By Topic

Sixth IEEE Workshop on Mobile Computing Systems and Applications

3-3 Dec. 2004

Filter Results

Displaying Results 1 - 25 of 30
  • Proceedings. Sixth IEEE Workshop on Mobile Computing Systems and Applications

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (274 KB)
    Freely Available from IEEE
  • Sixth IEEE Workshop on Mobile Computing Systems and Applications - Title Pages

    Publication Year: 2004, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Sixth IEEE Workshop on Mobile Computing Systems and Applications - Copyright Page

    Publication Year: 2004, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Sixth IEEE Workshop on Mobile Computing Systems and Applications - Table of contents

    Publication Year: 2004, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Message from the Workshop Chairs

    Publication Year: 2004, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (30 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2004, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2004, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2004, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Enriched media-experience of sport events

    Publication Year: 2004, Page(s):2 - 9
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    This paper describes a system where Internet-enabled sensor technology was integrated into a context-aware platform to give viewers of sport events an enriched media experience. The system was developed as a proof of concept and was evaluated during real-life use at the Vasaloppet crosscountry ski event. Using Bluetooth wireless ad-hoc networking and GPRS technology, sensor data was transmitted fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physical posters as gateways to context-aware services for mobile devices

    Publication Year: 2004, Page(s):10 - 19
    Cited by:  Papers (6)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    In this paper we describe the usage of physical posters as gateways to mobile services that are related to advertisements and information presented on these posters. In our approach the user can interact through a mobile device with services that are represented by a poster. Our aim is to create a system that allows seamless and natural interaction of users with posters. Our work is based on a req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CSCW system for distributed search/collection tasks using wearable computers

    Publication Year: 2004, Page(s):20 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    In this paper, we define the cooperative activities using wearable computers outdoors as WCSCW: wearable computer supported cooperative work, and assess the value of a WCSCW system for search/collection tasks. The system provides history information as well as real-time communication support. The workers searched and reconstructed the scattered (geographically distributed) puzzle pieces in three c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of wide area user mobility patterns

    Publication Year: 2004, Page(s):30 - 40
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    In this paper, we present an analysis of user behavior and mobility patterns based on a trace of accesses to a department e-mail server. In contrast to previous studies, we consider a single service and examine how a user community connects to it while moving across a variety of different service providers' wireless and wired networks. By measuring an e-mail service, one that users access often, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User mobility for opportunistic ad-hoc networking

    Publication Year: 2004, Page(s):41 - 50
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    As mobile devices become increasingly pervasive and commonly equipped with short-range radio capabilities, we observe that it might be possible to build a network based only on pair-wise contact of users. By using user mobility as a network transport mechanism, devices can intelligently route latency-insensitive packets using power-efficient short-range radio. Such a network could provide communic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cell-ID location technique, limits and benefits: an experimental study

    Publication Year: 2004, Page(s):51 - 60
    Cited by:  Papers (46)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    The mobile phone market lacks a satisfactory location technique that is accurate, but also economical and easy to deploy. Current technology provides high accuracy, but requires substantial technological and financial investment. In this paper, we present the results of experiments intended to asses the accuracy of inexpensive Cell-ID location technique and its suitability for the provisioning of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using stigmergy to co-ordinate pervasive computing environments

    Publication Year: 2004, Page(s):62 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Pervasive computing environments have proven difficult to develop in a form that supports the integration and organisation of devices and applications in a spontaneous and transparent manner. This is partly due to the highly dynamic and unpredictable nature of these types of environments, and is often further hampered by the limited resources found on devices. In this paper, we present a highly de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous computing using wireless broadcast

    Publication Year: 2004, Page(s):72 - 81
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Ubiquitous computing applications collect information from a variety of sources so as to provide behavior that is tailored to the user's context. Typically, client devices connect through appropriate middleware and wireless infrastructure to a variety of services and data sources and, increasingly, local sensor data. In this paper, we present a different approach to constructing ubiquitous computi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards distributed awareness - an artifact based approach

    Publication Year: 2004, Page(s):82 - 91
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    Perception is a central issue for many applications in ubiquitous computing. However, in current implementations, sensing and distributed perception is re-invented over and over again. Identifying commonalities and synthesizing a common model would be more effective both from an economic as well as scientific perspective. We have analyzed the properties of ubicomp perception systems and used their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anticipatory routing for highly mobile endpoints

    Publication Year: 2004, Page(s):94 - 100
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    We consider the problem of routing to endpoints with very high "effective" mobility, i.e, when the period between changes in an endpoint's location is comparable to the time it takes for the location tracking mechanism to converge. This could happen due to increased endpoint speed, increased control message latency, or decreased cell size. When this happens, conventional location tracking approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do?

    Publication Year: 2004, Page(s):102 - 111
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Several misbehavior detection and reputation systems have been proposed for mobile ad-hoc networks, relying on direct network observation mechanisms, so-called watchdogs. While these approaches have so far only been evaluated in simulations and restricted to selfish packet dropping, we are interested in the capabilities of a watchdog detection component in a real network. In this paper, we present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new network abstraction for mobile and ubiquitous computing environments in the Plan B operating system

    Publication Year: 2004, Page(s):112 - 121
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Today, there are several different communication interfaces available and we plug/unplug them at will. However, our network programming interfaces remain similar to those used when there was at most one network interface. As a result, applications must struggle with the problem of adapting to changes in network facilities: they must select the appropriate network, switch to another when the curren... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Community-driven adaptation: automatic content adaptation in pervasive environments

    Publication Year: 2004, Page(s):124 - 133
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    Mobile devices are increasingly being used to access Web content but lack the resources for proper presentation to the user. To address this problem, content is typically adapted to be more suitable for a mobile environment. Community-driven adaptation (CDA) is a novel approach to automatic content adaptation for mobile devices that adapts content based on feedback from users. CDA groups users int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instant personalization and temporary ownership of handheld devices

    Publication Year: 2004, Page(s):134 - 143
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    As we increasingly depend on inexpensive handheld devices at work and in daily living, ensuring the accessibility of those devices and the availability of the personalized services they provide becomes a major challenge. In this paper, we present a system for instant personalization and temporary ownership of mobile devices that addresses these issues. The system enables the user to make the trans... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information transfer techniques for mobile devices by "toss" and "swing" actions

    Publication Year: 2004, Page(s):144 - 151
    Cited by:  Papers (5)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2704 KB) | HTML iconHTML

    In recent years, mobile devices have rapidly penetrated into our daily lives. Several drawbacks of mobile devices have been mentioned so far, such as their limited computational capability, small screen real estate, and, so on, as compared with notebook or desktop computers. However, by fully utilizing the most notable feature of mobile devices, that is, mobility, we can explore possibilities for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-to-peer information sharing in a mobile ad hoc environment

    Publication Year: 2004, Page(s):154 - 162
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    With the rapidly increasing adoption of more and more powerful wireless-enabled personal mobile devices, users are facing new opportunities and challenges in making connections with other users in order to share relevant information. This is especially true, given the dynamic nature of potential interactions between typical mobile users. Peer-to-peer applications have established themselves as a p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ekta: an efficient DHT substrate for distributed applications in mobile ad hoc networks

    Publication Year: 2004, Page(s):163 - 173
    Cited by:  Papers (75)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Distributed hash tables (DHTs) have proven to be a novel and efficient platform for building a variety of scalable and robust distributed applications like content sharing and location in the Internet. Similar to those in the Internet, distributed applications and network services in mobile ad hoc networks (MANETs) can potentially benefit from the deployment of a DHT. However, bandwidth limitation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.