首页 > 最新文献

2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)最新文献

英文 中文
Motion sensors for activity recognition in an ambient-intelligence scenario 环境智能场景中用于活动识别的运动传感器
P. Cottone, G. Re, Gabriele Maida, M. Morana
In recent years, Ambient Intelligence (AmI) has attracted a number of researchers due to the widespread diffusion of unobtrusive sensing devices. The availability of such a great amount of acquired data has driven the interest of the scientific community in producing novel methods for combining raw measurements in order to understand what is happening in the monitored scenario. Moreover, due the primary role of the end user, an additional requirement of any AmI system is to maintain a high level of pervasiveness. In this paper we propose a method for recognizing human activities by means of a time of flight (ToF) depth and RGB camera device, namely Microsoft Kinect. The proposed approach is based on the estimation of some relevant joints of the human body by using Kinect depth information. The most significative configurations of joints positions are combined by a clustering approach and classified by means of a multi-class Support Vector Machine. Then, Hidden Markov Models (HMMs) are applied to model each activity as a sequence of known postures. The proposed solution has been tested on a public dataset while considering four different configurations corresponding to some state-of-the-art approaches and results are very promising. Moreover, in order to maintain a high level of pervasiveness, we implemented a real prototype by connecting Kinect sensor to a miniature computer capable of real-time processing.
近年来,由于不显眼的传感设备的广泛普及,环境智能(AmI)吸引了许多研究人员的关注。如此大量获得的数据的可用性,促使科学界产生了兴趣,产生了结合原始测量的新方法,以便了解在监测情景中正在发生的事情。此外,由于最终用户的主要角色,任何AmI系统的附加要求都是保持高水平的普遍性。在本文中,我们提出了一种利用飞行时间(ToF)深度和RGB相机设备(即微软Kinect)来识别人类活动的方法。该方法基于Kinect深度信息对人体相关关节的估计。通过聚类方法组合最有意义的关节位置构型,并使用多类支持向量机进行分类。然后,将隐马尔可夫模型(hmm)应用于将每个活动建模为已知姿势的序列。所提出的解决方案已经在一个公共数据集上进行了测试,同时考虑了与一些最先进的方法相对应的四种不同配置,结果非常有希望。此外,为了保持高水平的普遍性,我们通过将Kinect传感器连接到能够实时处理的微型计算机来实现真实的原型。
{"title":"Motion sensors for activity recognition in an ambient-intelligence scenario","authors":"P. Cottone, G. Re, Gabriele Maida, M. Morana","doi":"10.1109/PerComW.2013.6529573","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529573","url":null,"abstract":"In recent years, Ambient Intelligence (AmI) has attracted a number of researchers due to the widespread diffusion of unobtrusive sensing devices. The availability of such a great amount of acquired data has driven the interest of the scientific community in producing novel methods for combining raw measurements in order to understand what is happening in the monitored scenario. Moreover, due the primary role of the end user, an additional requirement of any AmI system is to maintain a high level of pervasiveness. In this paper we propose a method for recognizing human activities by means of a time of flight (ToF) depth and RGB camera device, namely Microsoft Kinect. The proposed approach is based on the estimation of some relevant joints of the human body by using Kinect depth information. The most significative configurations of joints positions are combined by a clustering approach and classified by means of a multi-class Support Vector Machine. Then, Hidden Markov Models (HMMs) are applied to model each activity as a sequence of known postures. The proposed solution has been tested on a public dataset while considering four different configurations corresponding to some state-of-the-art approaches and results are very promising. Moreover, in order to maintain a high level of pervasiveness, we implemented a real prototype by connecting Kinect sensor to a miniature computer capable of real-time processing.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129981316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
MemPhone: From personal memory aid to community memory sharing using mobile tagging MemPhone:从个人记忆辅助到使用移动标记的社区记忆共享
Bin Guo, Zhiwen Yu, Xingshe Zhou, Daqing Zhang
Human memory is important yet often not easy to be handled in daily life. Many challenges are raised, such as how to enhance memory recall and reminiscence, how to facilitate memory sharing in terms of people's social nature. This paper proposes MemPhone, a new system that addresses various human memory needs by using the mobile tagging (e.g., RFID, barcodes) technique. By linking human memory or experience with associated physical objects, MemPhone can i) augment memory externalization and recall, and ii) build object-based social networks (OBSNs) to enhance memory sharing. By embedding physical contexts into SNs, the OBSN can strengthen friendships by enabling serendipity discovering and nurture new connections among people with shared memories. Early studies indicate that our system can facilitate memory recall and shared memory discovery.
