首页 > 最新文献

International Workshop on Ubiquitous Computing最新文献

英文 中文
Implementing a Pervasive Meeting Room: A Model Driven Approach 实现普适会议室:模型驱动的方法
Pub Date : 1900-01-01 DOI: 10.5220/0002477100130020
Javier Muñoz, V. Pelechano, Carlos Cetina
Current pervasive systems are developed ad-hoc or using implementation frameworks. These approaches could be not enough when dealing with large and complex pervasive systems. This paper introduces an implementation of a pervasive system for managing a meeting room. This system has been developed using a model driven method proposed by the authors. The system is specified using PervML, a UML-like modeling language. Then, a set of templates are applied to the specification in order to automatically produce Java code that uses an OSGi-based framework. The final application integrates several technologies like EIB and Web Services. Three different user interfaces are provided for interacting with the system.
当前的普及系统是特别开发的或使用实现框架开发的。在处理大型和复杂的普及系统时,这些方法可能是不够的。本文介绍了一个普适会议室管理系统的实现。该系统是采用作者提出的模型驱动方法开发的。系统是使用一种类似uml的建模语言PervML来指定的。然后,将一组模板应用于规范,以便自动生成使用基于osgi的框架的Java代码。最终的应用程序集成了几种技术,如EIB和Web服务。提供了三种不同的用户界面用于与系统交互。
{"title":"Implementing a Pervasive Meeting Room: A Model Driven Approach","authors":"Javier Muñoz, V. Pelechano, Carlos Cetina","doi":"10.5220/0002477100130020","DOIUrl":"https://doi.org/10.5220/0002477100130020","url":null,"abstract":"Current pervasive systems are developed ad-hoc or using implementation frameworks. These approaches could be not enough when dealing with large and complex pervasive systems. This paper introduces an implementation of a pervasive system for managing a meeting room. This system has been developed using a model driven method proposed by the authors. The system is specified using PervML, a UML-like modeling language. Then, a set of templates are applied to the specification in order to automatically produce Java code that uses an OSGi-based framework. The final application integrates several technologies like EIB and Web Services. Three different user interfaces are provided for interacting with the system.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121001447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications Ubicomp应用程序中隐私威胁的分析和保护设计指南
Pub Date : 1900-01-01 DOI: 10.5220/0002499800490061
Elena Vildjiounaite, P. Alahuhta, P. Ahonen, David Wright, M. Friedewald
Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by numerous tiny sensors, active information exchange over short and long distances, long-term storage of large quantities of data, and reasoning on collected and stored data. An analysis of more than 100 Ubicomp scenarios, however, shows that applications nowadays are often developed without considering privacy issues. This paper suggests guidelines for estimation of threats to privacy, depending on real world application settings and on choice of technology; and guidelines for developing technological safeguards against privacy threats.
Ubicomp愿景在现实世界中的实现对个人隐私造成了重大威胁,因为许多微型传感器不断收集信息,在短距离和长距离上进行主动信息交换,长期存储大量数据,以及对收集和存储的数据进行推理。然而,对100多个Ubicomp场景的分析表明,如今的应用程序通常在开发时没有考虑隐私问题。本文建议根据现实世界的应用程序设置和技术选择来评估隐私威胁的准则;以及针对隐私威胁开发技术保障措施的指导方针。
{"title":"Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications","authors":"Elena Vildjiounaite, P. Alahuhta, P. Ahonen, David Wright, M. Friedewald","doi":"10.5220/0002499800490061","DOIUrl":"https://doi.org/10.5220/0002499800490061","url":null,"abstract":"Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by numerous tiny sensors, active information exchange over short and long distances, long-term storage of large quantities of data, and reasoning on collected and stored data. An analysis of more than 100 Ubicomp scenarios, however, shows that applications nowadays are often developed without considering privacy issues. This paper suggests guidelines for estimation of threats to privacy, depending on real world application settings and on choice of technology; and guidelines for developing technological safeguards against privacy threats.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Service Discovery Infrastructure for Heterogeneous Wired/Bluetooth Networks 异构有线/蓝牙网络的服务发现基础结构
Pub Date : 1900-01-01 DOI: 10.5220/0002671301700179
E. Pagani, Stefano Tebaldi, G. P. Rossi
Specifications of some applications based on the Bluetooth protocol stack have already been standardized by the Bluetooth Special Interest Group. Those applications can however be accessed inside a piconet, while Bluetooth devices belonging to different piconets are not able so far of cooperating in a distributed application. In this paper, a framework is proposed that allows a Bluetooth device to search for services provided by other devices, also in case they are connected to different piconets that communicate through a wired network. The proposed framework has been implemented on a testbed platform and its suitability has been tested by using it to distribute a file transfer service over a heterogeneous network.
