ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.

11-14 July 2005

Filter Results

Displaying Results 1 - 25 of 97
  • Proceedings. International Conference on Pervasive Services 2005 (IEEE Cat. No. 05EX1040)

    Publication Year: 2005
    Request permission for reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2005, Page(s): 0_2
    Request permission for reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • Proceedings of the IEEE International Conference on Pervasive Services

    Publication Year: 2005, Page(s): i
    Request permission for reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2005, Page(s): ii
    Request permission for reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):iii - viii
    Request permission for reuse | PDF file iconPDF (684 KB)
    Freely Available from IEEE
  • Welcome

    Publication Year: 2005, Page(s): ix
    Request permission for reuse | PDF file iconPDF (112 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2005, Page(s): x
    Request permission for reuse | PDF file iconPDF (128 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization

    Publication Year: 2005, Page(s): xi
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Program committee

    Publication Year: 2005, Page(s): xii
    Request permission for reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • List of reviewers

    Publication Year: 2005, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2005, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2005, Page(s): 1
    Request permission for reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2005, Page(s): 2
    Request permission for reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • Key technologies for wireless networking in the next decade

    Publication Year: 2005
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    Summary form only given. Key technologies such as wireless sensor networks, sensor and actor networks, WiMAX, wireless mesh networks, hybrid networks, are presented and several research challenges are highlighted. Predictions about the wireless technology development for the next decade are listed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing trust in distributed environments

    Publication Year: 2005
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (107 KB) | HTML iconHTML

    Summary form only given. In pervasive computing the involved agents and services must organize themselves dynamically both in cooperative and non-cooperative environments in order to enable sharing of distributed resources and knowledge discovery. Provisioning of trusted services appears to be an important factor to enable the success of this new computing paradigm. Reputation-based trust manageme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2005, Page(s): 5
    Request permission for reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2005, Page(s): 6
    Request permission for reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • Multi-criteria routing in pervasive environment with sensors

    Publication Year: 2005, Page(s):7 - 16
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1645 KB) | HTML iconHTML

    Interconnected computing nodes in pervasive systems demand efficient management to ensure longevity and effectiveness. This is particularly true when we consider wireless sensor networks, for which we propose a new scheme for adaptive route management. There have been numerous studies that have looked at the routing of data in sensor networks with the sole intention of reducing communication power... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous middleware framework for sensor networks

    Publication Year: 2005, Page(s):17 - 26
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1919 KB) | HTML iconHTML

    Programming sensor networks currently is a subtle task not because of enormous amount of code but due to inherent limitations of embedded hardware like the power, memory, network bandwidth and clock speed. In addition, there are very few programming abstractions and standards available which lead to close coupling between the application code and the embedded OS requiring understanding of low-leve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-end performance characterization of Sensornet multi-hop routing

    Publication Year: 2005, Page(s):27 - 36
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1712 KB) | HTML iconHTML

    This paper brings out the current state of art in multi-hop routing techniques for sensor networks, specifically for many-to-one periodic data collection. We evaluate the routing layers on a large scale Sensornet testbed of 100 nodes where the nodes are densely spaced. The evaluation was focused on trying to short list the routing layer with the best data reliability. Such an evaluation is expecte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structure-less content-based routing in mobile ad hoc networks

    Publication Year: 2005, Page(s):37 - 46
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1573 KB) | HTML iconHTML

    The decoupling and asynchrony properties of the content-based publish-subscribe paradigm makes it very appealing for dynamic wireless networks, like those that often occur in pervasive computing scenarios. Unfortunately, none of the currently available content-based publish-subscribe middleware fit the requirements of such extreme scenarios in which the network is subject to very frequent topologi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual port-based channel level mobility management middleware in heterogeneous wireless networks

    Publication Year: 2005, Page(s):47 - 56
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1721 KB) | HTML iconHTML

    The future communication trend in the Internet is rapidly moving towards mobile and pervasive computing. This emphasizes the network-dependency of terminals and applications, thus making a seamless and ubiquitous connectivity highly feasible. The mobility management of heterogeneous wireless resources is a key issue for this emerging paradigm. This paper presents the design and implementation of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2005, Page(s): 57
    Request permission for reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2005, Page(s): 58
    Request permission for reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • A fault localized scheme for false report filtering in sensor networks

    Publication Year: 2005, Page(s):59 - 68
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1734 KB) | HTML iconHTML

    Sensor networks frequently deploy many tiny and inexpensive devices over large regions to detect events of interest. It can be easy to compromise sensors, enabling attackers to use the keys and other information stored at the sensors to inject false reports, forging fake events. Existing approaches do not localize the impact of such node compromises, so that compromises in one sensing region may c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.