人类的记忆很重要,但在日常生活中往往不容易处理。如何增强记忆的回忆和回忆,如何从人的社会性角度促进记忆的共享,提出了许多挑战。本文提出MemPhone,一种利用移动标签(如RFID、条形码)技术解决各种人类记忆需求的新系统。通过将人类记忆或经验与相关的物理对象联系起来,MemPhone可以i)增强记忆外化和回忆,ii)构建基于对象的社交网络(obsn)以增强记忆共享。通过在社交网络中嵌入物理背景,OBSN可以通过在拥有共同记忆的人们之间偶然发现和培养新的联系来加强友谊。早期的研究表明,我们的系统可以促进记忆回忆和共享记忆的发现。
{"title":"MemPhone: From personal memory aid to community memory sharing using mobile tagging","authors":"Bin Guo, Zhiwen Yu, Xingshe Zhou, Daqing Zhang","doi":"10.1109/PerComW.2013.6529509","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529509","url":null,"abstract":"Human memory is important yet often not easy to be handled in daily life. Many challenges are raised, such as how to enhance memory recall and reminiscence, how to facilitate memory sharing in terms of people's social nature. This paper proposes MemPhone, a new system that addresses various human memory needs by using the mobile tagging (e.g., RFID, barcodes) technique. By linking human memory or experience with associated physical objects, MemPhone can i) augment memory externalization and recall, and ii) build object-based social networks (OBSNs) to enhance memory sharing. By embedding physical contexts into SNs, the OBSN can strengthen friendships by enabling serendipity discovering and nurture new connections among people with shared memories. Early studies indicate that our system can facilitate memory recall and shared memory discovery.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130810914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
I see you: How to improve wearable activity recognition by leveraging information from environmental cameras 我看到你了:如何利用环境摄像头的信息来提高可穿戴设备的活动识别能力
G. Bahle, P. Lukowicz, K. Kunze, K. Kise
In this paper we investigate how vision based devices (cameras or the Kinect controller) that happen to be in the users' environment can be used to improve and fine tune on body sensor systems for activity recognition. Thus we imagine a user with his on body activity recognition system passing through a space with a video camera (or a Kinect), picking up some information, and using it to improve his system. The general idea is to correlate an anonymous ”stick figure” like description of the motion of a user's body parts provided by the vision system with the sensor signals as a means of analyzing the sensors' properties. In the paper we for example demonstrate how such a correlation can be used to determine, without the need to train any classifiers, on which body part a motion sensor is worn.
在本文中,我们研究了如何在用户环境中使用基于视觉的设备(相机或Kinect控制器)来改进和微调身体传感器系统的活动识别。因此,我们想象一个用户带着他的身体活动识别系统穿过一个带有摄像机(或Kinect)的空间,收集一些信息,并用它来改进他的系统。一般的想法是将视觉系统提供的用户身体部位运动的匿名“简笔画”描述与传感器信号相关联,作为分析传感器特性的一种手段。在本文中,我们举例说明了如何使用这种相关性来确定运动传感器佩戴在身体的哪个部位,而不需要训练任何分类器。
{"title":"I see you: How to improve wearable activity recognition by leveraging information from environmental cameras","authors":"G. Bahle, P. Lukowicz, K. Kunze, K. Kise","doi":"10.1109/PerComW.2013.6529528","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529528","url":null,"abstract":"In this paper we investigate how vision based devices (cameras or the Kinect controller) that happen to be in the users' environment can be used to improve and fine tune on body sensor systems for activity recognition. Thus we imagine a user with his on body activity recognition system passing through a space with a video camera (or a Kinect), picking up some information, and using it to improve his system. The general idea is to correlate an anonymous ”stick figure” like description of the motion of a user's body parts provided by the vision system with the sensor signals as a means of analyzing the sensors' properties. In the paper we for example demonstrate how such a correlation can be used to determine, without the need to train any classifiers, on which body part a motion sensor is worn.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127090751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Signal sensing and modulation classification using pervasive sensor networks 基于普适传感器网络的信号感知与调制分类
W. Su
This paper discusses the use of asynchronous low-cost sensors in distributed locations for sensing and classifying weak wireless signals. This weak signal may not be identified by using a single sensor alone, but can be detected and classified by fusing multiple weak signals collected by sensor networks. The asynchronous signal copies have unwanted offsets in time, frequency, and phase due to the diversities in local oscillators and unknown communication channels. This work proposes a post-synchronization method to estimate and compensate for offsets in the fusion process without adjusting the sensor parameters. The properly combined signal from the distributed sensors achieves a higher processing gain for reliable signal exploitation.
