By Topic

Pervasive Services, 2004. ICPS 2004. Proceedings. The IEEE/ACS International Conference on

Date 19-23 July 2004

Filter Results

Displaying Results 1 - 25 of 80
  • Design principles for inducing reactivity in ubiquitous environments

    Publication Year: 2004, Page(s):131 - 139
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB) | HTML iconHTML

    Ubiquitous environments are becoming increasingly aware of their inhabitants: they possess vision capabilities, auditory capabilities and more interestingly intelligent capabilities. At the heart of such environments is the ability of systems to initiate responsive reactions to contextual changes. We describe the concept of ubiquitous systems' reactivity. We identify important design principles th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable high-performance router platform supporting dynamic service extensibility on network and host processors

    Publication Year: 2004, Page(s):199 - 206
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (913 KB) | HTML iconHTML

    Emerging network services such as transcoding and encryption need application-specific handling of data streams within the network, thus requiring enormous computational capabilities on routers to process packets at link speed. Recently appeared network processors (NPs) are able to significantly increase the available processing capacities on a router by a chip-multi-processor architecture. Embedd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A programmable structure for pervasive computing

    Publication Year: 2004, Page(s):29 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (945 KB) | HTML iconHTML

    This work presents the idea of a proactive and extensible pervasive computing infrastructure. It supports its users by filtering and pushing highly personalized context-aware information. We have derived a general structure that describes a virtual computer extensible at run-time by user-defined information filters. Individual users may program the structure using an expressive event-based filter ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual networks a flexible platform for network services

    Publication Year: 2004, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Middies: passive middleware abstractions for pervasive computing environments

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    As the pervasive computing paradigm develops, it is necessary to have means of communication for applications executing over the many disparate devices that form pervasive computing environments. The dynamically changing set of resources and services available in such environments stems both from the nature of distributed systems and the mobility of devices that constitute temporary parts of the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet performance modeling using mixture dynamical system models

    Publication Year: 2004, Page(s):189 - 198
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (846 KB) | HTML iconHTML

    This paper models Internet traffic input stream and TCP connection durations using dynamical system models. A linear dynamical model with mixture Gaussian output is proposed for the Internet traffic input stream, and a linear dynamical system with mixture lognormal output is developed to model the TCP connection durations. In the proposed models, a sum of independent AR (Anderson and Nielsen, 1998... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfigurable supercomputing

    Publication Year: 2004
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Summary form only given. The synergistic advances in high-performance computing and in reconfigurable computing, based on field programmable gate arrays (FPGAs), form the basis for a new paradigm in supercomputing, namely reconfigurable supercomputing. This can be achieved through hybrid systems of microprocessors and FPGA modules that can leverage the system level concepts from high-performance c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunistic application flows in pervasive environments

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Summary form only given. Supporting applications in sensor-based pervasive environments requires a programming and management paradigm where the behaviors as well as the interactions of applications elements (sensors, actuators, and services) are dynamic, opportunistic, and context, content and capability aware. We present a programming model that enables opportunistic flows in pervasive environme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure pervasive computing without a trusted third party

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    The miniaturization of computing devices and the need for ubiquitous communication has augmented the demand for pervasive computing. Security demands that all devices in a pervasive system must be able to authenticate each other and communicate in a secure manner. This is usually achieved through a trusted third party like a public key infrastructure (PKI) or a key distribution centre (KDC). The e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TRUMMAR - a trust model for mobile agent systems based on reputation

    Publication Year: 2004, Page(s):113 - 120
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1048 KB) | HTML iconHTML

    We present TRUMMAR, a reputation-based trust model that mobile agent systems can use to protect agents from malicious hosts. TRUMMAR is unique in being a truly comprehensive model since it accounts, in a unified framework for a multitude of concepts such as prior-derived reputation, first impression, loss of reputation information with time, hierarchy of host systems (neighbors, friends, and stran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RUGGED: routing on fingerprint gradients in sensor networks

    Publication Year: 2004, Page(s):179 - 188
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1047 KB) | HTML iconHTML

    Every physical event produces a fingerprint in the environment which results a natural information gradient in the proximity of the phenomenon. Moreover, many physical phenomena follow diffusion laws. We propose a novel scheme to effectively exploit the natural information gradient to route a query in a sensor network. Our scheme uses multiple path exploration, and controls the instantiation of pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid cache invalidation schemes in mobile environments

    Publication Year: 2004, Page(s):209 - 218
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (996 KB) | HTML iconHTML

    To make cached data consistent, the server periodically broadcasts an invalidation report to all mobile clients in its cell so that each can invalidate obsolete data items from its local cache. We present two hybrid cache invalidation schemes: Hybrid cache invalidation with simple broadcasting (HSB), and hybrid cache invalidation with attribute bit sequence broadcasting (HABSB). In these schemes t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomic computing: research challenges and opportunities

