Third IEEE International Conference on Pervasive Computing and Communications Workshops

8-12 March 2005

Filter Results

Displaying Results 1 - 25 of 97
  • Third IEEE International Conference on Pervasive Computing and Communications Workshops - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Third IEEE International Conference on Pervasive Computing and Communications Workshops - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Third IEEE International Conference on Pervasive Computing and Communications Workshops - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Third IEEE International Conference on Pervasive Computing and Communications Workshops - Table of contents

    Publication Year: 2005, Page(s):v - x
    Request permission for reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2005, Page(s): xi
    Request permission for reuse | PDF file iconPDF (105 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshops Chairs

    Publication Year: 2005, Page(s): xii
    Request permission for reuse | PDF file iconPDF (105 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshop Chair

    Publication Year: 2005, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (28 KB) | HTML iconHTML
    Freely Available from IEEE
  • Workshop organization

    Publication Year: 2005, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Hybrid context model based on multilevel situation theory and ontology for contact centers

    Publication Year: 2005, Page(s):3 - 7
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (95 KB) | HTML iconHTML

    Context awareness and context modeling have raised their call for attention and importance quite recently in the world of contact centers for better customer services and relations. To address the issues of contextual reuse and contextual inconsistencies, there is a need for context models that foster context reuse and support ease of retrieving right kind of information by providing appropriate a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metamodel approach to context information

    Publication Year: 2005, Page(s):8 - 14
    Cited by:  Papers (13)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    In order to enable a common understanding of context information we introduce a modeling concept that embraces four abstraction layers from meta-metamodel and metamodel to model and instance layer. Being compliant to OWL DL we especially consider the ability of reasoning over the information and the modeling of quality attributes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RDF-based model for context-aware reasoning in rich service environment

    Publication Year: 2005, Page(s):15 - 19
    Cited by:  Papers (18)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    We present a framework for utilizing context-awareness for classifying services. We also present a novel RDF-based model for context-aware reasoning in pervasive computing environment. Our model enables a flexible way of describing context-based rules that can be used for constructing prioritized service lists and also for giving recommendations about certain available services. In addition, the m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending context models for privacy in pervasive computing environments

    Publication Year: 2005, Page(s):20 - 24
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (100 KB) | HTML iconHTML

    Privacy is widely recognised as a significant obstacle inhibiting the adoption of context-aware applications. In order to remove this obstacle, advances are required in many areas of context-awareness research. In this paper, we address the incorporation of privacy support into context models. In particular, we present extensions to our context modelling approach that address the challenges of ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benefits of Integrating Meta Data into a Context Model

    Publication Year: 2005, Page(s):25 - 29
    Cited by:  Papers (15)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (86 KB) | HTML iconHTML

    Meta data - data about data - improves the value of the operational data by giving applications and users additional information on the data's origin, its precision or staleness. We outline the benefits of modeling meta data in context models: it can be used for resource finding, enhanced data selection, trust and data quality issues and sensor fusion. We show how meta data included into an object... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards integrated design of context-sensitive interactive systems

    Publication Year: 2005, Page(s):30 - 34
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (96 KB) | HTML iconHTML

    Programs on mobile (and embedded) devices can greatly benefit from the integration of context information to create a more pleasant user experience. This is only the case when it supports and not decreases the performance of the user. It is therefore equally important to describe context as to integrate the context specification in the design of (user interfaces for) interactive systems. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic development of an abstract context model for an intelligent environment

    Publication Year: 2005, Page(s):35 - 39
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (113 KB) | HTML iconHTML

    This paper addresses the problem of learning in intelligent environments. An intelligent environment perceives user activity and offers a number of services according to the perceived information about the user. An abstract context model in the form of a situation network is used to represent the intelligent environment, its occupants and their activities. The objective is to adapt the system serv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the Technical Program Chairs

    Publication Year: 2005, Page(s): xv
    Request permission for reuse | PDF file iconPDF (149 KB) | HTML iconHTML
    Freely Available from IEEE
  • Workshop organization

