By Topic

Ubiquitous, Autonomic and Trusted Computing, 2009. UIC-ATC '09. Symposia and Workshops on

Date 7-9 July 2009

Filter Results

Displaying Results 1 - 25 of 109
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2289 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Conference Information

    Publication Year: 2009, Page(s):xiv - xlvi
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • An Efficient Mechanism for Mobile Target Tracking in Grid-Based Wireless Sensor Networks

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    Wireless sensor networks (WSNs) is composed of sink and many sensor nodes. It has the great scope to monitor environment and the characteristics of wireless communications. Relatively, the advantages of sensor node bring themselves some restrictions. The greatest challenge among those is the constraints on energy. The most critical issue is how to minimize the energy consumption for keeping target... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Space Time Codes to Achieve Generalized Optimal Diversity for Higher Rate Wireless Networking

    Publication Year: 2009, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    In this paper, we propose some higher rate simple space time codes achieving the generalized optimal diversity for wireless networking. The proposed scheme is simply extended from some polyphase orthogonal patterns, which are adapted for any modulations without additional multiplications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biologically Inspired Ant-Based Routing in Mobile Ad hoc Networks (MANET): A Survey

    Publication Year: 2009, Page(s):12 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    This paper presents the state of the art in biologically inspired ant based routing in wireless mobile ad hoc networks (MANET). The motivation for using ant-like mobile agents for providing routing information to mobile hosts in MANETs stems from the fact that ant-like mobile agents do not require high bandwidth overhead compared to MANET proactive routing protocols for disseminating the topology ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Routing Algorithm Based on Mobile Agent for Mine Monitoring

    Publication Year: 2009, Page(s):16 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    The monitoring system in coal mine has special requirements for data query. Analysis shows that routing in the system should have four features: data-centric routing, supporting query of geographic position, low delay and high reliability of data transmission, robustness of topology. A mobile agent based routing algorithm with mobile sink and a dynamical weight metric which is derived from its cur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID-Based, Anonymous Authentication Scheme

    Publication Year: 2009, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5621 KB) | HTML iconHTML

    Low cost radio frequency identification (RFID) like EPC Gen 2 is one kind of most popular RFIDs in the market. However, as studied by several researchers, Gen 2 is not secure. Therefore, many researchers have devoted to improving the security. However, in addition to the fact the security of these improved schemes are still questionable, these solutions inevitably increase the cost of tags and ine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust in Distributed Small Sized Data Centers

    Publication Year: 2009, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Peer-to-peer (P2P) networks have large advantages over server-based solutions in terms of efficiency for bandwidth consumption and server workload. This is particularly relevant for the distribution of large volume content like multimedia data. This paper proposes a security architecture that provides essential security functionality for a platform enabling commercial P2P applications. One main ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of Trust Transitivity Taking Base Rate into Account

    Publication Year: 2009, Page(s):34 - 39
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Trust transitivity, as trust itself, is a human mental phenomenon, so there is no such thing as objective transitivity, and trust transitivity therefore lends itself to different interpretations. Trust transitivity and trust fusion both are important elements in computational trust. This paper analyses the parameter dependence problem in trust transitivity and proposes some definitions considering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Prediction Accuracy Using Entropy Weighting in Collaborative Filtering

    Publication Year: 2009, Page(s):40 - 45
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    In this paper, we evaluate performance of existing similarity measurement metric and propose a novel method using user's preferences information entropy to reduce MAE in memory-based collaborative recommender systems. The proposed method applies a similarity of individual inclination to traditional similarity measurement methods. We experiment on various similarity metrics under different conditio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust Management in Swarm-Based Autonomic Computing Systems

    Publication Year: 2009, Page(s):46 - 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    Trust management techniques must be adapted to the unique needs of the system architectures and problem domains to which they are applied. Certain characteristics of swarms, such as their lightweight, ephemeral nature and indirect communication, make this adaptation especially challenging. In this paper we look at the trust issues and opportunities in swarm-based autonomic computing systems and fi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 50 Years of Isolation

