By Topic

2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous

13-16 July 2009

Filter Results

Displaying Results 1 - 25 of 72
  • [Title page]

    Publication Year: 2009, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2009, Page(s):1 - 3
    IEEE is not the copyright holder of this material | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Welcome message from general chair

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Message from the SensorFusion'09 program chairs

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Mobile healthcare workshop message

    Publication Year: 2009, Page(s):1 - 2
    IEEE is not the copyright holder of this material | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Health untethered

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Design principles for robust opportunistic communication

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):1 - 4
    IEEE is not the copyright holder of this material | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • MobiQuitous 2009

    Publication Year: 2009, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • Social context: Supporting interaction awareness in ubiquitous environments

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (12365 KB) | HTML iconHTML

    In ubiquitous computing environments, certain entities (or actors) often need to interact with each other in achieving a joint goal in a dynamically changing context. To perform such interactions in a seamless manner, the actors need to be aware of not only their physical context (e.g. location) but also their changing relationships with respect to the particular task or goal. The latter interacti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-layered friendship modeling for location-based Mobile Social Networks

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (9)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (8733 KB) | HTML iconHTML

    Location-based Mobile Social Networks (MSNs) are becoming increasingly popular given the success of Online Social Networks (OSNs), such as Facebook and MySpace, and recent availability of open mobile platforms, such as Apple iPhones and Google Android phones. MSNs extend existing OSNs by allowing a user to know when her friends are around and by providing the ability to meet new people who share h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • “I can't lie anymore!”: The implications of location automation for mobile social applications

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (3)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2945 KB) | HTML iconHTML

    Human factors research has shown that automation is a mixed blessing. It changes the role of the human in the loop with effects on understanding, errors, control, skill, vigilance, and ultimately trust and usefulness. We raise the issue that many current mobile applications involve mechanisms that surreptitiously collect and propagate location information among users and we provide results from th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security for pervasive medical sensor networks

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (7)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (4727 KB) | HTML iconHTML

    Wireless sensor networks are going to allow for ubiquitous health monitoring, improving users' well-being, the healthcare system, and helping to quickly react on emergency situations. Meeting the strict security needs of these ubiquitous medical applications is a big challenge, since safety and privacy of medical data has to be guaranteed all the way from the sensor nodes to the back-end services,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EagleVision: A pervasive mobile device protection system

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (1)  |  Patents (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (7249 KB) | HTML iconHTML

    Mobile devices like laptops, iPhones and PDAs are highly susceptible to theft in public places like airport terminal, library and cafe. Moreover, the exposure of sensitive data stored in the mobile device could be more damaging than the loss of device itself. In this work, we propose and implement a pervasive mobile device protection system, named EagleVision, based on sensing and wireless network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (2)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (7140 KB) | HTML iconHTML

    Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication between senders (sensors) and receivers (e.g., mobile data collectors, static sinks). The lack of real-time communication forces sensors to accumulate the sensed data possibly for long time periods, along with the corresp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and evaluation of a mobile tetherless VoIP/PSTN gateway

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (8034 KB) | HTML iconHTML

    A voice-over-IP (VoIP) gateway bridges IP-based packet-switched networks (i.e. Internet) with public circuit-switched telephone networks (i.e. PSTN). The key building block of a VoIP gateway is a telephony card that interfaces with the PSTN and converts signals from the PSTN to bits that can be manipulated by a computer and vice versa. Because commercially available telephony cards only work with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based fault Diagnosis for IEEE 802.11 wireless LANs

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (2)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (10323 KB) | HTML iconHTML

    The increasingly deployed IEEE 802.11 wireless LANs (WLANs) challenge traditional network management systems because of the shared open medium and the varying channel conditions. There needs to be an automated tool that can help diagnosing both malicious security faults and benign performance faults. It is often difficult, however, to identify the root causes since the manifesting anomalies from n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On real-time capacity of event-driven data-gathering sensor networks

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2394 KB) | HTML iconHTML

    Network capacity is a critical feature of wireless ad hoc and sensor networks. It is particularly challenging to determine network capacity when combined with other performance objectives such as timeliness. This paper investigates real-time capacity for event-driven data-gathering sensor networks with the unbalanced many-to-one traffic pattern. First, we compute the average allowable throughputs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EcoPlex: Empowering compact wireless sensor platforms via roaming and interoperability support

    Publication Year: 2009, Page(s):1 - 9
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (11521 KB) | HTML iconHTML

    EcoPlex is an infrastructure that enables simple wireless platforms to participate seamlessly in a feature-rich, wireless ad hoc network. EcoPlex consists of gateways that are responsible for handoff support for mobility and high data rate without burdening the simple nodes to implement multi-hop protocols. The gateways also create virtual identities for simpler nodes to enable their participation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive wireless services for augmented environments

    Publication Year: 2009, Page(s):1 - 8
    Cited by:  Papers (1)  |  Patents (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (9916 KB) | HTML iconHTML

    This paper presents a system that combines mobile services, ubiquitous computing, and augmented reality concepts in order to bring the kind of information-rich environment, which is currently limited to computer screens, to the physical world. This objective is achieved by constructing an architecture based on existing wireless Web application and sensor network technologies. Users of the system a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MOBIX: System for managing mobility using information exchange

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (4256 KB) | HTML iconHTML

    It is evident that mobile devices of the future will have multiple wireless interfaces. For small, energy-constrained devices, determining network availability by keeping all radio interfaces turned on at all times will negatively impact battery lifetime even when these interfaces are idle. Predicting future network availability from user history requires a period of training and learning user hab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Co-locator context

    Publication Year: 2009, Page(s):1 - 7
    Cited by:  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1941 KB) | HTML iconHTML

    Having reliable context sources is very important for context-aware applications and the devices around a user can be a useful context for many applications. While the importance of `devices around' as a context has been highlighted many times, to the best of our knowledge, there is no systematic mechanism reported to identify and capture this context. In this paper we report our mechanism for ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DiaSim: A parameterized simulator for pervasive computing applications

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (7742 KB) | HTML iconHTML

    Pervasive computing applications involve both software concerns, like any software system, and integration concerns, for the constituent networked devices of the pervasive computing environment. This situation is problematic for testing because it requires acquiring, testing and interfacing a variety of software and hardware entities. This process can rapidly become costly and time-consuming when ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flockfs, a moderated group authoring system for wireless workgroups

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (4812 KB) | HTML iconHTML

    This paper describes the design and implementation of a group authoring system for wireless users. Our analysis of the behavior of various groupware systems using wireless user availability traces showed that prior systems would have performed poorly, especially during peak availability durations when many group members were simultaneously available. These results motivate our design choices. floc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.