    Publication Year: 2005, Page(s): xvi
    Request permission for reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Mapping of file-sharing onto mobile environments: enhancement by UMTS

    Publication Year: 2005, Page(s):43 - 49
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    Peer-to-peer (P2P) file-sharing has become the killer application in the Internet with respect to traffic volume which is even surpassing Web usage. This characteristic makes P2P commercially attractive to network operators interested in increased traffic. In parallel, the demand for wireless services has caused wireless networks to grow enormously. We assume that P2P file-sharing will be mapped o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy efficient data retrieval and caching in mobile peer-to-peer networks

    Publication Year: 2005, Page(s):50 - 54
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    Mobile peer-to-peer (MP2P) networks consist of mobile devices that communicate with each other via short-range wireless transmissions to facilitate sharing of information among them. Such networks present a constrained communication environment due to fundamental limitations of battery power and wireless bandwidth, and users' frequent mobility. These characteristics of MP2P networks make scalable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A lightweight service discovery mechanism for mobile ad hoc pervasive environment using cross-layer design

    Publication Year: 2005, Page(s):55 - 59
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (78 KB) | HTML iconHTML

    This paper presents a lightweight service discovery mechanism for the mobile ad hoc pervasive environment, applying cross-layer design to reduce the infrastructure and protocol overhead, and to improve service accessibility. Integrated with the network routing layer, the proposed mechanism automatically identifies the proper service discovery model for the current network configuration. The soluti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Pastry to CrossROAD: CROSS-layer ring overlay for ad hoc networks

    Publication Year: 2005, Page(s):60 - 64
    Cited by:  Papers (30)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    P2P systems for mobile ad hoc networks are currently an open research area. Most of the existent solutions were thought for the wired networks, where thousands of nodes participate to the same service, while ad hoc networks are generally characterized by limited dimensions and scarce resources. In this paper, a performance evaluation of a structured P2P system (Pastry), running on a real ad hoc ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling reliable many-to-many communication in ad-hoc pervasive environments

    Publication Year: 2005, Page(s):65 - 69
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (108 KB) | HTML iconHTML

    In order for pervasive computing to realize its full potential, pervasive applications have to be able to operate without support from fixed communication infrastructure at least some of the time. Sophisticated applications emerging in this domain will have to rely on the cooperation of groups of wireless devices in a peer-to-peer (P2P) fashion to accomplish their task. A number of such applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Every node is born equal: attacking preferential attachment in peer-to-peer mobile multihop networks

    Publication Year: 2005, Page(s):70 - 74
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (3973 KB) | HTML iconHTML

    A mobile peer-to-peer (P2P) network must guarantee a balanced utilization of the equal-capacity nodes; otherwise it may result in early death of overloaded nodes due to their battery exhaustion. It not only means a discontinuation of certain services offered by them but also causes other services to be disconnected. This is because every node plays an important role as a router in multihop mobile ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pervasive communication for commuters in public buses

    Publication Year: 2005, Page(s):75 - 79
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (818 KB) | HTML iconHTML

    Using inter-vehicular communications as a mobile backbone has been an area of active research in recent years. We propose a pervasive mobile communication network that utilises our BUSNet to provide Internet access for the public transportation system such as buses, taxi and trains. These vehicles act as the wireless backbone which connects to the Internet. Thus, users of cellular network can have... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mobile system of super-peers using city buses

    Publication Year: 2005, Page(s):80 - 85
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (113 KB) | HTML iconHTML

    Recently, researchers have introduced the notion of super-peers to improve signaling efficiency as well as lookup performance of peer-to-peer (P2P) systems. In a separate development, recent works on applications of mobile ad hoc networks (MANET) have seen several proposals, e.g. in the paper by Wong (2003) and Jetcheva et al. (2003), on utilizing mobile fleets such as city buses to deploy a mobil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.