首页 > 最新文献

2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)最新文献

英文 中文
Performance evaluation of key disclosure delay-based schemes in wireless sensor networks 无线传感器网络中基于密钥披露延迟方案的性能评估
Wafa Ben Jaballah, M. Mosbah, H. Youssef
Broadcast source authentication is a critical security service in wireless sensor networks which is still in its infancy. This service allows senders to broadcast messages to multiple receivers in a secure way. This paper evaluates the integration of staggered authentication in multi-level μTesla source authentication protocol called staggered multilevel μTesla. These two protocols are evaluated in terms of authentication delay, authentication probability, number of forged packets in the receiver's buffer, delay of forged packets in the receiver's buffer, memory, and energy consumption overhead. Simulation results show that these two protocols introduce negligible overhead without impeding the system performance. Moreover, staggered multi-level μTesla achieves better performance compared to multi-level μTesla, when reducing the average number and the delay of forged packets in the receiver's buffer.
广播源认证是无线传感器网络中一项重要的安全服务,目前仍处于起步阶段。此服务允许发送方以安全的方式向多个接收方广播消息。评估了交错多级μ特斯拉源认证协议中交错认证的集成。根据认证延迟、认证概率、接收方缓冲区中伪造数据包的数量、接收方缓冲区中伪造数据包的延迟、内存和能耗开销来评估这两种协议。仿真结果表明,在不影响系统性能的情况下,这两种协议的开销可以忽略不计。此外,交错多级μTesla在减少接收端缓冲区中伪造数据包的平均数量和延迟时,比多级μTesla具有更好的性能。
{"title":"Performance evaluation of key disclosure delay-based schemes in wireless sensor networks","authors":"Wafa Ben Jaballah, M. Mosbah, H. Youssef","doi":"10.1109/PerComW.2013.6529560","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529560","url":null,"abstract":"Broadcast source authentication is a critical security service in wireless sensor networks which is still in its infancy. This service allows senders to broadcast messages to multiple receivers in a secure way. This paper evaluates the integration of staggered authentication in multi-level μTesla source authentication protocol called staggered multilevel μTesla. These two protocols are evaluated in terms of authentication delay, authentication probability, number of forged packets in the receiver's buffer, delay of forged packets in the receiver's buffer, memory, and energy consumption overhead. Simulation results show that these two protocols introduce negligible overhead without impeding the system performance. Moreover, staggered multi-level μTesla achieves better performance compared to multi-level μTesla, when reducing the average number and the delay of forged packets in the receiver's buffer.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"37 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121005979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A large scale presence network for pervasive social computing 用于普及社会计算的大规模存在网络
Honguk Woo, Hongsoo Kim, Kyusik Kim, Dongkyoung Kim
In this paper, we present a scalable presence network architecture for emerging pervasive social applications in which the interaction of not only people but surrounding physical objects seamlessly occurs. The architecture combines the server-based messaging and the peer-to-peer communication schemes, thereby rendering itself deployable at the large scale beyond social networks so as to incorporate a sheer number of embedded devices in a ubiquitous environment.
在本文中,我们提出了一种可扩展的在场网络架构,用于新兴的无处不在的社交应用,在这种应用中,不仅可以无缝地与人进行交互,还可以无缝地与周围的物理对象进行交互。该体系结构结合了基于服务器的消息传递和点对点通信方案,从而使其可以在社交网络之外的大规模部署,以便在无处不在的环境中合并大量嵌入式设备。
{"title":"A large scale presence network for pervasive social computing","authors":"Honguk Woo, Hongsoo Kim, Kyusik Kim, Dongkyoung Kim","doi":"10.1109/PerComW.2013.6529472","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529472","url":null,"abstract":"In this paper, we present a scalable presence network architecture for emerging pervasive social applications in which the interaction of not only people but surrounding physical objects seamlessly occurs. The architecture combines the server-based messaging and the peer-to-peer communication schemes, thereby rendering itself deployable at the large scale beyond social networks so as to incorporate a sheer number of embedded devices in a ubiquitous environment.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121753184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spatio-temporal provenance: Identifying location information from unstructured text 时空来源:从非结构化文本中识别位置信息
Kisung Lee, R. Ganti, M. Srivatsa, P. Mohapatra
Spatio-temporal attributes represent two aspects of physical presence - space and time - which are integral to human activities. Space-time markers of an entity in conjunction with correlation with other networks such as movements in social network, the road/transportation network encodes a wealth of provenance information. With the advent of mobile computing and cheap and improved location estimation techniques, encoding such information has become commonplace. In this paper, we will focus on deriving such location provenance information from unstructured text generated by social media. As social media such as Facebook and Twitter are integrated with mobile devices, information generated by individuals in these networks gets tagged with spatial markers. We can classify such markers into explicit and implicit tags, where explicit tags encode the spatial data explicitly by providing the accurate location attributes. On the other hand, a lot of social network data may not encode such information explicitly. Our hypothesis in this paper is that the unstructured textual data contains implicit spatial markers at a fine granularity. We develop algorithms to support this hypothesis and evaluate these algorithms on data from FourSquare to show that the spatial category information can be identified with an accuracy of over 80%.