本文讨论了在分布式位置使用异步低成本传感器对微弱无线信号进行感知和分类。这种弱信号可能无法通过单独使用单个传感器来识别,但可以通过融合传感器网络收集的多个弱信号来检测和分类。由于本地振荡器和未知通信信道的多样性,异步信号副本在时间、频率和相位上有不必要的偏移。本文提出了一种无需调整传感器参数即可估计和补偿融合过程中的偏移量的后同步方法。对分布式传感器的信号进行适当的组合,可以获得较高的处理增益,从而实现可靠的信号开发。
{"title":"Signal sensing and modulation classification using pervasive sensor networks","authors":"W. Su","doi":"10.1109/PerComW.2013.6529538","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529538","url":null,"abstract":"This paper discusses the use of asynchronous low-cost sensors in distributed locations for sensing and classifying weak wireless signals. This weak signal may not be identified by using a single sensor alone, but can be detected and classified by fusing multiple weak signals collected by sensor networks. The asynchronous signal copies have unwanted offsets in time, frequency, and phase due to the diversities in local oscillators and unknown communication channels. This work proposes a post-synchronization method to estimate and compensate for offsets in the fusion process without adjusting the sensor parameters. The properly combined signal from the distributed sensors achieves a higher processing gain for reliable signal exploitation.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing large-scale mapping and localization for pedestrians using inertial sensors 使用惯性传感器管理大规模的行人映射和定位
Maria Garcia Puyol, P. Robertson, M. Angermann
Pedestrian navigation in indoor environments without a pre-installed infrastructure still presents many challenges. There are different approaches that address the problem using prior knowledge about the environment when the building plans or similar are available. Since this is not always the case, a family of technologies based on the principle of Simultaneous Localization and Mapping (SLAM) has been proposed. In this paper we will present some estimates on how a mapping process based on FootSLAM - a form of SLAM for pedestrians - might scale for a large-scale collaborative effort eventually encompassing most of our public indoor space, where the mapping entities are humans. Our assumptions on pedestrian motion and area visiting rate together with calculations based on the computational requirements of pedestrian SLAM algorithms allow us to make estimates with regard to the feasibility, scalability and computational cost of wide-scale mapping of indoor areas by pedestrians.
在没有预先安装基础设施的室内环境中,行人导航仍然面临许多挑战。当建筑计划或类似的东西可用时,有不同的方法可以利用对环境的先验知识来解决问题。由于情况并非总是如此,因此提出了一系列基于同时定位和映射(SLAM)原理的技术。在本文中,我们将对基于FootSLAM(行人SLAM的一种形式)的测绘过程如何扩展到大规模的协作工作,最终包括我们大部分的公共室内空间,其中的测绘实体是人类,提出一些估计。我们对行人运动和区域访问率的假设,以及基于行人SLAM算法计算需求的计算,使我们能够对行人对室内区域进行大比例尺测绘的可行性、可扩展性和计算成本进行估计。
{"title":"Managing large-scale mapping and localization for pedestrians using inertial sensors","authors":"Maria Garcia Puyol, P. Robertson, M. Angermann","doi":"10.1109/PerComW.2013.6529468","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529468","url":null,"abstract":"Pedestrian navigation in indoor environments without a pre-installed infrastructure still presents many challenges. There are different approaches that address the problem using prior knowledge about the environment when the building plans or similar are available. Since this is not always the case, a family of technologies based on the principle of Simultaneous Localization and Mapping (SLAM) has been proposed. In this paper we will present some estimates on how a mapping process based on FootSLAM - a form of SLAM for pedestrians - might scale for a large-scale collaborative effort eventually encompassing most of our public indoor space, where the mapping entities are humans. Our assumptions on pedestrian motion and area visiting rate together with calculations based on the computational requirements of pedestrian SLAM algorithms allow us to make estimates with regard to the feasibility, scalability and computational cost of wide-scale mapping of indoor areas by pedestrians.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A taxonomy of cyber attack and defence mechanisms for emergency management networks 应急管理网络的网络攻击和防御机制分类
G. Loukas, D. Gan, Tuan Vuong
Emergency management is increasingly dependent on networks for information gathering, coordination and physical system control, and consequently is increasingly vulnerable to network failures. A cyber attack could cause such network failures intentionally, so as to impede the work of first responders and maximise the impact of a physical emergency. We propose a taxonomy of existing and potential research that is relevant in this setting, covering attack types that have already occurred or are likely to occur, and defence mechanisms that are already in use or would be applicable.
