceptual modelling, ontological representation, and, fuzzy logic inference View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context II [breaker page]

    Publication Year: 2006 , Page(s): 141 - 142
    Save to Project icon | Request Permissions | PDF file iconPDF (91 KB)  
    Freely Available from IEEE
  • Granular Best Match Algorithm for Context-Aware Computing Systems

    Publication Year: 2006 , Page(s): 143 - 149
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (320 KB) |  | HTML iconHTML  

    In order to be context-aware, a system or application should adapt its behavior according to current context, changing over time. Current context is acquired by some context provision mechanisms like sensors or other applications. After acquiring current context, this information should be matched against the previously defined context sets. In this paper, a granular best match algorithm dealing with the subjective, fuzzy, multi-granular and multi-dimensional characteristics of contextual information is introduced. The CAPRA - context-aware personal reminder agent tool is used to show the applicability of the new context matching algorithm. The obtained outputs showed that proposed algorithm produces the results which are more sensitive to the user's intention, and more adaptive to the aforementioned characteristics of the contextual information than the traditional exact match method View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-Aware Modelling and Distribution of Context Information in Pervasive Service Provision

    Publication Year: 2006 , Page(s): 150 - 160
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (495 KB) |  | HTML iconHTML  

    Context awareness is an essential cornerstone in future pervasive computing systems. It has the potential to greatly reduce the user attention and interaction bottlenecks, to give humans the impression that services fade into the background, and to support intelligent personalization features. Nevertheless, in order to create such an environment, a growing amount of personal information has to be provided to the system, either manually or automatically. Hence the digital trace and representation users have in the system is getting dangerously detailed, thus stressing the need for privacy protection. DAIDALOS (Satyanarayanan, 2001) is a European research project in the area of 3G and beyond, which aims to combine heterogeneous networks in a transparent and seamless way, and develop on top of this a pervasive environment for applications and end-users. This paper describes the main models and mechanisms that have been established to provide federated context-aware services and protect the privacy of their users View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security

    Publication Year: 2006 , Page(s): 161 - 162
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (91 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service Provisioning System for Distributed Personalization with Private Data Protection

    Publication Year: 2006 , Page(s): 163 - 172
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (548 KB) |  | HTML iconHTML  

    Personalized services can provide significant user benefits since they adapt their behavior to better support the user. Personalized services use a variety of data related to the user to decide their behavior. Thus personalized service needs a provisioning system that can collect the data that impacts service behavior and allows selection of the most appropriate service. However, in the coming ubiquitous environment, some data necessary for determining service behavior might be unavailable due to two possible reasons. One is that the data does not exit. The other is that the data exists but can not be accessed. For example, users do not want to disclose their personal information, and service providers do not also want to expose data related to their know-how in services. This paper describes a new service provisioning system for distributed personalization with private data protection. Specifically, the system selects applicable services by assessing how well each candidate service behaves when some data is missing. It then executes those selected services while hiding the users' and providers' private data in a distributed manner. We first summarize the requirements for a personalized service system, and introduce our fundamental policies for the system. The two main components of our system are then described in detail. One component is a service assessment mechanism that can judge if a service can work without data that can be used for adaptation. The second component is a service execution mechanism that can utilize private data while still ensuring privacy. This component divides service logic and executes divided logic where necessary data is available. The paper finally describes our prototype implementation and its performance evaluation results View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using A Two Dimensional Colorized Barcode Solution for Authentication in Pervasive Computing

    Publication Year: 2006 , Page(s): 173 - 180
    Cited by:  Papers (3)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (623 KB) |  | HTML iconHTML  

    The task of establishing secure communication in a wireless pervasive computing environment faces several challenges. One of the most critical is determining the authenticity of the parties wishing to communicate. An existing method of enabling authenticated key agreement involves using a two-dimensional visual code system with digital camera enabled devices as a way of demonstratively identifying entities. This paper seeks to extend that solution by colorizing the code system, thereby extending the amount of data which can be carried by a visual tag, and thus reducing the necessary size of such tags. This create images more easily recognized by the devices establishing secure communication in wireless pervasive computing environments. A detailed explanation of an implementation of this method is presented, along with performance evaluation and analysis View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.