    Publication Year: 2009, Page(s):54 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    The traditional means for isolating applications from each other is via the use of operating system provided "process" abstraction facilities. However, as applications now consist of multiple fine-grained, independent and separately acquired components, the traditional process abstraction model is proving to be insufficient in ensuring this isolation. Statistics indicate that a high percentage of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving a Good Trade-off Between System Availability and Time Redundancy

    Publication Year: 2009, Page(s):61 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    What to do if at a given time a service dearly required is unavailable? Is it a good strategy to simply invoke the service again (and again)? How many times should one retry in such a situation in order to get a the service delivered with a reasonably high probability but without "losing too much time?" In this paper, we explore the relation between time redundancy that a system can utilize to cop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multidimensional Monitoring of Computer Systems

    Publication Year: 2009, Page(s):68 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    This paper presents a new approach to detecting abnormal situations in computer systems basing on an integrated monitoring, which covers performance parameters as well as other operational reports or logs. It takes into account different time perspectives and analysis goals. The presented methodology was implemented in Windows based systems. Its usefulness has been illustrated with some examples a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MoWeT: A Configurable Framework to Support Ubiquitous Location-Aware Applications

    Publication Year: 2009, Page(s):75 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    Today, GPS enabled systems are extensively used for geographic navigation in almost all contexts (commercial, personal, etc.). The first limit of these systems is their incapacity to work in covered areas, alley streets and, obviously, inside buildings. Furthermore commercial GPS applications are not enough customizable, only allowing user to add a set of POIs (points of interest) without any capa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous Computing and Time Dimension

    Publication Year: 2009, Page(s):83 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Ubiquitous computing (UbiCom) research has produced a substantial body of work dealing with smart devices, smart environments and smart interaction technologies. However, there are a few initiatives into conceiving and building smart operating systems. In our point of view, providing the software layer the possibility of sensing time flow plays an important role in conceiving a smart operating sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Open Framework for Distributed Context Management in Ubiquitous Environment

    Publication Year: 2009, Page(s):88 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (996 KB) | HTML iconHTML

    In this paper, we aim to propose an open framework for ubiquitous environment. In this framework, a distributed context management architecture and a communication model based on standard protocols are proposed. With this framework, a smart device is able to join to the ubiquitous environment and search for context-aware services based on standard protocols, such as UPnP and DNS. A service is also... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context and Adaptivity in Context-Aware Pervasive Computing Environments

    Publication Year: 2009, Page(s):94 - 101
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    In this article we highlight and discuss prominent aspects of context and adaptively in pervasive computing environments along with characteristics and categories of context, and context-aware systems. We also briefly refer to use, management and modeling of context in context-aware systems. This paper is not meant to provide an exhaustive review of literature but rather it aims to integrate and e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Situated Display for Local Community Participation: The Design and Use of Nnub

    Publication Year: 2009, Page(s):102 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB) | HTML iconHTML

    This paper discusses the design and use of a digital community noticeboard (called Nnub) located at a suburban general store. The intention is to design information and communication technology (ICT) such as situated displays and Internet technologies to support local communications. We use a reflective, agile, and iterative design (RAID) framework to evolve the technology, aiming to engage local ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Interface for Collaborative Environments: AICE

    Publication Year: 2009, Page(s):108 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    Nowadays, for each application, there are multiple interfaces according to actor and device used. Designing an application has become a complex activity. The diversity in device interactions and the variety of actors - that cooper to realize a common aim - must be supported by the application. This paper presents an adaptive interface for a collaborative environment. This interface has been influe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human Activity Recognizer for Mobile Devices with Multiple Sensors

    Publication Year: 2009, Page(s):114 - 119
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    This paper presents a novel human activity recognizer used to estimate a user's activities with sensors on a widespread consumer mobile device. Our recognizer can estimate a user's means of migration by using a combination of an acceleration sensor and a GPS. We evaluate the accuracy rate of the estimation with cellular phones carried freely and the result is 90.6 percent even in the case of inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.