时空属性代表了物理存在的两个方面——空间和时间——它们是人类活动不可或缺的一部分。一个实体的时空标记与其他网络(如社会网络中的运动)的相关性相结合,道路/交通网络编码了丰富的来源信息。随着移动计算的出现以及廉价和改进的位置估计技术的出现,对这些信息进行编码已经变得司空见惯。在本文中,我们将专注于从社交媒体生成的非结构化文本中获取此类位置来源信息。随着Facebook和Twitter等社交媒体与移动设备的整合,这些网络中个人产生的信息被贴上了空间标记。我们可以将这些标记分为显式标记和隐式标记,其中显式标记通过提供准确的位置属性显式地对空间数据进行编码。另一方面,许多社交网络数据可能没有明确地对这些信息进行编码。我们在本文中的假设是,非结构化文本数据在细粒度上包含隐式空间标记。我们开发了算法来支持这一假设,并在FourSquare的数据上对这些算法进行了评估,结果表明空间类别信息的识别准确率超过80%。
{"title":"Spatio-temporal provenance: Identifying location information from unstructured text","authors":"Kisung Lee, R. Ganti, M. Srivatsa, P. Mohapatra","doi":"10.1109/PerComW.2013.6529548","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529548","url":null,"abstract":"Spatio-temporal attributes represent two aspects of physical presence - space and time - which are integral to human activities. Space-time markers of an entity in conjunction with correlation with other networks such as movements in social network, the road/transportation network encodes a wealth of provenance information. With the advent of mobile computing and cheap and improved location estimation techniques, encoding such information has become commonplace. In this paper, we will focus on deriving such location provenance information from unstructured text generated by social media. As social media such as Facebook and Twitter are integrated with mobile devices, information generated by individuals in these networks gets tagged with spatial markers. We can classify such markers into explicit and implicit tags, where explicit tags encode the spatial data explicitly by providing the accurate location attributes. On the other hand, a lot of social network data may not encode such information explicitly. Our hypothesis in this paper is that the unstructured textual data contains implicit spatial markers at a fine granularity. We develop algorithms to support this hypothesis and evaluate these algorithms on data from FourSquare to show that the spatial category information can be identified with an accuracy of over 80%.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124649174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Protecting location privacy with k-confusing paths based on dynamic pseudonyms 基于动态假名的k-混淆路径保护位置隐私
K. Mano, Kazuhiro Minami, H. Maruyama
As smart phones with a GPS receiver have been becoming popular recently, many people have realized the issue of protecting their location privacy. Previous research on location privacy mainly focuses on anonymization techniques for removing identifiable information from users' location traces. Although anonymized location data is useful to many applications, such as traffic monitoring, we can provide a new class of location-based services by utilizing path information of mobile users. In this paper, we present a dynamic pseudonym scheme for constructing alternate possible paths of mobile users to protect their location privacy. We introduce a formal definition of location privacy for pseudonym-based location data sets and show an efficient verification algorithm for determining whether each user in a given location data set has sufficient number of possible paths to disguise the user's true movements.
