By Topic

Intelligent Pervasive Computing, 2007. IPC. The 2007 International Conference on

Date 11-13 Oct. 2007

Filter Results

Displaying Results 1 - 25 of 120
  • The 2007 International Conference on Intelligent Pervasive Computing - Cover

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (238 KB)  
    Freely Available from IEEE
  • The 2007 International Conference on Intelligent Pervasive Computing - Title page

    Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (39 KB)  
    Freely Available from IEEE
  • The 2007 International Conference on Intelligent Pervasive Computing - Copyright

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • The 2007 International Conference on Intelligent Pervasive Computing - Table of contents

    Page(s): v - x
    Save to Project icon | Request Permissions | PDF file iconPDF (145 KB)  
    Freely Available from IEEE
  • Welcome Message from the IPC 2007 General Chairs

    Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (35 KB)  
    Freely Available from IEEE
  • Welcome Message from the IPC 2007 Program Chairs

    Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (28 KB)  
    Freely Available from IEEE
  • Welcome Message from the IPC 2007 Workshop Co-Chairs

    Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (38 KB)  
    Freely Available from IEEE
  • Welcome Message from the IUCE 2007 Workshop Co-Chairs

    Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • Welcome Message from the IHS 2007 Workshop Co-Chairs

    Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (33 KB)  
    Freely Available from IEEE
  • Welcome Message from the IPM/ESA/RFID 2007 Workshop Co-Chairs

    Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (48 KB)  
    Freely Available from IEEE
  • Program Committee

    Page(s): xx
    Save to Project icon | Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • An Improvement on Authenticated Key Agreement Scheme

    Page(s): 3 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (91 KB) |  | HTML iconHTML  

    Over the insecure network environment, key agreement is essential for protecting the messages exchanged between two communication parties. And to achieve high security requirements, key agreement schemes providing mutual authentication are commonly used in modern information security systems. In 2005, Lee and Lee proposed a novel authentication with key agreement scheme. But we find that Lee-Lee's scheme is vulnerable to an off-line password guessing attack. In this paper, we describe the weakness of Lee-Lee's scheme and also propose an improved scheme with better security strength. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reliable and Configurable E-commerce Mechanism Based on Mobile Agents in Mobile Wireless Environments

    Page(s): 7 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (229 KB) |  | HTML iconHTML  

    Because of the limited capability of mobile devices and lower bandwidth of wireless network, web-based e-commerce in mobile wireless environments suffers more challenges and it needs an efficient and reliable mechanism to support the process. This paper presents a flexible and configurable mechanism, which uses mobile agents as brokers of mobile device to communicate with Web server, thus to reduce the unnecessary wireless communication costs of mobile client. It can also facilitate mobile device recovery back when suffering a failure to increase the reliability of the whole application process. Compared with other mechanisms through performance analysis, our mechanism shows its efficiency and reliability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Personalized Semantic Search Method for Intelligent e-Learning

    Page(s): 11 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (243 KB) |  | HTML iconHTML  

    In intelligent e-Learning, personalized search support becomes even more and more important now. This paper shows how to achieve the personalized search in e-learning environments. We present a semantic-based search method for personalized e- Learning. In the method, learning resources ontology and learner ontology are designed for semantic analysis and algorithm for ontology learning. The method is applied in an e-learning system and evaluated by some users. The result shows that the personalized semantic search method can improve the precision and recall of learning resources retrieval effectively in e-learning system, and can provide more intelligent e-learning services for the learners. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive Computing in Analysis of 2D/3D Medical Images

    Page(s): 15 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (374 KB) |  | HTML iconHTML  

    This paper will present some possibilities of appli- cation of mathematical linguistic formalisms, in the form of structural pattern recognition, in development a new class of intelligent medical diagnosis-support and image recognition systems. Such methods are aimed to facilitate a semantic analysis of the meaning for some selected medical patterns, especially in the form of 2D spinal cord and leg fracture visualization, and 3D CT coronary arteries reconstructions. The procedures proposed are based on the cognitive reso- nance and categorization model. The application presented in this paper will show the great possibilities of automatic lesion detection in the analysed structures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Intra MB Mode Decision Method for the MPEG-2 to H.264 Transcoder

    Page(s): 19 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    In this paper we propose an Intra mode decision method for the MPEG-2 to H.264/AVC transcoders to reduce the huge computational complexity. The DCT coefficients from the MPEG-2 decoder are used for the intra mode decision of H.264/AVC encoder. Based on the spatial activity analysis with the coefficients, early mode decision method between Intra16x16 and Intra4x4 modes and the Intra prediction direction are proposed. The empirical results show that the proposed method reduces about 70% computational complexity reduction compared with conventional method at the slight reduction in PSNR. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Intrusion Detection in Wireless Sensor Networks

    Page(s): 23 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (314 KB) |  | HTML iconHTML  

    Security is a significant concern for many sensor network applications. Intrusion detection is one method of defending against attacks. However, standard intrusion detection is not suitable for sensor networks with limited battery power, memory and processing resources. This paper compares several approaches to intrusion detection in sensor networks. We investigate accuracy of detection of attacks versus energy efficiency. Existing solutions are compared with a new adaptive protocol for distributed defense View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing Polynomial Regression Complexity for Data Anonymization

    Page(s): 29 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (318 KB) |  | HTML iconHTML  