一些基于蓝牙协议栈的应用规范已经被蓝牙特殊兴趣组标准化了。然而,这些应用程序可以在微网内访问,而属于不同微网的蓝牙设备目前还不能在分布式应用程序中进行合作。在本文中,提出了一个框架,允许蓝牙设备搜索其他设备提供的服务,即使它们连接到通过有线网络通信的不同微网。该框架已在一个测试平台上实现,并通过在异构网络上分发文件传输服务来测试其适用性。
{"title":"A Service Discovery Infrastructure for Heterogeneous Wired/Bluetooth Networks","authors":"E. Pagani, Stefano Tebaldi, G. P. Rossi","doi":"10.5220/0002671301700179","DOIUrl":"https://doi.org/10.5220/0002671301700179","url":null,"abstract":"Specifications of some applications based on the Bluetooth protocol stack have already been standardized by the Bluetooth Special Interest Group. Those applications can however be accessed inside a piconet, while Bluetooth devices belonging to different piconets are not able so far of cooperating in a distributed application. In this paper, a framework is proposed that allows a Bluetooth device to search for services provided by other devices, also in case they are connected to different piconets that communicate through a wired network. The proposed framework has been implemented on a testbed platform and its suitability has been tested by using it to distribute a file transfer service over a heterogeneous network.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127903130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protecting People on the Move through Virtual Personal Security 通过虚拟个人安全保护移动中的人们
Pub Date : 1900-01-01 DOI: 10.5220/0002658701390146
Dadong Wan, A. Gershman
Ensuring personal safety for people on the move is becoming a heightened priority in today’s uncertain environment. Traditional approaches are no longer adequate in meeting rising demands in personal security. In this paper, we describe VIRTUAL PERSONAL SECURITY, a research prototype that demonstrates how technologies, such as ubiquitous surveillance cameras, location-aware PDAs and cell phones, wireless networks, and Web Services can be brought together to create a virtualized personal security service. By incorporating automatic service discovery, situated sensing and multimedia communication, the novel solution provides consumers with increasing availability, lower cost, and high flexibility. It also creates a new market for just-in-time micro security services, providing the owners of surveillance cameras a new revenue stream.
在当今不确定的环境中,确保流动人员的人身安全已成为重中之重。传统的方法已不能满足日益增长的人身安全需求。在本文中,我们描述了虚拟个人安全,这是一个研究原型,展示了如何将无处不在的监控摄像头、位置感知pda和移动电话、无线网络和Web服务等技术结合起来创建虚拟个人安全服务。通过集成自动服务发现、位置传感和多媒体通信,这种新颖的解决方案为消费者提供了更高的可用性、更低的成本和更高的灵活性。它还为即时微型安全服务创造了一个新的市场,为监控摄像头的所有者提供了一个新的收入来源。
{"title":"Protecting People on the Move through Virtual Personal Security","authors":"Dadong Wan, A. Gershman","doi":"10.5220/0002658701390146","DOIUrl":"https://doi.org/10.5220/0002658701390146","url":null,"abstract":"Ensuring personal safety for people on the move is becoming a heightened priority in today’s uncertain environment. Traditional approaches are no longer adequate in meeting rising demands in personal security. In this paper, we describe VIRTUAL PERSONAL SECURITY, a research prototype that demonstrates how technologies, such as ubiquitous surveillance cameras, location-aware PDAs and cell phones, wireless networks, and Web Services can be brought together to create a virtualized personal security service. By incorporating automatic service discovery, situated sensing and multimedia communication, the novel solution provides consumers with increasing availability, lower cost, and high flexibility. It also creates a new market for just-in-time micro security services, providing the owners of surveillance cameras a new revenue stream.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129289603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pervasive Secure Electronic Healthcare Records Management 普及的安全电子医疗记录管理
Pub Date : 1900-01-01 DOI: 10.5220/0002572801010110
P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, Ioannis Chalaris
Pervasive environments introduce a technological paradigm shift, giving a new impetus to the functionality of applications, overcoming applicability barriers of legacy applications. Electronic healthcare records management can clearly benefit from the new challenges brought by this emerging technology, due to its low cost and high percentage of user adoption. Still, the sensitivity of medical data, poses new requirements in the design of a secure infrastructure based on the ad-hoc networking schema, which underlies pervasive environments. User authorization and controlled access to information is of outmost importance. This paper proposes a management system for electronic healthcare records satisfying the aforementioned security requirements.