最近,随着带有GPS接收器的智能手机的普及,很多人都意识到了保护自己位置隐私的问题。以往对位置隐私的研究主要集中在匿名化技术上,用于从用户的位置痕迹中去除可识别信息。虽然匿名位置数据对许多应用都很有用,例如交通监控,但我们可以利用移动用户的路径信息提供一类新的基于位置的服务。本文提出了一种动态假名方案,用于构建移动用户的备选路径,以保护其位置隐私。我们为基于假名的位置数据集引入了位置隐私的正式定义,并展示了一种有效的验证算法,用于确定给定位置数据集中的每个用户是否有足够数量的可能路径来掩盖用户的真实移动。
{"title":"Protecting location privacy with k-confusing paths based on dynamic pseudonyms","authors":"K. Mano, Kazuhiro Minami, H. Maruyama","doi":"10.1109/PerComW.2013.6529496","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529496","url":null,"abstract":"As smart phones with a GPS receiver have been becoming popular recently, many people have realized the issue of protecting their location privacy. Previous research on location privacy mainly focuses on anonymization techniques for removing identifiable information from users' location traces. Although anonymized location data is useful to many applications, such as traffic monitoring, we can provide a new class of location-based services by utilizing path information of mobile users. In this paper, we present a dynamic pseudonym scheme for constructing alternate possible paths of mobile users to protect their location privacy. We introduce a formal definition of location privacy for pseudonym-based location data sets and show an efficient verification algorithm for determining whether each user in a given location data set has sufficient number of possible paths to disguise the user's true movements.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116532584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Pre-allocating code mappings for energy-efficient data encoding in Wireless Sensor Networks 无线传感器网络中节能数据编码的预分配码映射
A. Reinhardt, D. Reinhardt, R. Steinmetz
Energy is a scarce resource on battery-powered wireless sensor nodes, and wireless communication represents the major consumer of electric energy on most current platforms. Reducing the number and size of radio transmissions thus represents a viable approach to save energy and extend a node's operational time. In the domain of pervasive computing, where a periodic reporting of data (e.g., a user's vital parameters) is often being used, packets cannot always be simply omitted from transmission. Even if the contained data have not changed, these periodically transmitted message double as beacons to indicate that the sensor node has not run out of energy. Hence, reducing the sizes of transmitted messages remains the only available solution to achieve energy savings in such sensor networks. In this paper, we show how precomputed codebooks can be used to encode messages in an energy-efficient way and thus reduce the size of the transmitted packets. We present how we extract these code mappings from real-world data, and describe how packets are encoded prior to their transmission in order to reduce the incurred energy demand. We practically assess the energy demand on TelosB nodes and prove that up to 17.2% of energy can be saved when our approach is applied.
在电池供电的无线传感器节点上,能量是一种稀缺资源,而无线通信是目前大多数平台上电能的主要消耗者。因此,减少无线电传输的数量和大小是节省能源和延长节点运行时间的可行方法。在普遍计算领域,经常使用定期报告数据(例如,用户的重要参数),不能总是简单地从传输中省略包。即使包含的数据没有改变,这些周期性传输的消息也可以作为信标,表明传感器节点没有耗尽能量。因此,减少传输信息的大小仍然是实现此类传感器网络节能的唯一可行解决方案。在本文中,我们展示了如何使用预先计算的码本以一种节能的方式对消息进行编码,从而减少传输数据包的大小。我们介绍了如何从现实世界的数据中提取这些代码映射,并描述了如何在传输之前对数据包进行编码,以减少产生的能量需求。我们实际评估了TelosB节点上的能源需求,并证明当我们的方法被应用时,可以节省高达17.2%的能源。
{"title":"Pre-allocating code mappings for energy-efficient data encoding in Wireless Sensor Networks","authors":"A. Reinhardt, D. Reinhardt, R. Steinmetz","doi":"10.1109/PerComW.2013.6529562","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529562","url":null,"abstract":"Energy is a scarce resource on battery-powered wireless sensor nodes, and wireless communication represents the major consumer of electric energy on most current platforms. Reducing the number and size of radio transmissions thus represents a viable approach to save energy and extend a node's operational time. In the domain of pervasive computing, where a periodic reporting of data (e.g., a user's vital parameters) is often being used, packets cannot always be simply omitted from transmission. Even if the contained data have not changed, these periodically transmitted message double as beacons to indicate that the sensor node has not run out of energy. Hence, reducing the sizes of transmitted messages remains the only available solution to achieve energy savings in such sensor networks. In this paper, we show how precomputed codebooks can be used to encode messages in an energy-efficient way and thus reduce the size of the transmitted packets. We present how we extract these code mappings from real-world data, and describe how packets are encoded prior to their transmission in order to reduce the incurred energy demand. We practically assess the energy demand on TelosB nodes and prove that up to 17.2% of energy can be saved when our approach is applied.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"485 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120881671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compatibility among diversity Foundations, lessons, and directions of semantic communication 语义交际的基础、教训和方向
Brendan Juba
We give an overview of a theory of semantic communication proposed by Goldreich, Juba, and Sudan. The theory is intended to capture the obstacles that arise when a diverse population of independently designed devices must communicate with one another. The aim of the theory is to provide conceptual foundations for the design and evaluation of devices that are compatible with such a diverse population. Conclusions drawn from the theory (i) identify a kind of information-sensing that is inherently necessary for compatibility whenever the population is sufficiently diverse and (ii) identify tensions between the richness of diversity and the computational cost of coping with such diversity in a population. We will review how these considerations are reflected in the formulation and design of an example application, a self-patching packet network stack. In particular, this application will illustrate the utility of explicit consideration of various computational complexity measures in addressing both (i) and (ii). We will also review work aimed at identifying kinds of populations across which compatibility can be achieved efficiently.
