2006 First International Symposium on Pervasive Computing and Applications

3-5 Aug. 2006

Filter Results

Displaying Results 1 - 25 of 182
  • From Robotics to Pervasive Computing Environments

    Publication Year: 2006, Page(s):1 - 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    This talk proposes that the digital home is virtually identical to the software and hardware architecture used to construct mobile robots leading to the proposition that "pervasive computing environments can be regarded as robots that we live inside". The author argue that it is possible and rational to apply robotic techniques to pervasive computing problems in the digital home View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Campus

    Publication Year: 2006, Page(s): 3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB)

    Summary form only given. A number of stakeholders have an interest in the features on any learning environment. Amongst these stakeholders, are the institutional managers, the teaching staff and the students. Institutional managers are primarily concerned with the economic use of the institution's resources. Teaching staff are concerned with the effective and efficient delivery of teaching materia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How the "What" Becomes the "How"

    Publication Year: 2006, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    Summary form only given. There have been growing interest in pervasive computing environments. Peppered with wireless, mobile and embedded devices, such environments are characterized by a degree of dynamism not common in traditional distributed systems. A fundamental problem highlighted by such emerging environments is how to satisfy and sustain an application's service requirements in the face o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pervasive Computing: Implications, Opportunities and Challenges for the Society

    Publication Year: 2006, Page(s): 5
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    Summary form only given. Pervasive computing, also referred to sometimes as ubiquitous computing deals with the idea of making "computing power" available anyplace, anytime in a uniform way so that it may be exploited for meeting the challenges faced by society. The obvious analogy to this is the electric power infrastructures, which made the society's work and play more effective and enjoyable. C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context Awareness, the Spirit of Pervasive Computing

    Publication Year: 2006, Page(s): 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    Summary form only given. The main ideas of pervasive/ubiquitous computing include 1) the fusion of cyberspace and physical space, 2) the distraction-free computing. Context awareness is the effort for computer systems to sense and leverage the rich context information in the dual space. It has been recognized as a promising approach to reach the goal of invisibility, which can provide attentive se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMS Mass Data Processing Gird

    Publication Year: 2006, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    Summary form only given. The purpose of AMS experiment is to look for the source of the dark matter, source of the cosmic ray and the universe made of antimatter. The characteristics of AMS experiment are massive data and complicated computing. The data are frequently transmitted, retrieved and processed among the computing nodes located in USA, Europe and China. In this talk, speaker introduces t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-Based Service-Oriented Computing and Applications

    Publication Year: 2006, Page(s):8 - 9
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    Summary form only given. Service-oriented computing (SOC) is considered as a new computing paradigm after the object-oriented computing paradigm. It utilizes services as fundamental elements for applications/solutions. Services are autonomous platform-independent computational elements that can be described, published, discovered, orchestrated and programmed using XML for the purpose of developing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contextual Computing

    Publication Year: 2006, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    Contextual computing research aims to develop systems incorporating awareness of and the ability to adapt to user context. A dictionary definition of context may state: "the context of an idea or event is the general situation that relates to it and which helps it to be understood." In contextual computing, context should include information to enable systems to achieve timely and precise understa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2006 1st International Symposium on Pervasive Computing and Applications Proceedings

    Publication Year: 2006, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (291 KB)
    Freely Available from IEEE
  • A CORBA Trader-based Dynamic Binding Infrastructure in Pervasive Computing

    Publication Year: 2006, Page(s):12 - 16
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5460 KB) | HTML iconHTML

    Pervasive computing environments are far more dynamic and heterogeneous than enterprise environments, in which, the computing is invisible for users, but they may still enjoy its services perfectly. In order to realize this stirring idea, the system needs to automatically discover, use the devices and services. The paper introduces A CORBA trader-based dynamic binding infrastructure called CTDBI t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Copyright notice]

    Publication Year: 2006, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (402 KB)
    Freely Available from IEEE
  • A Method of Components and Parts Suppliers Selection for SMMEs Based on Uncertainly Voting AHP Group Decision Making

    Publication Year: 2006, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB) | HTML iconHTML

