Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007. Fourth Annual International Conference on

Date 6-10 Aug. 2007

Filter Results

Displaying Results 1 - 25 of 103
  • Proceedings of The 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

    Publication Year: 2007 , Page(s): nil1
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2007 , Page(s): nil2
    Save to Project icon | Request Permissions | PDF file iconPDF (58 KB)  
    Freely Available from IEEE
  • MobiQuitous 2007 Messages from the General Chair

    Publication Year: 2007 , Page(s): nil3
    Save to Project icon | Request Permissions | PDF file iconPDF (63 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • MobiQuitous 2007 Messages from the Program Committee Chairs

    Publication Year: 2007 , Page(s): nil4 - nil5
    Save to Project icon | Request Permissions | PDF file iconPDF (71 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2007 , Page(s): nil6
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007 , Page(s): nil7
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2007 , Page(s): nil8 - nil9
    Save to Project icon | Request Permissions | PDF file iconPDF (62 KB)  
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2007 , Page(s): nil10
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • Musicology: Bringing Personal Music into Shared Spaces

    Publication Year: 2007 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4030 KB) |  | HTML iconHTML  

    The Musicology project examines the user, ecosystem, and technology aspects necessary to enable playback of personal music in public spaces. User surveys, field interviews, and a technology prototype inform a discussion relating to privacy and identity, content control, and power consumption (among others). Understanding how mobile devices can be used to present personal content, initially with audio but eventually through photographs and other media, has the potential to open up new avenues for personal expression, bringing the motivations behind online content sharing websites into a publicly social arena. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Large Surface Area Electronic Textiles for Ubiquitous Computing: A System Approach

    Publication Year: 2007 , Page(s): 1 - 8
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (808 KB) |  | HTML iconHTML  

    Electronic textile research often centers on the concept of introducing electronics to apparel such as shirts jackets, gloves, and health vests. Another less researched concept incorporates electronics into large textile surfaces such as carpets and upholstery. In this paper we explore methods and challenges of building a large surface area electronic textile floor for cooperative mobile device interaction. We systematically construct both a 100 ft by 50 ft textile simulation and a 3 ft by 8 ft working prototype using readily available materials. We introduce the broadly applicable embedded workload of human gait tracking as a means to defining the requirements for the textile physicals, networked computing node, and distributed execution environment subsystems. Through this effort we begin to establish a working model for combining inexpensive electronic textiles with a scalable execution environment that supports mobile device to floor interactions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Wireless Sensor Network and Incident Command Interface for Urban Firefighting

    Publication Year: 2007 , Page(s): 1 - 7
    Cited by:  Papers (13)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1405 KB) |  | HTML iconHTML  

    The Fire Information and Rescue Equipment project at UC Berkeley has developed a prototype wireless sensor network (WSN) and Incident Command (IC) interface for urban and industrial firefighting and emergency response. A fixed WSN deployment in the building acts as a backbone for communication between mobile personnel and Incident Command. The Telos Sky mote 802.15.4 platform with the TinyOS operating system is used for a variety of sensing and communication tasks. These include localization, environmental monitoring, and redundant emergency communications. We describe features and performance of the system. We also share what we have learned from firefighters through interviews, usability tests, and demonstrations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bypassing Bluetooth Device Discovery Using a Multimodal User Interface

    Publication Year: 2007 , Page(s): 1 - 9
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3145 KB) |  | HTML iconHTML  

    A fixed Bluetooth transmitter can offer mobile services to people in proximity. However, the Bluetooth device discovery process introduces a significant delay, which impacts usability. A number of solutions have been proposed for bypassing device discovery; in this paper we propose a new technique leveraging multimodal user interfaces. In our approach, someone coming into range of proximity-based services reads a sign listing their names. The person starts a multimodal service browser, and speaks the name of a service. This name, plus the current location (e.g., at the granularity of the current cell tower identifier), is mapped into a Bluetooth address and an optional service identifier. The service browser then connects directly to the transmitter and service. We implemented this approach on handsets connecting into a commercial voice server over a 2G data network. The server-side Bluetooth service directory consisted of 5,727 unique service names. An experiment demonstrated a very good speech recognition rate, and confirmed that the overall time savings were equivalent to other techniques for bypassing Bluetooth device discovery. The multimodal approach also has significant cost and usability advantages. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2007 , Page(s): nil11
    Save to Project icon | Request Permissions | PDF file iconPDF (33 KB)  
    Freely Available from IEEE
  • Improving Wireless Positioning with Look-ahead Map-Matching

    Publication Year: 2007 , Page(s): 1 - 8
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1630 KB) |  | HTML iconHTML  

