By Topic

Mobile Ubiquitous Computing, Systems, Services and Technologies, 2009. UBICOMM '09. Third International Conference on

Date 11-16 Oct. 2009

Filter Results

Displaying Results 1 - 25 of 67
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (313 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (164 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s):xii - xv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xvi - xviii
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Investigating Radiation Hazard and Safety Aspects of Handheld Mobile

    Publication Year: 2009, Page(s):1 - 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (578 KB) | HTML iconHTML

    Radiation hazard problem, which creates multiple adverse effects on human body, is mainly because of antenna technology; this paper explains these different effects by calculating specific absorption rate (SAR) of these radiations in different people exposed to radio frequency (RF), electromagnetic (EM) and microwave radiations from handheld and antennas devices. The effects of antennas were inves... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring Mobile Service Innovation

    Publication Year: 2009, Page(s):10 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    The paper introduces two tools, MoBiS process modeling and MoBiS cost measurements, to initiate the discussions of mobile data costs, their effect on experienced usefulness of a service, and more sustainable, economic growth. Based on the small scale study described on this paper, more innovative pricing models would be needed to support the mobile service innovations and adoption. Development of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methods for Conserving Privacy in Workflow Controlled Smart Environments

    Publication Year: 2009, Page(s):16 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (635 KB) | HTML iconHTML

    In the last years context-aware workflow systems have gained more and more importance. However, in research little emphasis has been put on workplace privacy and humane system design. It is the aim of this paper to give an overview on the effects of combining workflow systems and context-aware systems and to discuss its implications for workplace privacy and human-oriented design. Different method... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences from NFC Supported School Attendance Supervision for Children

    Publication Year: 2009, Page(s):22 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB) | HTML iconHTML

    Our paper presents a field study arranged at a Finnish primary school where two classes and a total of 23 pupils between the ages of 6 and 8 trialed an attendance supervision system supported by Near Field Communication technology in 2008. In the trial the pupils marked their arrival at and departure from the school by touching a reader device or NFC-enabled mobile phone with a smart contactless c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context Sharing Message Broker Architecture to Enhance Interoperability in Changeable Environments

    Publication Year: 2009, Page(s):31 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1895 KB) | HTML iconHTML

    With the growing number of mobile devices connected to the network, demand for appropriate services according to the situational contexts of users is increasing. However, building such context-aware applications is costly because both the environments of users in the real world and available services on the network are dynamically changing. In this paper, we propose a Context Sharing Message Broke... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Service Infrastructure

    Publication Year: 2009, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1385 KB) | HTML iconHTML

    This paper presents an infrastructure for building and operating context-aware services in ambient computing environments. The system is managed in a non-centralized manner and provides users with agents and detects the locations of users and deploys multiple location-aware service-provider agents at distributed computers by using active RFID-tags and mobile agent technology. For example, when a u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Orthogonal Classification of Middleware Technologies

    Publication Year: 2009, Page(s):46 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    This article describes middleware by adopting a horizontal and a vertical layer views. Middleware are enabling technologies for application development and execution in ubiquitous environments. In the horizontal view, we find most types of middleware developed so far, such as MOM, ORB, databases middleware and more recently SOA. Two new concepts emerged in this category, the ``middleware of sensor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PosPush: A Highly Accurate Location-Based Information Delivery System

    Publication Year: 2009, Page(s):52 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (746 KB) | HTML iconHTML

    This paper proposes PosPush, a highly accurate location based information delivery system, which utilizes the high resolution 3D locations obtained from ultrasonic positioning devices to efficiently deliver the location based information to users. This system is designed especially for applications where a 3D space is partitioned into a set of closely neighboring small zones, and as a user moves i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalised Live Sports Event Viewing on Mobile Devices

    Publication Year: 2009, Page(s):59 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB) | HTML iconHTML

    A personalised mobile sports event viewing system that enables users to efficiently and naturally direct movies of their own live sports events on mobile devices is described. Personalisation here focuses on the selection of live events with respect to multiple sports disciplines. An implicit user model driven approach is used to enable the system to adaptively predict users' preferred events duri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile-Aware Web Services

    Publication Year: 2009, Page(s):65 - 70
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    The increasing demand for services for mobile customers has resulted in the need to develop Web services clients that could be used from mobile devices as well as from PCs, which to date has been the main focus for developers. In this paper we propose an aspect-oriented approach which allows services to be invoked ubiquitously from different type of devices without modifying the structure and enca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Adaptive Networked System for Strain Mapping

    Publication Year: 2009, Page(s):71 - 76
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1228 KB) | HTML iconHTML

    Separately, context-aware sensing and networked sensing systems have been fast progressing research domains. The emergence of wireless sensor networks (WSN) has introduced a way of implementing a distributed self-organized intelligence in myriads of sensing applications. In this work, WSN and sensing technologies are combined to monitor behavior of a target object. The paper presents design and im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Context-Aware Service Adaptation in a Pervasive Computing System

    Publication Year: 2009, Page(s):77 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    Pervasive computing requires that devices must be context-aware in order to provide proactively adapted services to both user and applications according to the current context. Most of the proposed approaches of service adaptation in a pervasive computing system are either not context-aware or based on an inappropriate definition of context. In this paper we propose a context-aware dynamic service... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WSN Infrastructure in the UHF Band Applied to Ubiquitous Sensing

    Publication Year: 2009, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1382 KB) | HTML iconHTML

    Biological research in agriculture needs a lot of specialized electronic sensors in order to fulfill different goals, like as: climate monitoring, soil and fruit assessment, control of insects and diseases, chemical pollutants, identification and control of weeds, crop tracking, and so on. That research must be supported by consistent biological models able to simulate diverse environmental condit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Point-of-Treatment: Touchable E-nursing User Interface for Medical Emergencies

    Publication Year: 2009, Page(s):89 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1046 KB) | HTML iconHTML

    A common occurrence in any nursing home for the elderly is a medical emergency such as a cardiac arrest, a fall or a diabetic seizure. Our goal was to provide an effective and supportive graphical user interface for nursing personnel and care-givers who are first responders to such an emergency situation. A prototype called portable medical monitoring computer (PMMC) was developed to provide a pos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Browsing Audio Life-log Data Using Acoustic and Location Information

    Publication Year: 2009, Page(s):96 - 101
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1725 KB) | HTML iconHTML

    The use of the log of personal life experiences recorded on cameras, microphones, GPS devices, etc., is studied. A record of a person's personal life is called as a life-log. Since the amount of data stored in a life-log system is vast and since the data may also include redundant data, methods for the retrieval and summarization of the data are required for the effective use of the life-log data.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reflexive Infrastructure for Context-Aware Applications

    Publication Year: 2009, Page(s):102 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Context-aware applications use information from their surrounding environment to adapt their behavior. This paper proposes a reflexive, loose-coupled, event-based infrastructure named CxFramework to aid the development of such complex applications. CxFramework is composed of several kinds of services. Context information is modeled using ontologies from which higher-level context information can b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multipath Data Transmission for Wireless Thin Clients

    Publication Year: 2009, Page(s):108 - 112
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB) | HTML iconHTML

    Remote desktop systems enable business users to access critical data located in the office from outside it with a mobile thin client or any other portable ubiquitous devices without having to worry about data leakage. However, high latency and low bandwidth in wireless-network environments may degrade the performance of remote desktop clients, such as causing slow responses to keyboard/mouse input... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.