    A description of the importance of dynamical alliance of enterprises and the key affecting factors on the selection of suppliers for them are given in this paper. The advantage and disadvantage of AHP is introduced in this paper. A new kind of AHP is presented in this paper, which builds judgment matrix using uncertainly voting group decision making and specially deals with interval number and unc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2006 1st International Symposium on Pervasive Computing and Applications Proceedings

    Publication Year: 2006, Page(s): nil3
    Request permission for commercial reuse | PDF file iconPDF (327 KB)
    Freely Available from IEEE
  • A New Modified Bridge Certification Authority PKI Trust Model

    Publication Year: 2006, Page(s):23 - 26
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4491 KB) | HTML iconHTML

    Current trust structures suffer from a scaling problem, and some may have security problems. Even given the topological simplification of bridge certification authorities, as cross certificate meshes grow in size and complexity, the number of possible routes between domains increases very quickly, and the time required for path building can increase beyond a tolerable delay for real-time operation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symposium Organizations

    Publication Year: 2006, Page(s): nil4
    Request permission for commercial reuse | PDF file iconPDF (480 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Ptolemy II Based Modeling Approach for Context-Aware Computing

    Publication Year: 2006, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information. In general, context-aware is a distributed, large scale, sophisticated and hybrid system. In this paper, we first propose a conceptual model for it, and then we present a Ptolemy II based modeling approach. In this approach, we combine a hierarchical modeling meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program Committee Members

    Publication Year: 2006, Page(s):nil5 - nil6
    Request permission for commercial reuse | PDF file iconPDF (941 KB)
    Freely Available from IEEE
  • A Search Direction Extensible Fast Search Algorithm

    Publication Year: 2006, Page(s):32 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3715 KB) | HTML iconHTML

    This paper proposes a novel fast search algorithm with search direction extensible, through investigating diamond search algorithm's directivity and robustness. The proposed algorithm starts with a five-point diamond search's block matching, and decides the direction from the center check point to the least block distortion point to be the search direction. Next we continuously extend one check po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preface

    Publication Year: 2006, Page(s): nil7
    Request permission for commercial reuse | PDF file iconPDF (571 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Service-oriented Middleware for Pervasive Computing Environments

    Publication Year: 2006, Page(s):36 - 41
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Wireless networks provide limited reliability and less bandwidth than fixed networks for mobile nodes. And all mobile nodes are highly energy dependent as they use batteries with a limited capacity. Because of their physical portability, they can be used even when they move. This may require using different wireless networks while the node is moving. In order to provide users with the best possibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2006, Page(s):I - XIII
    Request permission for commercial reuse | PDF file iconPDF (7179 KB)
    Freely Available from IEEE
  • A User-centric Service Framework for Pervasive Computing

    Publication Year: 2006, Page(s):1 - 4
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4941 KB) | HTML iconHTML

    In pervasive computing environments, users can interact with a wide range of services, but which do not include legacy application services such as interactive desktop applications. How to use legacy service as a kind of transparent service mechanism in a pervasive computing environment is an important problem to solve during the transition from personal computing to pervasive computing. This pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Middleware for Uniform Access to Legacy Systems for Mobile Clients

    Publication Year: 2006, Page(s):46 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (525 KB) | HTML iconHTML

    The trends of mobile accessibility are bringing new challenges to the viability of computerized systems that can't support mobile clients. Taking in instead of ignoring the ever-increasing number of mobile users is important and urgent to save legacy properties and maintain business prosperity. And a uniform access to heterogeneous end hosts is most desirable for computationally challenged mobile ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Application Based on the Context-Aware Computing in Harmonics Monitoring System

    Publication Year: 2006, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3501 KB) | HTML iconHTML

    The harmonics monitoring system in pervasive computing environment should be able to respond to any harmonics pollutions, so the system must have the ability of strong interoperability and adaptability. For this aim, we introduce a novel approach to enriching the system based on the context-aware computing, which is the key technology in pervasive computing. The resulting system has realized those... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Architecture of Business Process Driven Application Integration in Pervasive Computing Environments

    Publication Year: 2006, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    Pervasive computing brings a lots challenge for software architecture. This paper improves an architecture of business process driven application integration, towards the pervasive computing environments. Firstly, in the architecture, there is no central management organization, and application nodes are equal and autonomic and can communicate with each other directly; second, the application node... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.