本文概述了Goldreich、Juba和Sudan提出的语义交际理论。该理论的目的是捕捉当独立设计的各种设备必须相互通信时出现的障碍。该理论的目的是为设计和评估与如此多样化的人群兼容的设备提供概念基础。从该理论中得出的结论(i)确定了一种信息感知,这种感知在种群足够多样化的情况下对于兼容性是内在必要的;(ii)确定了多样性的丰富性与应对这种多样性的计算成本之间的紧张关系。我们将回顾这些考虑如何反映在一个示例应用程序(一个自修补包网络堆栈)的表述和设计中。特别地,本应用程序将说明在解决(i)和(ii)时明确考虑各种计算复杂性度量的效用。我们还将回顾旨在确定可有效实现兼容性的种群类型的工作。
{"title":"Compatibility among diversity Foundations, lessons, and directions of semantic communication","authors":"Brendan Juba","doi":"10.1109/PerComW.2013.6529541","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529541","url":null,"abstract":"We give an overview of a theory of semantic communication proposed by Goldreich, Juba, and Sudan. The theory is intended to capture the obstacles that arise when a diverse population of independently designed devices must communicate with one another. The aim of the theory is to provide conceptual foundations for the design and evaluation of devices that are compatible with such a diverse population. Conclusions drawn from the theory (i) identify a kind of information-sensing that is inherently necessary for compatibility whenever the population is sufficiently diverse and (ii) identify tensions between the richness of diversity and the computational cost of coping with such diversity in a population. We will review how these considerations are reflected in the formulation and design of an example application, a self-patching packet network stack. In particular, this application will illustrate the utility of explicit consideration of various computational complexity measures in addressing both (i) and (ii). We will also review work aimed at identifying kinds of populations across which compatibility can be achieved efficiently.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131995477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A reconfigurable distributed CEP middleware for diverse mobility scenarios 一个可重构的分布式CEP中间件,适用于不同的移动性场景
Piotr Kamisinski, V. Goebel, T. Plagemann
Sensor nodes and complex event processing (CEP) are important and powerful means for gathering data and detecting phenomena of interest in mission-critical pervasive systems, e.g. for emergency and rescue operations. However, the dynamic network does not allow using centralized CEP. To address this issue, we present a component-based distributed CEP middleware. Its main goal is easy reconfigurability to different mobility scenarios. This is achieved by providing an extensible collection of algorithms that are tailored for specific scenarios. The middleware makes it possible to select on demand the algorithms that are most suitable for the current scenario. Our evaluation shows that the middleware works in a broad spectrum of mobility scenarios. We also investigate the trade-off between efficiency and reliability of distributed CEP.
