By Topic

Pervasive Services, 2004. ICPS 2004. IEEE/ACS International Conference on

Date 19-23 July 2004

Filter Results

Displaying Results 1 - 25 of 36
  • Table of contents

    Publication Year: 2004, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Virtual Networks A Flexible Platform for Network Services

    Publication Year: 2004, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomic Computing: Research Challenges and Opportunities

    Publication Year: 2004, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (46 KB) | HTML iconHTML

    The wide deployment of Internet technology has resulted in exponential growth in Internet application services (e.g., content hosting for data with web-based access, shared payroll applications, firewall-based security services, email and shared file services). The management and control of these application services is a challenging research problem due to the huge amount of data that needs to be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-Preserving Location-Dependent Query Processing

    Publication Year: 2004, Page(s):9 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    A mobile portable device will often make queries, to a remote database, that depend on its location: It may ask for the nearest coffee shop, restaurant, pharmacy, etc. For privacy reasons, the mobile unit may not wish to disclose its precise location to the remote database - while it is unavoidable that the cell phone company already knows the rough location of the customer ("somewhere in Lafayett... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "How Long is Your Belt?" Towards a Single Device for Multiple Functions

    Publication Year: 2004, Page(s): 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB) | HTML iconHTML

    Personal communication and computing devices have become omnipresent: cellular phones, PDAs, MP3 players, still and video cameras. Characteristics shared by all these devices include a shrinking size and expanded performance and functionality. All can be carried by a person on a single belt. However, a suitcase is required for all the chargers, as well as the cables to connect to PCs and all the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Smart Implants Dedicated to Multichannel Monitoring and Microstimulation

    Publication Year: 2004, Page(s):21 - 26
    Cited by:  Papers (7)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    This invited paper covers several techniques and methods employed to build high reliability circuits and systems dedicated to implement advanced implantable and wirelessly controlled smart medical devices such as sensors and microstimulateurs. A global view of typical micro-devices such us neural signals monitoring device, cortical multichannel stimulator, as well as peripheral nerve interfaces to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Programmable Structure for Pervasive Computing

    Publication Year: 2004, Page(s):29 - 38
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    This paper presents the idea of a proactive and extensible pervasive computing infrastructure. It supports its users by filtering and pushing highly personalized context-aware information. We have derived a general structure that describes a virtual computer extensible at run-time by user-defined information filters. Individual users may program the structure using an expressive event-based filter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Computing: A Guide for the Pervasive Computing Community

    Publication Year: 2004, Page(s):39 - 48
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    There is a high interest on context-aware computing expressed by the pervasive computing community, which considers context as a key to design more adaptive applications. Due to this interest, a huge amount of contributions have been made in the field as we can notice from the increasing amount of publications on context and context-aware computing. However, the user interested in integrating cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PALLAS: A Querying Interface for Pervasive Computing using Handheld Devices

    Publication Year: 2004, Page(s):49 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    In this paper we describe PALLAS (PALm Logic-based Algebraic Search), a prototype architecture, design and implementation for a search interface on a portable digital assistant. PALLAS is part of the UbAgent, a middleware infrastructure that provides an efficient way of handling the back-end processing of Pervasive Computing: accessing information from distributed databases, computation processing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Acoustic Identification Scheme for Location Systems

    Publication Year: 2004, Page(s):61 - 70
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Many pervasive computing applications require location awareness in order to successfully integrate technology into our daily lives. A location system consists of a group of sensors that determine the position of a mobile user and provide the user with useful context-specific information. Locating the user requires signal exchanges between the user's mobile device and the sensors. This paper consi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context Aware Service Provisioning

    Publication Year: 2004, Page(s):71 - 80
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    In this paper, we present our initiative on a new direction of research for bringing into the common fold context-aware computing and Web services-oriented computing. Our long term research objective is to allow users to satisfy their needs regardless of their location and the resources that are considered in the performance of the services. Our contribution is the enhancement of the service disco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next Generation Vehicle Network (NGVN): Internet Access Utilizing Dynamic Discovery Protocols

    Publication Year: 2004, Page(s):81 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    In the near future, vehicles are expected to become a part of the Internet, either as a terminal in a mobile network, as a network node, or as a moving sensor (providing environmental information, cars status, streaming video, etc.) or a combination of the three. This is partly due to the steadily growing interest of vehicles' passengers in location-based information. Drivers and passengers that w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunities for Grid Computing in Bio- and Health-Informatics

