By Topic

Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second IEEE Annual Conference on

Date 14-17 March 2004

Filter Results

Displaying Results 1 - 25 of 66
  • Proselytizing pervasive computing education: a strategy and approach influenced by human-computer interaction

    Publication Year: 2004, Page(s):257 - 262
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB) | HTML iconHTML

    A course on pervasive computing should be structured around key functions throughout a systems development process to cover common underlying concerns throughout science and engineering disciplines - development of design rationale, prototyping, evaluation, and component reuse. However, broader considerations of usage context and appreciation for research and methodological contributions from othe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences teaching a course on wearable and ubiquitous computing

    Publication Year: 2004, Page(s):252 - 256
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    We describe experiences teaching a course on wearable and ubiquitous computing to seniors and graduate students at Virginia Tech over the last two years. Major topics include low power hardware/software design, user input/output devices, context- and location-awareness, and application case studies. Readings for the course are taken mainly from the recent research literature, as there is no textbo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Escape from the computer lab: education in mobile wireless networks

    Publication Year: 2004, Page(s):231 - 235
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    As mobile wireless network technology becomes widespread, the importance of education about this new form of communication is becoming critical. One of the benefits of mobile computing education is that courses focusing on this topic can leverage advances in wireless technology to support novel education and learning paradigms. In particular, the development of wireless communication, together wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MPDG - mobile profile based distributed grouping

    Publication Year: 2004, Page(s):60 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    We present a new kind of mobile ad hoc application, which we call mobile profile based distributed grouping (MPDG), which is a combination of mobile clustering and data clustering. In MPDG each mobile host is endowed with a user profile and while the users move around, hosts with similar profiles are to be found and a robust mobile group is formed. The members of a group are able to cooperate or a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comprehensive structured context profiles (CSCP): design and experiences

    Publication Year: 2004, Page(s):43 - 47
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    In dynamic heterogeneous environments, such as pervasive computing, context-aware adaptation is a key concept to meet the varying requirements of different clients. To enable such functionality, context information must be gathered and eventually presented to the application performing the adaptation. Therefore, a common representation format for the context information is required. We introduce a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A synchronization framework for personal mobile servers

    Publication Year: 2004, Page(s):208 - 212
    Cited by:  Papers (5)  |  Patents (170)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    The recent growth in the mobile device market has proven the feasibility of mobile storage based consumer electronics products. One of the key features of personal mobile storage devices is the ability to synchronize content and metadata with other mobile and stationary devices. The main problem addressed is automatic data exchange and synchronization in the domain of personal mobile storage devic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trustworthy pervasive computing: the hard security problems

    Publication Year: 2004, Page(s):117 - 121
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    We examine five security problems that are barriers to mainstream pervasive computing. These are: device authentication, privacy, trust management, device assurance, recourse, and availability. We argue that the trust, security, and privacy issues inherent in pervasive computing environments present unique challenges that require a fundamental reexamination of how to build large-scale, trustworthy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-based security policies: a new modeling approach

    Publication Year: 2004, Page(s):154 - 158
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    The great enthusiasm which accompanies the wide adoption of handled devices and remote services is very often attenuated by the number and frequency of security problems encountered by users and services providers. The ubiquitous (pervasive) nature of such applications has brought new security vulnerabilities. Security in pervasive computing is thus, still a hot topic. Context-based security is an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic adaptive replica allocation algorithm in mobile ad hoc networks

    Publication Year: 2004, Page(s):65 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    In mobile ad hoc networks (MANET), nodes move freely and the distribution of access requests changes dynamically. Replica allocation in such a dynamic environment is a significant challenge. A dynamic adaptive replica allocation algorithm that can adapt to the nodes motion is proposed to minimize the communication cost of object access. When changes occur in the access requests of the object or th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and using imperfect context information

    Publication Year: 2004, Page(s):33 - 37
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Most recently developed context-aware software applications make unrealistic assumptions about the quality of the available context information, which can lead to inappropriate actions by the application and frustration on the part of the user. Here, we explore the problem of imperfect context information and some of its causes, and propose a novel approach for modelling incomplete and inaccurate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive approach to content-based subscription in mobile ad hoc networks

    Publication Year: 2004, Page(s):92 - 97
    Cited by:  Papers (12)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    We describe a novel approach for content-based publish/subscribe system in mobile ad-hoc networks and show preliminary experiment results. We extended ODMRP (on-demand multicast routing protocol) using aggregated summaries of content-based subscriptions in Bloom filters expression for the dynamic construction of an event dissemination structure. ODMRP's mesh topology gives extra reliability. We de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient end system multicast for mobile ad hoc networks

    Publication Year: 2004, Page(s):75 - 80
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    End system multicast protocols have the advantage that nonmember nodes are not burdened with multicast routing and storing state information. Unfortunately, most existing end system multicast protocols are developed for the traditional Internet. We show how these protocols can also be utilized in mobile ad-hoc networks (MANET). To achieve this the protocols have to be adapted to fit the highly dyn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agile middleware of pervasive computing environments

