IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second

14-17 March 2004

Filter Results

Displaying Results 1 - 25 of 66
  • PerCom Workshops 2004. Second IEEE Annual Conference on Pervasive Computing and Communications Workshops

    Publication Year: 2004
    Request permission for reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Industry sponsors

    Publication Year: 2004, Page(s): ii
    Request permission for reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Proceedings Second IEEE Annual Conference on Pervasive Computing and Communications Workshops

    Publication Year: 2004, Page(s): iii
    Request permission for reuse | PDF file iconPDF (343 KB)
    Freely Available from IEEE
  • Copyright

    Publication Year: 2004, Page(s): iv
    Request permission for reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):v - viii
    Request permission for reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2004, Page(s): ix
    Request permission for reuse | PDF file iconPDF (155 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshops Chairs

    Publication Year: 2004, Page(s): x
    Request permission for reuse | PDF file iconPDF (156 KB) | HTML iconHTML
    Freely Available from IEEE
  • International Workshop on Context Modeling and Reasoning (COMOREA'04) - Message from the workshop chair

    Publication Year: 2004, Page(s): xi
    Request permission for reuse | PDF file iconPDF (156 KB) | HTML iconHTML
    Freely Available from IEEE
  • CoMoRea '04 workshop organization

    Publication Year: 2004, Page(s): xii
    Request permission for reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • First International Workshop on Mobile Peer-to-peer Computing (MP2P'04) Message from the Workshop Co-Chairs

    Publication Year: 2004, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (154 KB) | HTML iconHTML
    Freely Available from IEEE
  • MP2P'04 workshop organization

    Publication Year: 2004, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Workshop on Pervasive Computing and Communications Security (PerSec'04) - Message from the workshop co-chairs

    Publication Year: 2004, Page(s): xv
    Request permission for reuse | PDF file iconPDF (156 KB) | HTML iconHTML
    Freely Available from IEEE
  • PerSec '04 workshop organization

    Publication Year: 2004, Page(s): xvi
    Request permission for reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Workshop on Middleware Support for Pervasive Computing (PerWare '04) - Message from the workshop organizers

    Publication Year: 2004, Page(s): xvii
    Request permission for reuse | PDF file iconPDF (152 KB) | HTML iconHTML
    Freely Available from IEEE
  • PerWare '04 workshop organization

    Publication Year: 2004, Page(s): xviii
    Request permission for reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Workshop on Pervasive Computing Education (PerEd '04) - Message from the workshop chair

    Publication Year: 2004, Page(s): xix
    Request permission for reuse | PDF file iconPDF (157 KB) | HTML iconHTML
    Freely Available from IEEE
  • PerEd '04 workshop organization

    Publication Year: 2004, Page(s): xx
    Request permission for reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • A path-based RDF query language for CC/PP and UAProf

    Publication Year: 2004, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    By introducing a new method to apply a path expression to RDF queries, we present a new path-based RDF query language, RPath, for CC/PP and UAProf. CC/PP and UAProf, two of the applications of RDF, are standards that describe the context of both users and devices. To achieve high service levels, content adaptation systems must address user and device information effectively. RPath is designed to i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context aware retrieval in Web-based collaborations

    Publication Year: 2004, Page(s):8 - 12
    Cited by:  Papers (3)  |  Patents (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Provisioning goal specific information to the team enhances efficiency of the team. Context awareness is very important to provide such relevant information. We propose a context aware information retrieval system that retrieves, and presents, information of high utility to a user - taking into account user's implicit need for information, capabilities of the user's access device, and other resour... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contextual ConcurTaskTrees: integrating dynamic contexts in task based design

    Publication Year: 2004, Page(s):13 - 17
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Much research has been done on how context can be gathered and how the task of harvesting the context information can be made as easy as possible for application developers. However, less research has been done on how to design a system that adapts to the context while being active. We present contextual ConcurTaskTrees, a notation that combines the specification of dynamic context and tasks. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology based context modeling and reasoning using OWL

    Publication Year: 2004, Page(s):18 - 22
    Cited by:  Papers (196)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Here we propose an OWL encoded context ontology (CONON) for modeling context in pervasive computing environments, and for supporting logic-based context reasoning. CONON provides an upper context ontology that captures general concepts about basic context, and also provides extensibility for adding domain-specific ontology in a hierarchical manner. Based on this context ontology, we have studied t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a better understanding of context attributes

    Publication Year: 2004, Page(s):23 - 27
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    The use of context as an input is one of the major characteristics of ubiquitous computing systems. We look into the structural and the systematic features of context in ubiquitous computing environments and their possible influence on context computing and the design of context-aware applications. We give a definition regarding an understanding of context and how it is derived at a systematic lev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling context-based security policies with contextual graphs

    Publication Year: 2004, Page(s):28 - 32
    Cited by:  Papers (12)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Security is top priority for pervasive applications, for which the number of reported incidents is in constant increase. Context-based security is an emerging approach. It aims at coping with the security problems resulting from the high heterogeneity and dynamicity of such environments. In this paper, we propose a new model for policies specification based on contextual graphs. It relies on a set... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and using imperfect context information

    Publication Year: 2004, Page(s):33 - 37
    Cited by:  Papers (83)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Most recently developed context-aware software applications make unrealistic assumptions about the quality of the available context information, which can lead to inappropriate actions by the application and frustration on the part of the user. Here, we explore the problem of imperfect context information and some of its causes, and propose a novel approach for modelling incomplete and inaccurate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a theory of context spaces

    Publication Year: 2004, Page(s):38 - 42
    Cited by:  Papers (65)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    We propose initial work on a conceptual framework for context-aware systems, towards a general context model to aid thinking, describing, manipulating and utilizing context. Much work on context-aware computing have utilized context in specialized applications, with application-specific software (and perhaps hardware) and specialized context representation and manipulation. Context-aware systems a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.