    Determining the location of mobile devices is a necessary system function for a growing number of location based services (LBS). The most popular method for location determination is GPS, however GPS has known accuracy and environmental limitations, many of which are exacerbated in dense urban areas. Wireless positioning systems (WPS) on the other hand, demonstrate location accuracy largely inverted to that of GPS - the denser the urban setting, the more accurate the location estimation is in general. Large-scale WPS differs from satellite based positioning in at least two aspects; first, wireless positioning systems typically derive their location estimates based on observed beacon locations such as through wardriving, and second WPS lacks a mechanism to maintain highly synchronized clocks. This results in lower accuracy and a lower confidence factor in the use of wireless positioning. This paper presents a location estimation method that improves location accuracy for WPS through the use of digital map-matching of wardriving data. We have conducted initial experiments to evaluate our map-matching algorithm along with the enhanced location estimation approach and demonstrate its effectiveness for measuring and improving the accuracy of large-scale wireless positioning systems. We demonstrate extensions to a look-ahead map-matching algorithm to improve the accuracy and motivate further research in the area of large-scale map matching. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient Tracking of Mobile Objects with Early Distance-based Reporting

    Publication Year: 2007 , Page(s): 1 - 8
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1363 KB) |  | HTML iconHTML  

    Many location-based systems rely on fine-grained tracking of mobile objects that determine their own locations with sensing devices like GPS receivers. For these objects, energy is a very valuable and limited resource. A distance-based reporting protocol can be employed to reduce the energy they consume by sending position updates. However, the energy required for position sensing has not been considered in the past. In this paper, we study how the resulting energy consumption from both sensing and update operations can be reduced for distance-based reporting. We show that significant savings are achieved by sending position updates earlier than actually required. For uniform movement, we derive the minimal power consumption analytically. Subsequently, two novel online heuristics are proposed that control the sending of position updates at runtime. Their effectiveness is validated by extensive simulations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining GPS and GSM Cell-ID positioning for Proactive Location-based Services

    Publication Year: 2007 , Page(s): 1 - 7
    Cited by:  Papers (5)  |  Patents (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (424 KB) |  | HTML iconHTML  

    Mobile terminals with built-in GPS receivers are becoming more and more available, thus the public deployment of location-based services (LBS) becomes feasible. Upcoming LBS are no longer only reactive but getting more and more proactive, enabling the users to subscribe for certain events and get notified when e.g. a friend approaches or a point of interest comes within proximity. However, power consumption for continuous tracking is still a mayor issue with mobile terminals. In this paper we define this problem and propose solutions for an energy- efficient combination of GPS and GSM Cell-ID positioning for mobile terminals. We introduce several strategies for extending the lifetime of the battery and show how these strategies can be integrated into existing middleware solutions. Simulations based on a realistic proactive multi-user context confirm the approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Battery-Aware Embedded GPS Receiver Node

    Publication Year: 2007 , Page(s): 1 - 6
    Cited by:  Papers (4)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1175 KB) |  | HTML iconHTML  

    This paper discusses the design and implementation of an ultra low power embedded GPS receiver node for use in remote monitoring situations where battery life is of the utmost importance. The power consumed by a GPS radio is high when compared to other typical components of sensor networks. We offer several hardware and software solutions to prolong the battery life while preserving a required GPS tracking precision. A standard SiRF trickle mode, available on some of the latest chipsets switches between the full power and a single fixed duty cycle. If the fixed duty cycle is set too low, trickle mode causes too many signal drops; if set too high, consumes too much energy. Adding a low-power microcontroller allows us to dynamically change the operation mode by setting the duty cycle in relatively small steps, based on a set of less stringent and application dependant set of rules. In addition, an accelerometer is used as an energy efficient way of detecting that the object or person carrying the GPS is not moving. This allows the GPS-equipped node to switch to the lowest possible power consumption mode that still allows for fast restarts. Several hardware and software design aspects are explored and several measurements comparing system performance to commercially available products are shown to illustrate the effectiveness of the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2007 , Page(s): nil12
    Save to Project icon | Request Permissions | PDF file iconPDF (32 KB)  
    Freely Available from IEEE
  • Poster: Scalable Service-Oriented Telemetry Acquisition and Distribution

    Publication Year: 2007 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (275 KB) |  | HTML iconHTML  

    As the cost of embedded devices, sensors, and wireless networking decreases, the economic viability of intelligent services that sense conditions in the physical world and trigger responses to them becomes increasingly attractive. Sensor networks for environmental monitoring and an urban area's population of trucks and automobiles are examples of existing physical infrastructures that can be supported by such services. We have developed a services-oriented, specification-based, ubiquitous computing platform called TOPAZ that abstracts common ubiquitous computing functions and makes them accessible to any application provider through Web-service-based, metered interfaces. In this paper, we describe a scalable architecture of telemetry service that acquires, processes, and distributes telemetry data and analyze its performance results. Our results demonstrate that through intelligent aggregation of event streams and controlled object allocation schemes, it is possible to support high event rates using off-the-shelf Web application- server software and hardware. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A User-centered Approach to Context-awareness in Mobile Computing