传感器节点和复杂事件处理(CEP)是收集数据和检测关键任务普遍系统中感兴趣的现象的重要而强大的手段,例如用于应急和救援行动。但是,动态网络不允许使用集中式CEP。为了解决这个问题,我们提出了一个基于组件的分布式CEP中间件。其主要目标是针对不同的移动性场景轻松地重新配置。这是通过提供针对特定场景量身定制的可扩展算法集合来实现的。中间件使按需选择最适合当前场景的算法成为可能。我们的评估表明,中间件适用于广泛的移动性场景。我们还研究了分布式CEP的效率和可靠性之间的权衡。
{"title":"A reconfigurable distributed CEP middleware for diverse mobility scenarios","authors":"Piotr Kamisinski, V. Goebel, T. Plagemann","doi":"10.1109/PerComW.2013.6529568","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529568","url":null,"abstract":"Sensor nodes and complex event processing (CEP) are important and powerful means for gathering data and detecting phenomena of interest in mission-critical pervasive systems, e.g. for emergency and rescue operations. However, the dynamic network does not allow using centralized CEP. To address this issue, we present a component-based distributed CEP middleware. Its main goal is easy reconfigurability to different mobility scenarios. This is achieved by providing an extensible collection of algorithms that are tailored for specific scenarios. The middleware makes it possible to select on demand the algorithms that are most suitable for the current scenario. Our evaluation shows that the middleware works in a broad spectrum of mobility scenarios. We also investigate the trade-off between efficiency and reliability of distributed CEP.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114141552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards context-aware internet services with unselfish clients 面向具有无私客户端的环境感知互联网服务
Yu Lu, L. Wong
The rapid advancement in context-aware computing techniques greatly facilitates capturing the context information of the Internet clients, which can be utilized by the Internet services and applications to manage different network resources. Based on the built context-aware system and the deduced highly abstract context information, we propose a resource distribution framework that incentivizes context sharing and moderate competition among the selfish but rational Internet clients. Under the proposed framework, the Internet client, which provides its both negative and positive context, can be assigned to the prioritized class and accordingly receive more resources from the resource owner. Meanwhile, all the clients are motivated by the framework to compete moderately and the aggressive ones are penalized by receiving fewer resources. The Web system exemplar is used to aid understanding of our motivation. We further model the resource distribution process as a non-cooperative game and accordingly provide the theoretical insight of the proposed framework.
上下文感知计算技术的快速发展极大地促进了互联网客户端上下文信息的获取,这些信息可以被互联网服务和应用程序用来管理不同的网络资源。基于构建的上下文感知系统和推导出的高度抽象的上下文信息,我们提出了一种激励自私但理性的互联网客户之间进行上下文共享和适度竞争的资源分配框架。在该框架下,同时提供消极和积极上下文的互联网客户端可以被分配到优先类中,从而从资源所有者那里获得更多的资源。同时,所有的客户都受到框架的激励,适度竞争,而激进的客户则受到较少资源的惩罚。Web系统范例用于帮助理解我们的动机。我们进一步将资源分配过程建模为非合作博弈,并据此提供了所提出框架的理论见解。
{"title":"Towards context-aware internet services with unselfish clients","authors":"Yu Lu, L. Wong","doi":"10.1109/PerComW.2013.6529569","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529569","url":null,"abstract":"The rapid advancement in context-aware computing techniques greatly facilitates capturing the context information of the Internet clients, which can be utilized by the Internet services and applications to manage different network resources. Based on the built context-aware system and the deduced highly abstract context information, we propose a resource distribution framework that incentivizes context sharing and moderate competition among the selfish but rational Internet clients. Under the proposed framework, the Internet client, which provides its both negative and positive context, can be assigned to the prioritized class and accordingly receive more resources from the resource owner. Meanwhile, all the clients are motivated by the framework to compete moderately and the aggressive ones are penalized by receiving fewer resources. The Web system exemplar is used to aid understanding of our motivation. We further model the resource distribution process as a non-cooperative game and accordingly provide the theoretical insight of the proposed framework.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114301286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamically updatable UPnP service for device role management 动态更新的UPnP服务,用于设备角色管理
T. Tsunoda, A. Fujii, N. Fujino
UPnP is a networking protocol that allows devices embracing personal computers, smartphones and tablet computers to discover other devices and control their services. Using portable smart devices, the UPnP services needed by these devices often vary. According to the locations or the situations of users, the required roles of the devices that support users' activities change and the services needed for achieving the roles also vary. However, it is difficult to dynamically add or update UPnP services and change the roles of the devices. We propose a new dynamic update method of UPnP services in this paper. `Service-updater service', one of UPnP services, is utilized in this method, which can update other UPnP services of its own device. Users do not have to install many services manually in advance. In addition, applying our method, it is also possible for smart devices to change their roles; according to users' situations, the devices can be turned into UPnP controllers, which control UPnP services of other devices. We have developed a prototype to which this method is applied and we have confirmed through the experiment that this technique effectively supports users' activities.