    Publication Year: 2004, Page(s):192 - 197
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    We survey the models and approaches applied to the middleware services of pervasive computing environments. Architectural styles and patterns introduced in the domain of mobile and wireless computing are also appropriate in pervasive computing. However, the development of pervasive middleware requires more emphasis on interoperability, adaptability and scalability of software services and componen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology based context modeling and reasoning using OWL

    Publication Year: 2004, Page(s):18 - 22
    Cited by:  Papers (132)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Here we propose an OWL encoded context ontology (CONON) for modeling context in pervasive computing environments, and for supporting logic-based context reasoning. CONON provides an upper context ontology that captures general concepts about basic context, and also provides extensibility for adding domain-specific ontology in a hierarchical manner. Based on this context ontology, we have studied t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mix zones: user privacy in location-aware services

    Publication Year: 2004, Page(s):127 - 131
    Cited by:  Papers (84)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Privacy of personal location information is becoming an increasingly important issue. We refine a method, called the mix zone, developed to enhance user privacy in location-based services. We improve the mathematical model, examine and minimise computational complexity and develop a method of providing feedback to users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fieldcast2: flexible P2P architecture for presence information sharing

    Publication Year: 2004, Page(s):98 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB) | HTML iconHTML

    Presence services collect noticeable attention as one of the major communicative applications in the ubiquitous network, where Internet access is available "anytime" and "anywhere". We have been developing FieldCast1, a combination of peer-to-peer presence service and Media Handover technology that supports seamless switching between different types of access networks. During the development and f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-based secure resource access in pervasive computing environments

    Publication Year: 2004, Page(s):159 - 163
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    We present a system architecture for supporting ubiquitous computing for mobile users across different environments by transparently performing context-based discovery and binding of resources. A ubiquitous computing environment is viewed as a collaboration space among mobile users, system services, and sensors/resources embedded in the physical environment. We present here different policies for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A toolkit to design adaptable user interfaces in ubiquitous computing environments

    Publication Year: 2004, Page(s):171 - 175
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    We describe an architecture to support the rapid development of software applications for mobile devices that can discover and adapt to resources in the environment of the user. To narrow the scope of our research, we focus on media-oriented applications involving the rendering, capture and control of pictures, audio or video. Inspired by the success of software component models, we introduce the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A library for managing spatial context using arbitrary coordinate systems

    Publication Year: 2004, Page(s):48 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Since location is an important part of context, the management of spatial information is important for many context-aware applications, e.g. the position or the extent of users, sensors, rooms or buildings. Coordinates always have a coordinate system (CS) associated to them. Numerous CSs exist and a lot of them are commonly used, thus conversion becomes a necessity. We introduce a library that imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A path-based RDF query language for CC/PP and UAProf

    Publication Year: 2004, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    By introducing a new method to apply a path expression to RDF queries, we present a new path-based RDF query language, RPath, for CC/PP and UAProf. CC/PP and UAProf, two of the applications of RDF, are standards that describe the context of both users and devices. To achieve high service levels, content adaptation systems must address user and device information effectively. RPath is designed to i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a theory of context spaces

    Publication Year: 2004, Page(s):38 - 42
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    We propose initial work on a conceptual framework for context-aware systems, towards a general context model to aid thinking, describing, manipulating and utilizing context. Much work on context-aware computing have utilized context in specialized applications, with application-specific software (and perhaps hardware) and specialized context representation and manipulation. Context-aware systems a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-to-peer file-sharing over mobile ad hoc networks

    Publication Year: 2004, Page(s):104 - 108
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Current peer-to-peer file-sharing systems mostly work on wired networks. Mobile ad hoc network is characterized as multihop wireless communications between mobile devices. Five routing approaches with different complexity are proposed to enable peer-to-peer file-sharing over mobile ad hoc networks. The complexity of the proposed approaches is evaluated and compared. It is concluded that the cross-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On negotiating automatic device configuration in smart environments

    Publication Year: 2004, Page(s):213 - 218
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    As the number of mobile devices we carry grows, the job of managing those devices throughout the day becomes cumbersome. In addition, the ability to use mobile devices in unethical ways without being detected is becoming widespread [Popyack, J., et al. (2003)]. It is desirable for mobile devices to automatically configure themselves based on the context of the environment and user preferences for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instant messaging & presence management in mobile adhoc networks

    Publication Year: 2004, Page(s):55 - 59
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    The combination of real-time message delivery and presence awareness has to lead the rapid rise in popularity of instant messaging (IM) in recent years. The extension of IM to mobile adhoc networks certainly offers considerable potential. However, the dynamic topology and decentralized nature of these networks requires several major issues to be addressed. Specifically, difficulties exist in provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual paths routing: a highly dynamic routing protocol for ad hoc wireless networks

    Publication Year: 2004, Page(s):81 - 86
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    We introduce the virtual paths routing (VPR) protocol for ad hoc wireless networks. VPR provides highly dynamic, correct, and efficient paths creation and maintenance between nodes. Innovatively, the protocol utilizes a technique to monitor the mobility of the nodes, and factorizes it in its operations. VPR is a distributed, on-demand, and adaptive protocol that comprises two phases. The first pha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.