    Publication Year: 2004, Page(s): 91
    Request permission for commercial reuse | PDF file iconPDF (49 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Honeypot Design for Intrusion Detection

    Publication Year: 2004, Page(s):95 - 104
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a platform for studying the methods and tools used by the intruders (blackhat community), thus deriving their value from the unauthorized use of their resources. This paper discusses th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abnormality Metrics to Detect and Protect against Network Attacks

    Publication Year: 2004, Page(s):105 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Internet has been growing at an amazing rate and it becomes pervasive in all aspects of our life. On the other hand, the ubiquity of networked computers and their services has significantly increased their vulnerability to virus and worm attacks. To make pervasive systems and their services reliable and secure it becomes highly essential to develop on-line monitoring, analysis, and quantification ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation

    Publication Year: 2004, Page(s):113 - 120
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    In this paper we present TRUMMAR, a reputation-based trust model that mobile agent systems can use to protect agents from malicious hosts. TRUMMAR is unique in being a truly comprehensive model since it accounts, in a unified framework, for a multitude of concepts such as prior-derived reputation, first impression, loss of reputation information with time, hierarchy of host systems (neighbors, fri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfigurable Computing for RC6 Cryptography

    Publication Year: 2004, Page(s):121 - 127
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    This paper presents an emerging reconfigurable hardware that potentially delivers flexible high performance for cryptographic algorithms. MorphoSys, a dynamic reconfigurable architecture that sustains implementations that can yield into equally or even better performance results than custom-hardware and yet preserves all the flexibility of general-purpose processors. With today's great demand for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Principles for Inducing Reactivity in Ubiquitous Environments

    Publication Year: 2004, Page(s):131 - 139
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Ubiquitous environments are becoming increasingly aware of their inhabitants: they posses vision capabilities, auditory capabilities and more interestingly intelligent capabilities. At the heart of such environments is the ability of systems to initiate responsive reactions to contextual changes. In this paper, we describe the concept of ubiquitous systems' reactivity. We identify important design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Use of a Hopfield Neural Network in Solving the Mobility Management Problem

    Publication Year: 2004, Page(s):141 - 150
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    This work presents a new approach to solve the location management problem by using the location areas approach. Hopfield Neural Network is used in this work to find the optimal configuration of location areas in a mobile network. Toward this end, the location areas configuration of the network is modeled so that the mobility management cost of the system is related to the energy value of this art... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intelligent Interface for the Dynamic Negotiation of QoS in ARCADE

    Publication Year: 2004, Page(s):151 - 160
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Since several years, the network area is in continual progress and one of the important functions that should be introduced in Internet Next Generation consists of the policy-based servers. These servers of control will realize an equivalence between the demands of the clients and the network resources. The objective of the project Arcade is to define an intelligent interface capable of accomplish... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfigurable Supercomputing

    Publication Year: 2004, Page(s): 163
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Wired Short Cuts in Wireless Sensor Networks

    Publication Year: 2004, Page(s):167 - 176
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    In this paper we investigate the use of wired short cuts in sensor networks. This new paradigm augments a sensor network with a very limited wired infrastructure to improve its overall energy-efficiency. Energy-efficiency is obtained by reduction in average path length. We have developed an analytical model to analyze the gain in path length reduction by using short cuts. We have also conducted ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RUGGED: RoUting on finGerprint Gradients in sEnsor Networks

    Publication Year: 2004, Page(s):179 - 188
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    Every physical event produces a fingerprint in the environment which results a natural information gradient in the proximity of the phenomenon. Moreover, many physical phenomena follow diffusion laws. In this paper, we propose a novel scheme to effectively exploit the natural information gradient to route a query in a sensor network. Our scheme uses multiple path exploration, and controls the inst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet Performance Modeling Using Mixture Dynamical System Models

    Publication Year: 2004, Page(s):189 - 198
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    This paper models Internet traffic input stream and TCP connection durations using dynamical system models. A linear dynamical model with mixture Gaussian output is proposed for the Internet traffic input stream, and a linear dynamical system with mixture lognormal output is developed to model the TCP connection durations. In the proposed models, a sum of independent AR (1) processes is used to ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable High-performance Router Platform Supporting Dynamic Service Extensibility On Network and Host Processors

    Publication Year: 2004, Page(s):199 - 206
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Emerging network services such as transcoding and encryption need application-specific handling of data streams within the network, thus requiring enormous computational capabilities on routers to process packets at link speed. Recently appeared Network Processors (NPs) are able to significantly increase the available processing capacities on a router by a chip-multi-processor architecture. Embedd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.