    Pervasive computing and the increasing networking needs usually demand from publishing data without revealing sensible information. Among several data protection methods proposed in the literature, those based on linear regression are widely used for numerical data. However, no attempts have been made to study the effect of using more complex polynomial regression methods. In this paper, we present PoROP-k, a family of anonymizing methods able to protect a data set using polynomial regressions. We show that PoROP-k not only reduces the loss of information, but it also obtains a better level of protection compared to previous proposals based on linear regressions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Target Coverage With QoS Requirements in Wireless Sensor Networks

    Page(s): 35 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (173 KB) |  | HTML iconHTML  

    It has been a challenging problem to support target coverage with QoS requirements in wireless sensor networks, because we need to consider both energy constraint and so-called target Q-coverage requirement, i.e. different targets may require different sensing quality in terms of the number of transducers, data sampling rate, etc. First we prove that this problem is NP- complete, then we formulate the optimization using Linear Programming techniques, however, directly solving this optimization seems desperately complex due to the combinatorial complexity. Thus a column generation based approach is developed to solve this problem by decomposing the original problem into a master problem as well as a corresponding sub problem and solves them iteratively. Numerical results are given to verify our approach and gain some insights into the performance aspects in designing such surveillance systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rapid Development Approach for Signal Strength Based Location Systems

    Page(s): 39 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (551 KB) |  | HTML iconHTML  

    Location systems are core technologies for enabling pervasive computing smart spaces. Signal strength based location estimation offers economical viability and sufficient accuracy for numerous location based services. Despite extensive research being carried out in this positioning method, tedious and lengthy development life cycle prohibits wide scale deployment of these systems. We present a new approach based on online machine learning paradigm which significantly reduces the development time. Besides rapid development of location systems this approach shows competitive location accuracy and allows incremental expansion of location system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leakage Current Reduction in Data Caches on Embedded Systems

    Page(s): 45 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (303 KB) |  | HTML iconHTML  

    Nowadays, embedded systems can be found in a wide range of pervasive devices (e.g., smart phones, PDAs, or video/digital cameras). These devices contain large cache memories, whose power consumption can reach about 50% of the total spent energy, from which leakage energy is the predominant fraction in current technologies. This paper proposes a technique to reduce leakage energy consumption in data caches on embedded systems, which is based on the fact that most stored bits take a logical value of zero. The proposed technique has been evaluated on a model of a contemporary high-end embedded microprocessor, namely the ARM Cortex A8 processor, executing a set of standard embedded benchmarks. Experimental results show that leakage energy savings reach about 40% with no IPC loss. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context-Aware Access Control Model for Pervasive Computing Environments

    Page(s): 51 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (238 KB) |  | HTML iconHTML  

    In pervasive computing environments, a user can access resources and services from any where and at any time; thus a key security challenge in these environments is the design of an effective access control model which is aware of context modifications. Changes in context may trigger changes in authorizations. In this paper, we propose a new context-aware access control model based on role-based access control model for pervasive computing environments. We assign roles to users dynamically based on the long-term context information and tune active role's permissions according to the short-term context information of the users and environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ventricular Arrhythmia Nonlinear Analysis

    Page(s): 57 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    This paper presents a new nonlinear method to analyse ventricular arrhythmia (ventricular flutter (VFL), ventricular fibrillation(VF) and ventricular tachycardia(VT)) mixed in sinus rhythms(SR) from the raw electrocardiogram (ECG) data. The method has a three step processing. First, calculating the slope of permutation entropy (PE) to detect the onset of ventricular arrhythmia; Second, using regularization dimension(RD) to classify SR, VFL and VT/VF; Finally, according to multifractal spectrum(MS) area to distinguish VT and VF. Four databases are used to detect the method, and the accuracy of every step is 93.33%, 100% and 98% As a whole, the accuracy of detecting onset of ventricular arrhythmia and confirming which ventricular arrhythmia is, is VFL 93.33%, VT and VF 91.47%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Tolerance Relation-Based Image Representation and Classification

    Page(s): 62 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (334 KB) |  | HTML iconHTML  

    The nature of the concepts regarding images in many domains are imprecise, and the interpretation of finding similar images is also ambiguous and subjective on the level of human perception. To solve these problems, in this paper, images' semantic categories and the tolerance degree between them are defined systematically, and the approach of modeling tolerance relations between the semantic classes is proposed. Furthermore, for removing the induced false tolerance in the produce of using semantic tolerance relation model, the method of un- tolerating is introduced in image representation. We apply the proposed approach to the representations of images regarding the nature vs. man-made domain, human vs. non-human domain, and temporal domain, and compare the categorization results of them with the results not using semantic tolerance relation model. The results show the effectiveness of proposed method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Leukocytes from In vivo Videos

    Page(s): 68 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (370 KB) |  | HTML iconHTML  

    Leukocyte migration is an important phenomenon in the inflammatory tissue. The migration process includes the rolling velocity decreasing and the leukocytes adhesion. However, the analysis of in vivo microscopy video is a labor-intensive and time consuming task. Several approaches have been proposed for tracking leukocyte movements. However, these approaches can either only track leukocytes that roll along the centerline of the blood vessel, or can only handle leukocytes with fixed morphologies. In addition, the camera/subject movement is a severe problem which occurs frequently while analyzing in vivo microscopy videos. In this paper, we proposed a new method for automatic recognition of non-adherent and adherent leukocytes. The experimental results demonstrate the effectiveness of the proposed method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.