International Workshop on Ubiquitous Data Management

4-4 April 2005

Filter Results

Displaying Results 1 - 23 of 23
  • Proceedings. International Workshop on Ubiquitous Data Management

    Publication Year: 2005
    Request permission for reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • International Workshop on Ubiquitous Data Management - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • International Workshop on Ubiquitous Data Management - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • International Workshop on Ubiquitous Data Management - Table of contents

    Publication Year: 2005, Page(s):v - vi
    Request permission for reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2005, Page(s): vii
    Request permission for reuse | PDF file iconPDF (62 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Chair

    Publication Year: 2005, Page(s): viii
    Request permission for reuse | PDF file iconPDF (63 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2005, Page(s): ix
    Request permission for reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2005, Page(s): x
    Request permission for reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • The role of context for information mediation

    Publication Year: 2005, Page(s):3 - 5
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (85 KB)

    Mediating between available information objects and individual information needs is a central issue within the information society. In the simplest case this is an information request answered by a search engine based on the analysis of the content of individual information objects within an information collection that may be a digital library, but also the World Wide Web. However, neither the inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Somebody, sometime, somewhere, something [ubiquitous computing]

    Publication Year: 2005, Page(s):6 - 13
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    The success of the Web and of portable devices has made popular the idea that any information could be made available to anybody, anytime, and anywhere. Other paradigms are taking off within the ubiquitous computing solutions. This paper identifies some of these paradigms, focusing on the more innovative ones in terms of information services. In particular, broadcast-based and location-based servi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context for ubiquitous data management

    Publication Year: 2005, Page(s):17 - 24
    Cited by:  Papers (17)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    In response to the advance of ubiquitous computing technologies, we believe that for computer systems to be ubiquitous, they must be context-aware. In this paper, we address the impact of context-awareness on ubiquitous data management. To do this, we overview different characteristics of context in order to develop a clear understanding of context, as well as its implications and requirements for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-based preference analysis method in ubiquitous commerce

    Publication Year: 2005, Page(s):25 - 32
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (508 KB) | HTML iconHTML

    As the age of ubiquitous commerce is upon us, personalization service is getting interested. Therefore, the recommendation methods that offer useful information to the customers become more important. However, most of them depend on a specific method and are restricted to the e-commerce. For applying these recommendation methods into U-commerce, first it is necessary that the extended context mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless sensor networks: from data to context to energy saving

    Publication Year: 2005, Page(s):33 - 40
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Wireless sensor networks are an important component of the broad framework of ubiquitous computing and are increasingly deployed in a wide range of applications and scenarios. There are many challenging issues that pertain to sensor data management, typically in the areas of analysing this data and communicating this data. In this paper, we present a novel use of sensor readings/data in wireless s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context Awareness: a Practitioner's Perspective

    Publication Year: 2005, Page(s):43 - 52
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Context awareness allows applications to adapt themselves to their computing environment in order to better suit the needs of the user. Such a capability is critical to pervasive computing because it promises to reduce the demand for human attention, which arguably is the most limited resource in an environment saturated with computing and communication capability. This paper reflects on our exper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges and opportunities of context-aware information access

    Publication Year: 2005, Page(s):53 - 60
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Ubiquitous computing environments embedding a wide range of pervasive computing technologies provide a challenging and exciting new domain for information access. Individuals working in these environments are increasingly permanently connected to rich information resources. An appealing opportunity of these environments is the potential to deliver useful information to individuals either from thei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous data management in knowledge sifter via data-DNA

    Publication Year: 2005, Page(s):63 - 70
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    This paper proposes to model and represent an object's digital persona by means of a conceptual model that uses fragments of schemata that are termed data-DNA. The object may be a person, place or thing of interest; it may be either physical or virtual; and it supports interactions between and among objects. The goal is to provide a framework in which to represent an object's context, capabilities... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A ubiquitous photo mapping considering users' lines of sight

    Publication Year: 2005, Page(s):71 - 77
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    This paper proposes a new framework for mapping and retrieving photographs, maps and cyberspaces to each other. Our target photographs are enhanced with spatial metadata such as geographic coordinates where they were taken and directions where they focused on. We assume photographs having such spatial metadata become popular. In a common framework, such photographs are mapped to their viewpoints b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient protocol for disseminating consistent data in broadcast environments

    Publication Year: 2005, Page(s):78 - 85
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (675 KB) | HTML iconHTML

    In this paper we present a novel protocol for disseminating data in broadcast environments such that view consistency, a useful but less restrictive correctness criterion, is guaranteed. Our protocol is based on concurrency control information that captures the read-from relations between update transactions. The concurrency control information is small in size but precise enough for reducing unne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A ubiquitous computing environment composed by cooperation between visual markers and event-driven compact devices

    Publication Year: 2005, Page(s):86 - 93
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    In this paper, we propose a new ubiquitous computing environment composed by visual markers and event-driven compact devices. We employ the VCC (visual computer communication) method, which we have already proposed as an information displaying method for visual markers. In the VCC method, a marker is composed of multiple tiles whose color changes at a certain interval of time, by which the marker ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding periodic outliers over a monogenetic event stream

    Publication Year: 2005, Page(s):97 - 104
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    Sensors are active everywhere. Enormous volumes of sensed events are sent over the data streams, while most of applications want to focus on events that would be curious. We propose a technique for mining periodicities and predicting its outliers from the stream. The key to our technique is a simple periodic pattern /spl Delta/t, derived from delta-time mining, or SUP(t, t+/spl Delta/t). We provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining temporal moving patterns in object tracking sensor networks

    Publication Year: 2005, Page(s):105 - 112
    Cited by:  Papers (15)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Advances in wireless communication and microelectronic devices technologies have enabled the development of low-power micro-sensors and the deployment of large-scale sensor networks. With the capabilities of pervasive surveillance, sensor networks can be very useful in a lot of commercial and military applications for collecting and processing the environmental data. One of the very interesting re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing BDFS(b) with diff-sets for real-time frequent pattern mining in dense datasets - first findings

    Publication Year: 2005, Page(s):113 - 120
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Finding frequent patterns from databases has been the most researched topic in association-rule mining. Business-intelligence using data mining has felt an increased thrust for real-time frequent pattern mining algorithms finding huge demand from numerous real-time business applications like e-commerce, recommender-systems, group-decision-support-systems, supply-chain-management, to name a few. La... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2005, Page(s): 121
    Request permission for reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE