By Topic

IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second

14-17 March 2004

Filter Results

Displaying Results 1 - 25 of 66
  • Experiences teaching a course on wearable and ubiquitous computing

    Publication Year: 2004, Page(s):252 - 256
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    We describe experiences teaching a course on wearable and ubiquitous computing to seniors and graduate students at Virginia Tech over the last two years. Major topics include low power hardware/software design, user input/output devices, context- and location-awareness, and application case studies. Readings for the course are taken mainly from the recent research literature, as there is no textbo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comprehensive structured context profiles (CSCP): design and experiences

    Publication Year: 2004, Page(s):43 - 47
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    In dynamic heterogeneous environments, such as pervasive computing, context-aware adaptation is a key concept to meet the varying requirements of different clients. To enable such functionality, context information must be gathered and eventually presented to the application performing the adaptation. Therefore, a common representation format for the context information is required. We introduce a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anatomy of a graduate ubiquitous/pervasive computing course

    Publication Year: 2004, Page(s):247 - 251
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    We present the experience in designing and teaching a graduate level ubiquitous computing (Ubicomp) course at Arizona State University. It identifies some of the challenges in teaching an Ubicomp course and presents some solutions. This course was designed for students with no prior exposure to Ubicomp or experience in human computer interaction; and to have minimal overlap with a mobile computing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a theory of context spaces

    Publication Year: 2004, Page(s):38 - 42
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    We propose initial work on a conceptual framework for context-aware systems, towards a general context model to aid thinking, describing, manipulating and utilizing context. Much work on context-aware computing have utilized context in specialized applications, with application-specific software (and perhaps hardware) and specialized context representation and manipulation. Context-aware systems a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hands-on course on wireless and mobile systems design

    Publication Year: 2004, Page(s):241 - 246
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    While we cannot make every student an expert on all topics from the wireless channel to mobile application design, we can provide students with a critical understanding of the context for their work in different aspects of wireless systems. We describe the design and development of a hands-on course on wireless and mobile systems design offered at Virginia Tech, integrating topics in wireless netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic resource and service management for ubiquitous computing environments

    Publication Year: 2004, Page(s):219 - 223
    Cited by:  Papers (11)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    The high degree of dynamism and heterogeneity of the resources involved in a pervasive computing environment makes service adaptation and interoperability a difficult task. We present UBIDEV, a service framework that faces the heterogeneity problem by hiding at the application level the dynamism of the underlying environment. We describe the UBIDEV architecture focusing on the description and the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Super spaces: a middleware for large-scale pervasive computing environments

    Publication Year: 2004, Page(s):198 - 202
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    In previous work [M. Roman et al., (2002)], we introduced a distributed middleware infrastructure for managing physically-bounded, standalone pervasive computing environments, which we refer to as Active Spaces. We extend this middleware to support the organization, management and interactions of large-scale pervasive computing systems built from multiple Active Spaces or other pervasive computing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MICA: pervasive middleware for learning, sharing and talking

    Publication Year: 2004, Page(s):176 - 180
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2908 KB) | HTML iconHTML

    MICA (multimodal interagent communication architecture) is a middleware layer for pervasive computing that is especially well suited to sharing of information between users, learning user's preferences and interacting with the user through many devices and modalities. It is based on the idea of a blackboard: a global shared memory which acts as both a communication and storage mechanism. It uses a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and using imperfect context information

    Publication Year: 2004, Page(s):33 - 37
    Cited by:  Papers (67)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Most recently developed context-aware software applications make unrealistic assumptions about the quality of the available context information, which can lead to inappropriate actions by the application and frustration on the part of the user. Here, we explore the problem of imperfect context information and some of its causes, and propose a novel approach for modelling incomplete and inaccurate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expanding education through active space collaboration

    Publication Year: 2004, Page(s):236 - 240
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    We introduce a system called e-Fuzion based on using computing devices, such as Tablet PCs, that empower students and teachers with better technologies for educational interaction. We propose an e-Fuzion integration with ubiquitous computer environments of smart devices and active spaces using a system called Gaia. At present, e-Fuzion facilitates electronic communication in a seamless, integrated... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On negotiating automatic device configuration in smart environments

    Publication Year: 2004, Page(s):213 - 218
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    As the number of mobile devices we carry grows, the job of managing those devices throughout the day becomes cumbersome. In addition, the ability to use mobile devices in unethical ways without being detected is becoming widespread [Popyack, J., et al. (2003)]. It is desirable for mobile devices to automatically configure themselves based on the context of the environment and user preferences for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agile middleware of pervasive computing environments

    Publication Year: 2004, Page(s):192 - 197
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    We survey the models and approaches applied to the middleware services of pervasive computing environments. Architectural styles and patterns introduced in the domain of mobile and wireless computing are also appropriate in pervasive computing. However, the development of pervasive middleware requires more emphasis on interoperability, adaptability and scalability of software services and componen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pervasive authentication domains for automatic pervasive device authorization