UPnP是一种网络协议,允许包括个人电脑、智能手机和平板电脑在内的设备发现其他设备并控制其服务。使用便携式智能设备,这些设备所需的UPnP服务往往各不相同。根据用户所处的位置或情况,支持用户活动的设备所需要的角色会发生变化,实现这些角色所需的服务也会发生变化。但是,动态添加或更新UPnP服务以及改变设备的角色比较困难。本文提出了一种新的UPnP服务动态更新方法。该方法利用了UPnP服务中的“service -updater service”,可以对自己设备上的其他UPnP服务进行更新。用户无需提前手动安装许多服务。此外,应用我们的方法,智能设备也有可能改变它们的角色;根据用户需要,可将设备转换为UPnP控制器,控制其他设备的UPnP业务。我们已经开发了一个应用该方法的原型,并通过实验证实该技术有效地支持了用户的活动。
{"title":"Dynamically updatable UPnP service for device role management","authors":"T. Tsunoda, A. Fujii, N. Fujino","doi":"10.1109/PerComW.2013.6529465","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529465","url":null,"abstract":"UPnP is a networking protocol that allows devices embracing personal computers, smartphones and tablet computers to discover other devices and control their services. Using portable smart devices, the UPnP services needed by these devices often vary. According to the locations or the situations of users, the required roles of the devices that support users' activities change and the services needed for achieving the roles also vary. However, it is difficult to dynamically add or update UPnP services and change the roles of the devices. We propose a new dynamic update method of UPnP services in this paper. `Service-updater service', one of UPnP services, is utilized in this method, which can update other UPnP services of its own device. Users do not have to install many services manually in advance. In addition, applying our method, it is also possible for smart devices to change their roles; according to users' situations, the devices can be turned into UPnP controllers, which control UPnP services of other devices. We have developed a prototype to which this method is applied and we have confirmed through the experiment that this technique effectively supports users' activities.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116267686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A service infrastructure for the Internet of Things based on XMPP 基于XMPP的物联网服务基础设施
S. Bendel, T. Springer, Daniel Schuster, A. Schill, R. Ackermann, M. Ameling
Following the vision of an Internet of Things (IoT) real world objects are integrated into the Internet to provide data as sensors and to manipulate the real world as actors. While current IoT approaches focus on the integration of things based on service technologies, scenarios in domains like smart cities, automotive or crisis management require service platforms involving real world objects, backend-systems and mobile devices. In this paper we introduce a service platform based on the Extensible Messaging and Presence Protocol (XMPP) for the development and provision of services for such pervasive infrastructures. We argue for XMPP as protocol for unified, real-time communication and introduce the major concepts of our platform. Based on two case studies we demonstrate real-time capabilities of XMPP for remote robot control and service development in the e-mobility domain.
在物联网(IoT)的愿景下,现实世界的物体被集成到互联网中,作为传感器提供数据,并作为行动者操纵现实世界。虽然目前的物联网方法侧重于基于服务技术的物联网集成,但智能城市、汽车或危机管理等领域的场景需要涉及现实世界对象、后端系统和移动设备的服务平台。在本文中,我们介绍了一个基于可扩展消息传递和存在协议(XMPP)的服务平台,用于为这种普适基础设施开发和提供服务。我们主张将XMPP作为统一、实时通信的协议,并介绍了我们平台的主要概念。基于两个案例研究,我们展示了XMPP在远程机器人控制和电子移动领域服务开发中的实时能力。
{"title":"A service infrastructure for the Internet of Things based on XMPP","authors":"S. Bendel, T. Springer, Daniel Schuster, A. Schill, R. Ackermann, M. Ameling","doi":"10.1109/PerComW.2013.6529522","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529522","url":null,"abstract":"Following the vision of an Internet of Things (IoT) real world objects are integrated into the Internet to provide data as sensors and to manipulate the real world as actors. While current IoT approaches focus on the integration of things based on service technologies, scenarios in domains like smart cities, automotive or crisis management require service platforms involving real world objects, backend-systems and mobile devices. In this paper we introduce a service platform based on the Extensible Messaging and Presence Protocol (XMPP) for the development and provision of services for such pervasive infrastructures. We argue for XMPP as protocol for unified, real-time communication and introduce the major concepts of our platform. Based on two case studies we demonstrate real-time capabilities of XMPP for remote robot control and service development in the e-mobility domain.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124351669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
期刊
2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1