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Summary form only given. The wide deployment of Internet technology has resulted in exponential growth in Internet application services (e.g., content hosting for data with Web-based access, shared payroll applications, firewall-based security services, email and shared file services). The management and control of these application services is a challenging research problem due to the huge amount... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PALLAS: a querying interface for pervasive computing using handheld devices

    Publication Year: 2004, Page(s):49 - 58
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1810 KB) | HTML iconHTML

    We describe PALLAS (PALm Logic-based Algebraic Search), a prototype architecture, design and implementation for a search interface on a portable digital assistant. PALLAS is part of the UbAgent, a middleware infrastructure that provides an efficient way of handling the back-end processing of pervasive computing: accessing information from distributed databases, computation processing, and location... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed framework for relaying stereo vision for telerobotics

    Publication Year: 2004, Page(s):221 - 225
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    Stereo vision is one critical tool in minimally invasive surgery (MIS) for enhancing perception of depth of organs which greatly improves the operation efficiency. Augmented stereo views results from superimposing 3D anatomical models with real organ views. A reliable distributed framework for relaying stereoscopic visual feedbacks between a telerobotic server and a client station is proposed. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-preserving location-dependent query processing

    Publication Year: 2004, Page(s):9 - 17
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB) | HTML iconHTML

    A mobile portable device will often make queries, to a remote database, that depend on its location: It may ask for the nearest coffee shop, restaurant, pharmacy, etc. For privacy reasons, the mobile unit may not wish to disclose its precise location to the remote database - while it is unavoidable that the cell phone company already knows the rough location of the customer ("somewhere in Lafayett... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a unified graph-based framework for dynamic component-based architectures description in Z

    Publication Year: 2004, Page(s):227 - 234
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (651 KB) | HTML iconHTML

    This work proposes a model oriented formal approach for the specification and the verification of dynamic component-based architectures. This approach associates the expressive power of functional and structural approaches. On the one hand, we make use of the specification language Z to formulate the constraints made on the architectural style. These constraints have to be maintained during the sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method of capturing system stableness degree in resource discovery and interaction

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    We presented a method of reducing COS based on context-aware computing in our foregone works. Here we focus on a key component of this method: capturing context. Capturing a context - system stableness degree is discussed here. The results of experiments show that the method can capture this type of context effectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Jini-UPnP Bridge using Rapide ADL

    Publication Year: 2004
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    The exploding deployment of network enabled mobile devices, along with the expansion of networked services have created the need for users to easily manage these devices and services and also to coordinate with one another. Service discovery protocol (SDP) enables networked devices, applications, and services to seek out and find other complementary networked devices, applications, and services ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunities for grid computing in bio- and health-informatics

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    Summary form only given. Over the past few years the popularity of the Internet has been growing by leaps and bounds. However, there comes a time in the life of a technology, as it matures, where questions about its future need to be answered. The Internet is no exception to this case. Often called the "next big thing" in global Internet technology, grid computing is viewed as one of the top candi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-aware computing: a guide for the pervasive computing community

    Publication Year: 2004, Page(s):39 - 48
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1008 KB) | HTML iconHTML

    There is a high interest on context-aware computing expressed by the pervasive computing community, which considers context as a key to design more adaptive applications. Due to this interest, a huge amount of contributions have been made in the field as we can notice from the increasing amount of publications on context and context-aware computing. However, the user interested in integrating cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-deployment and self-configuration of pervasive network services

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    We present a policy-based approach to achieve self-deployment and self-configuration of pervasive systems and services. In our approach, we decompose applications into a set of interconnected components. With each component, we specify the autonomic attributes required to self-configure and self-manage the operations of the components in autonomic component architecture (ACA) such that the overall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "How long is your belt?" towards a single device for multiple functions

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Summary form only given. Personal communication and computing devices have become omnipresent: cellular phones, PDAs, MP3 players, still and video cameras. Characteristics shared by all these devices include a shrinking size and expanded performance and functionality. All can be carried by a person on a single belt. However, a suitcase is required for all the chargers, as well as the cables to con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic honeypot design for intrusion detection

    Publication Year: 2004, Page(s):95 - 104
    Cited by:  Papers (6)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1051 KB) | HTML iconHTML

    Modern technology in the area of intrusion detection is honeypot technology that, unlike common IDSs, tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a platform for studying the methods and tools used by the intruders (blackhat community), thus deriving their value from the unauthorized use of their resources. This paper discusses th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfigurable computing for RC6 cryptography

    Publication Year: 2004, Page(s):121 - 127
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB) | HTML iconHTML

    This work presents an emerging reconfigurable hardware that potentially delivers flexible high performance for cryptographic algorithms. MorphoSys, a dynamic reconfigurable architecture that sustains implementations that can yield into equally or even better performance results than custom-hardware and yet preserves all the flexibility of general-purpose processors. With today's great demand for s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.