应急管理越来越依赖于网络进行信息收集、协调和物理系统控制,因此越来越容易受到网络故障的影响。网络攻击可能会故意造成这种网络故障,从而阻碍急救人员的工作,并最大限度地发挥物理紧急情况的影响。我们提出了一个与此设置相关的现有和潜在研究的分类法,涵盖了已经发生或可能发生的攻击类型,以及已经使用或将适用的防御机制。
{"title":"A taxonomy of cyber attack and defence mechanisms for emergency management networks","authors":"G. Loukas, D. Gan, Tuan Vuong","doi":"10.1109/PerComW.2013.6529554","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529554","url":null,"abstract":"Emergency management is increasingly dependent on networks for information gathering, coordination and physical system control, and consequently is increasingly vulnerable to network failures. A cyber attack could cause such network failures intentionally, so as to impede the work of first responders and maximise the impact of a physical emergency. We propose a taxonomy of existing and potential research that is relevant in this setting, covering attack types that have already occurred or are likely to occur, and defence mechanisms that are already in use or would be applicable.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"407 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116034593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Who, how, and why? Enhancing privacy awareness in Ubiquitous Computing 谁,怎么做,为什么?在普适计算中提升私隐意识
Bastian Könings, F. Schaub, M. Weber
The combination and integration of sensing and interaction capabilities with almost ubiquitous inter-connectivity are basic requirements for context-aware systems to unobtrusively and invisibly support users in their daily activities. However, the invisible nature of such systems also threatens users' privacy. Users often lack awareness about a system's capabilities to gather data or to intervene in user activities, or even the system's presence. We propose a model to enhance user-centric privacy awareness by consistently modeling observations and disturbances of users. The model allows to capture who is affecting a user's privacy, how privacy is affected, and why it is affected. We further discuss how this model can be instantiated with discovery of channel policies.
感知和交互能力与几乎无处不在的互联性的结合和集成是上下文感知系统在日常活动中不显眼和无形地支持用户的基本要求。然而,这种系统的不可见性也威胁到用户的隐私。用户通常不了解系统收集数据或干预用户活动的能力,甚至不了解系统的存在。我们提出了一个模型,通过一致地建模用户的观察和干扰来增强以用户为中心的隐私意识。该模型允许捕获谁在影响用户的隐私,隐私如何受到影响,以及为什么受到影响。我们将进一步讨论如何通过发现通道策略来实例化该模型。
{"title":"Who, how, and why? Enhancing privacy awareness in Ubiquitous Computing","authors":"Bastian Könings, F. Schaub, M. Weber","doi":"10.1109/PerComW.2013.6529517","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529517","url":null,"abstract":"The combination and integration of sensing and interaction capabilities with almost ubiquitous inter-connectivity are basic requirements for context-aware systems to unobtrusively and invisibly support users in their daily activities. However, the invisible nature of such systems also threatens users' privacy. Users often lack awareness about a system's capabilities to gather data or to intervene in user activities, or even the system's presence. We propose a model to enhance user-centric privacy awareness by consistently modeling observations and disturbances of users. The model allows to capture who is affecting a user's privacy, how privacy is affected, and why it is affected. We further discuss how this model can be instantiated with discovery of channel policies.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A novel mechanism to construct a compatible overlay on heterogeneous mobile peers 一种在异构移动对等体上构建兼容覆盖的新机制
Chuan-Chi Lai, Chuan-Ming Liu, Ying-Chi Su
As the mobile computing environment emerges, people can use different mobile devices to access information ubiquitously. This has shifted the researchers' sights to Mobile P2P (MP2P) systems, where the membership among peers is more dynamic and ad hoc. In the ubiquitous environments, the mobile devices generally are heterogeneous. In this paper, we consider the MP2P systems where the mobile peers are heterogeneous and propose a mechanism, named Heterogeneity-aware Overlay Technique (HOT), to build up an unstructured overlay. The proposed mechanism considers the overall ability, including power, network, CPU, and memory to set up the overlay. An ability equation is thus defined and the resulting overlay can ensure a good quality of service while the topology mismatching problem is alleviated. Last, we present our simulation for the proposed mechanism and compare the results with other related approaches. The simulation result shows that our proposed mechanism can effectively achieve a better service quality and mitigate the topology mismatching problem.