    Publication Year: 2004, Page(s):144 - 148
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corporate e-mail, or accepting telephone calls. We envision that in the future, many applications will be distributed, running across many of a user's specialized pervasive devices rather than on a single system. In this case,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A toolkit to design adaptable user interfaces in ubiquitous computing environments

    Publication Year: 2004, Page(s):171 - 175
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    We describe an architecture to support the rapid development of software applications for mobile devices that can discover and adapt to resources in the environment of the user. To narrow the scope of our research, we focus on media-oriented applications involving the rendering, capture and control of pictures, audio or video. Inspired by the success of software component models, we introduce the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling context-based security policies with contextual graphs

    Publication Year: 2004, Page(s):28 - 32
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Security is top priority for pervasive applications, for which the number of reported incidents is in constant increase. Context-based security is an emerging approach. It aims at coping with the security problems resulting from the high heterogeneity and dynamicity of such environments. In this paper, we propose a new model for policies specification based on contextual graphs. It relies on a set... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mix zones: user privacy in location-aware services

    Publication Year: 2004, Page(s):127 - 131
    Cited by:  Papers (125)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Privacy of personal location information is becoming an increasingly important issue. We refine a method, called the mix zone, developed to enhance user privacy in location-based services. We improve the mathematical model, examine and minimise computational complexity and develop a method of providing feedback to users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-to-peer file-sharing over mobile ad hoc networks

    Publication Year: 2004, Page(s):104 - 108
    Cited by:  Papers (59)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Current peer-to-peer file-sharing systems mostly work on wired networks. Mobile ad hoc network is characterized as multihop wireless communications between mobile devices. Five routing approaches with different complexity are proposed to enable peer-to-peer file-sharing over mobile ad hoc networks. The complexity of the proposed approaches is evaluated and compared. It is concluded that the cross-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual paths routing: a highly dynamic routing protocol for ad hoc wireless networks

    Publication Year: 2004, Page(s):81 - 86
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    We introduce the virtual paths routing (VPR) protocol for ad hoc wireless networks. VPR provides highly dynamic, correct, and efficient paths creation and maintenance between nodes. Innovatively, the protocol utilizes a technique to monitor the mobility of the nodes, and factorizes it in its operations. VPR is a distributed, on-demand, and adaptive protocol that comprises two phases. The first pha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Escape from the computer lab: education in mobile wireless networks

    Publication Year: 2004, Page(s):231 - 235
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    As mobile wireless network technology becomes widespread, the importance of education about this new form of communication is becoming critical. One of the benefits of mobile computing education is that courses focusing on this topic can leverage advances in wireless technology to support novel education and learning paradigms. In particular, the development of wireless communication, together wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A synchronization framework for personal mobile servers

    Publication Year: 2004, Page(s):208 - 212
    Cited by:  Papers (7)  |  Patents (179)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    The recent growth in the mobile device market has proven the feasibility of mobile storage based consumer electronics products. One of the key features of personal mobile storage devices is the ability to synchronize content and metadata with other mobile and stationary devices. The main problem addressed is automatic data exchange and synchronization in the domain of personal mobile storage devic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A middleware for supporting disconnections and multi-network access in mobile environments

    Publication Year: 2004, Page(s):187 - 191
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    The middleware infrastructure to support applications is becoming critically important to the new horizons of mobile and pervasive computing. In this context, the goal of our work is to propose architecture and a prototype of a middleware which is adapted to the usage and the requirements of the future mobile systems. While message oriented middleware (MOM) is an established concept for a long tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-based security policies: a new modeling approach

    Publication Year: 2004, Page(s):154 - 158
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    The great enthusiasm which accompanies the wide adoption of handled devices and remote services is very often attenuated by the number and frequency of security problems encountered by users and services providers. The ubiquitous (pervasive) nature of such applications has brought new security vulnerabilities. Security in pervasive computing is thus, still a hot topic. Context-based security is an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Yoking-proofs" for RFID tags

    Publication Year: 2004, Page(s):138 - 143
    Cited by:  Papers (84)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    RFID (radio-frequency identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility in automating supply-chain logistics, RFID tags promise eventually to supplant the optical barcode as a means of identifying goods. We propose the concept of a yoking-proof, namely a proof that a pair of RFID tags has been... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Models, protocols, and architectures for secure pervasive computing: challenges and research directions

    Publication Year: 2004, Page(s):164 - 168
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be successful, efforts to build these would have to recognize from the onset that pervasive computing settings are complex socio-technical system and would thus have to go beyond traditional system-centric approaches to analyzin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A path-based RDF query language for CC/PP and UAProf

    Publication Year: 2004, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    By introducing a new method to apply a path expression to RDF queries, we present a new path-based RDF query language, RPath, for CC/PP and UAProf. CC/PP and UAProf, two of the applications of RDF, are standards that describe the context of both users and devices. To achieve high service levels, content adaptation systems must address user and device information effectively. RPath is designed to i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.