    Publication Year: 2007 , Page(s): 1 - 3
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (238 KB) |  | HTML iconHTML  

    Context-aware computing is aimed to make mobile devices smarter by giving them the ability to recognize and interpret the surrounding environment and react proactively and intelligently. However, the development and deployment of context-aware mobile artifacts are still at their infancy, with few theories and little empirical evidence about how to develop an effective context-aware mobile application. In this article, we propose a user-centered approach for obtaining and parsing context, driven by users' context of interest that offers more interactive and construed context to users. We seek to reduce the complexity of the traditional sensor-based infrastructure context acquisition and interpretation, by leveraging the natural dialogue between the users and their mobile devices. Hence, emphasize the value of such dialogue over the users' ordinary situational- context to gradually build their own context and context- awareness profiles. We present a conceptual framework for our approach, and illustrate the usage of this framework through applied scenarios. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new Routing & Mobility Management Solution for Wireless Mesh Network

    Publication Year: 2007 , Page(s): 1 - 3
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1084 KB) |  | HTML iconHTML  

    In this paper we propose the Mobile Party protocol, a new scheme for mobility management in the context of mesh networks. While most of proposed solutions for mobility management issue are routing protocol-independent mechanisms, our proposal integrates routing and mobility management functionalities together in the same scheme. This enhances considerably the performance of our proposal as shown in this paper. Through simulations and performance studies, we demonstrate that the proposed scheme provides a viable solution for mobility and routing management, assuring scalability and seamless communications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Poster: P2P search routing concepts for mobile object tracking

    Publication Year: 2007 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (859 KB) |  | HTML iconHTML  

    Mobile object tracking is the process of tracking objects which are moving constantly in their environment and thus change their location and context. We present in this paper a decentralized data management solution based on peer-to-peer (P2P) concepts and in particular a distributed hash table (DHT). Sensor network nodes run a DHT system, to which tracked objects or sensors insert their data about the objects. This distributed data storage can be queried by the application according to the DHT principles in order to retrieve the current status of an object without stability or bottleneck problems. Moreover, for scalability, our concept comprises a two tier architecture where we separate local tracking systems, which deal with frequent updates in a constrained local environment, and global tracking. In this way a second tier DHT based P2P system interconnects all local P2P systems for a global query resolution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight and Distributed Algorithms for Efficient Data-Centric Storage in Sensor Networks

    Publication Year: 2007 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1615 KB) |  | HTML iconHTML  

    In this paper we propose two algorithms for efficient data-centric storage in wireless sensor networks without the support of any location information system. These algorithms are intended to be applied in environments with large number of sensors where the scalability of the network has great issue. During the first algorithm, each sensor obtains a unique temporary address according to its current relative location in the network. The second algorithm is used to route data from one sensor to another, this routing algorithm only depends on the sensor's neighborhood, i.e. in order to implement the routing table each sensor needs only to exchange local information with its first hop neighbors. The forwarding process used in this algorithm resembles the one found in Pastry peer-to-peer protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Trustworthy Authentication for Pervasive Computing

    Publication Year: 2007 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (262 KB) |  | HTML iconHTML  

    Conventional entity authentication is not enough to build a secure pervasive computing environment. Being sure that you are talking to the expected entity does not guarantee it is going to do what you expect him to do, and only that. This paper introduces a concept of "trustworthy authentication" in pervasive computing which is defined as entity authentication accompanied by an assurance of trustworthy behaviour of the authenticated entity. It discusses how to provide trustworthy authentication in pervasive computing using the example of a roaming customer wishing to print his email on a public printer. A two-level hierarchical trustworthy authentication scheme is proposed where local and higher-level authorization servers issue trustworthiness certificates after receiving trustworthiness records from the printer, signed by its users. The proposed scheme may be generalized for trustworthy authentication of security devices such as firewalls. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demo: Sensor Relocation with Mobile Sensors

    Publication Year: 2007 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1315 KB) |  | HTML iconHTML  

    Mobile sensors are useful in many environments because they can move to increase the sensing coverage. In this paper, we present a mobile sensor prototype in which the Mica2 sensor node is used to control the movement of the robot built with commercial off-the-shelf (COTS) components. We use a sensor relocation application to demonstrate the feasibility of our design. In the sensor relocation application, after a sensor node failure creates a coverage hole, a mobile sensor node is relocated to cover the hole in a timely and energy-efficient way. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.