随着移动计算环境的出现,人们可以使用不同的移动设备无处不在地访问信息。这将研究人员的目光转向了移动P2P (MP2P)系统,在这种系统中,对等体之间的成员关系更加动态和特别。在无处不在的环境中,移动设备通常是异构的。在本文中,我们考虑了移动对等体是异构的MP2P系统,并提出了一种机制,称为异构感知覆盖技术(HOT),以建立一个非结构化的覆盖。提出的机制考虑了建立覆盖的整体能力,包括电源、网络、CPU和内存。由此定义了一个能力方程,得到的叠加在保证良好的服务质量的同时减轻了拓扑不匹配问题。最后,我们对所提出的机制进行了仿真,并将结果与其他相关方法进行了比较。仿真结果表明,该机制能够有效地提高服务质量,缓解拓扑不匹配问题。
{"title":"A novel mechanism to construct a compatible overlay on heterogeneous mobile peers","authors":"Chuan-Chi Lai, Chuan-Ming Liu, Ying-Chi Su","doi":"10.1109/PerComW.2013.6529460","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529460","url":null,"abstract":"As the mobile computing environment emerges, people can use different mobile devices to access information ubiquitously. This has shifted the researchers' sights to Mobile P2P (MP2P) systems, where the membership among peers is more dynamic and ad hoc. In the ubiquitous environments, the mobile devices generally are heterogeneous. In this paper, we consider the MP2P systems where the mobile peers are heterogeneous and propose a mechanism, named Heterogeneity-aware Overlay Technique (HOT), to build up an unstructured overlay. The proposed mechanism considers the overall ability, including power, network, CPU, and memory to set up the overlay. An ability equation is thus defined and the resulting overlay can ensure a good quality of service while the topology mismatching problem is alleviated. Last, we present our simulation for the proposed mechanism and compare the results with other related approaches. The simulation result shows that our proposed mechanism can effectively achieve a better service quality and mitigate the topology mismatching problem.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125387883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Constructivist ambient intelligent agent for smart environments 智能环境的建构主义环境智能体
A. Najjar, P. Reignier
Building a smart home is a multi-disciplinary and challenging problem. Our goal is to build an agent that can propose context aware services to the users. High variability of users' needs and the uniqueness of every home are difficult to handle using “Classical AI”. We propose an alternative approach inspired by Developmental Artificial Intelligence and Constructivism Theory. Being constructivist means that the agent builds its knowledge in situ through user's interactions. This continuous interaction process enables the user to customize or bring up the system to meet his personal needs. We have made a first experiment by learning schemas from a simulated two-weeks home scenario. This preliminary experiment gives us indications that Constructivism is a promising approach for ambient intelligence.
建设智能家居是一个多学科的、具有挑战性的问题。我们的目标是构建一个能够向用户提供上下文感知服务的代理。用户需求的高度可变性和每个家庭的独特性很难用“经典人工智能”来处理。我们提出了一种受发展人工智能和建构主义理论启发的替代方法。建构主义意味着智能体通过用户的交互在原地构建其知识。这种持续的交互过程使用户能够定制或启动系统以满足他的个人需求。我们做了第一个实验,从一个模拟的两周家庭场景中学习图式。这一初步实验表明,建构主义是研究环境智能的一种很有前途的方法。
{"title":"Constructivist ambient intelligent agent for smart environments","authors":"A. Najjar, P. Reignier","doi":"10.1109/PerComW.2013.6529515","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529515","url":null,"abstract":"Building a smart home is a multi-disciplinary and challenging problem. Our goal is to build an agent that can propose context aware services to the users. High variability of users' needs and the uniqueness of every home are difficult to handle using “Classical AI”. We propose an alternative approach inspired by Developmental Artificial Intelligence and Constructivism Theory. Being constructivist means that the agent builds its knowledge in situ through user's interactions. This continuous interaction process enables the user to customize or bring up the system to meet his personal needs. We have made a first experiment by learning schemas from a simulated two-weeks home scenario. This preliminary experiment gives us indications that Constructivism is a promising approach for ambient intelligence.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125402267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
How many places do you visit a day? 你一天参观几个地方?
Michela Papandrea, Matteo Zignani, S. Gaito, S. Giordano, G. P. Rossi
People mobility enormously augmented in the last decades. However, despite the increased possibilities of fast reaching far places, the places that a person commonly visits remain limited in number. The number of visited places of each person is regulated by some laws that are statistically similar among individuals. In our previous work, we firstly argued that a person visit most frequently always few places, and we confirmed that by some initial experiments. Here, in addition to further validating this result, we build a more sophisticate view of the places visited by the people. Namely, on top of our previous work, which identifies the class of Mostly Visited Points of Interest, we define two next classes: the Occasionally and the Exceptionally Visited Points of Interest classes. We argue and validate on real data, that also the occasional places are very limited in number, while the exceptional ones can grow at will, and by the analysis of the classes of visited points we can distinguish the type of users mobility. This paper firstly demonstrates this property in large experimental scenario, and put the basis for new understanding of people places in several areas as localization, social interactions and human mobility modelling.
在过去的几十年里,人们的流动性大大增强了。然而,尽管快速到达遥远地方的可能性增加了,人们经常去的地方数量仍然有限。每个人访问的地方的数量是由一些法律规定的,这些法律在统计上是相似的。在我们之前的工作中,我们首先提出一个人去的最频繁的地方总是很少的,我们通过一些初步的实验证实了这一点。在这里,除了进一步验证这一结果外,我们还建立了一个更复杂的人们访问过的地方的视图。也就是说,在我们之前的工作的基础上,我们确定了最常访问的兴趣点类,我们定义了两个接下来的类:偶尔访问的兴趣点类和特别访问的兴趣点类。我们在真实数据上论证和验证,偶尔出现的地点数量也非常有限,而特殊的地方可以随意增长,通过对访问点的分类分析,我们可以区分用户移动的类型。本文首先在大型实验场景中证明了这一特性,并在定位、社会互动和人类流动建模等几个领域为人们对地点的新理解奠定了基础。
{"title":"How many places do you visit a day?","authors":"Michela Papandrea, Matteo Zignani, S. Gaito, S. Giordano, G. P. Rossi","doi":"10.1109/PerComW.2013.6529485","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529485","url":null,"abstract":"People mobility enormously augmented in the last decades. However, despite the increased possibilities of fast reaching far places, the places that a person commonly visits remain limited in number. The number of visited places of each person is regulated by some laws that are statistically similar among individuals. In our previous work, we firstly argued that a person visit most frequently always few places, and we confirmed that by some initial experiments. Here, in addition to further validating this result, we build a more sophisticate view of the places visited by the people. Namely, on top of our previous work, which identifies the class of Mostly Visited Points of Interest, we define two next classes: the Occasionally and the Exceptionally Visited Points of Interest classes. We argue and validate on real data, that also the occasional places are very limited in number, while the exceptional ones can grow at will, and by the analysis of the classes of visited points we can distinguish the type of users mobility. This paper firstly demonstrates this property in large experimental scenario, and put the basis for new understanding of people places in several areas as localization, social interactions and human mobility modelling.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127079238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
期刊
2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1