普适环境引入了一种技术范式转换,为应用程序的功能提供了新的推动力,克服了遗留应用程序的适用性障碍。电子医疗记录管理显然可以从这种新兴技术带来的新挑战中受益,因为它成本低,用户采用率高。尽管如此,医疗数据的敏感性对基于ad-hoc网络模式的安全基础设施的设计提出了新的要求,这种模式是普及环境的基础。用户授权和对信息的受控访问是最重要的。本文提出了一种满足上述安全要求的电子病历管理系统。
{"title":"Pervasive Secure Electronic Healthcare Records Management","authors":"P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, Ioannis Chalaris","doi":"10.5220/0002572801010110","DOIUrl":"https://doi.org/10.5220/0002572801010110","url":null,"abstract":"Pervasive environments introduce a technological paradigm shift, giving a new impetus to the functionality of applications, overcoming applicability barriers of legacy applications. Electronic healthcare records management can clearly benefit from the new challenges brought by this emerging technology, due to its low cost and high percentage of user adoption. Still, the sensitivity of medical data, poses new requirements in the design of a secure infrastructure based on the ad-hoc networking schema, which underlies pervasive environments. User authorization and controlled access to information is of outmost importance. This paper proposes a management system for electronic healthcare records satisfying the aforementioned security requirements.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116052186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-Sensitive Conversation Patterns for Agents in Wireless Environments 无线环境中agent的上下文敏感会话模式
Pub Date : 1900-01-01 DOI: 10.5220/0002676800110017
Santtu Toivonen, Heikki Helin, M. Laukkanen, Tapio Pitkäranta
Abstract. We outline an approach for adapting software agent conversations between a mobile client and a service provider. The adaptation takes advantage of the context information characterizing the client’s current situation. The service provider takes this context information into account when selecting / creating a suitable interaction protocol for communicating with the client. Both the context information and the interaction protocol descriptions are based on ontologies, which are assumed to be known by the conversating agents.
摘要我们概述了一种在移动客户端和服务提供商之间调整软件代理对话的方法。这种适应利用了描述客户当前情况的上下文信息。在选择/创建用于与客户机通信的合适交互协议时,服务提供者会考虑此上下文信息。上下文信息和交互协议描述都基于本体,它们被假定为对话代理所知道。
{"title":"Context-Sensitive Conversation Patterns for Agents in Wireless Environments","authors":"Santtu Toivonen, Heikki Helin, M. Laukkanen, Tapio Pitkäranta","doi":"10.5220/0002676800110017","DOIUrl":"https://doi.org/10.5220/0002676800110017","url":null,"abstract":"Abstract. We outline an approach for adapting software agent conversations between a mobile client and a service provider. The adaptation takes advantage of the context information characterizing the client’s current situation. The service provider takes this context information into account when selecting / creating a suitable interaction protocol for communicating with the client. Both the context information and the interaction protocol descriptions are based on ontologies, which are assumed to be known by the conversating agents.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134161183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Context-Aware Entity Recognition Scheme for Pervasive Computing 面向普适计算的上下文感知实体识别方案
Pub Date : 1900-01-01 DOI: 10.5220/0002662201470159
Rui He, J. Niu, Jianping Hu, Jian Ma
In the future world filled with pervasive computing, almost all entities can be mobile, which means not only service requesters but also service providers are always dynamic and unpredictable. This raises two security problems. For service providers, how can they keep their security capability when they move here and there? And for service requesters, how can they be trusted by various service providers that may have different security requirements? Unfortunately, available security mechanisms, including traditional authentication and authorization approaches and exotic trust management proposals, cannot solve the both two problems very well. In this paper, we propose a context-aware entity recognition scheme, which enables service providers to use their current trust infrastructures to determine whether requesters are trustworthy or not, and also enables service requesters to be recognized through exchanging different information with service providers according to different services they request and different security level service providers require. We argue for the notion of “Trust Infrastructure”, which is an abstract of all available trusted entities that can help an entity to recognize strangers in pervasive environments and can be dynamically built when entities move about. We also argue for an attribute-based recognition information exchange scheme, which makes it possible for service requesters to be checked in terms of trustworthiness in various scenarios. Finally, we give an algorithm to compute a service requester’s trust value based on the trust infrastructure of the service provider entity..
在普适计算的未来世界中,几乎所有实体都可以是移动的,这意味着服务请求者和服务提供者都是动态的和不可预测的。这引发了两个安全问题。对于服务提供商来说,当他们到处移动时,他们如何保持自己的安全能力?对于服务请求者,如何才能得到可能具有不同安全性需求的各种服务提供者的信任?不幸的是,现有的安全机制,包括传统的身份验证和授权方法以及外来的信任管理建议,并不能很好地解决这两个问题。本文提出了一种上下文感知的实体识别方案,使服务提供者能够利用其现有的信任基础设施来确定请求者是否值得信任,并根据服务提供者请求的不同服务和服务提供者要求的不同安全级别,通过与服务提供者交换不同的信息来识别服务请求者。我们支持“信任基础设施”的概念,它是所有可用可信实体的抽象,可以帮助实体在普遍环境中识别陌生人,并且可以在实体移动时动态构建。我们还提出了一种基于属性的识别信息交换方案,这使得在各种情况下检查服务请求者的可信度成为可能。最后,给出了基于服务提供者实体的信任基础结构计算服务请求者信任值的算法。
{"title":"A Context-Aware Entity Recognition Scheme for Pervasive Computing","authors":"Rui He, J. Niu, Jianping Hu, Jian Ma","doi":"10.5220/0002662201470159","DOIUrl":"https://doi.org/10.5220/0002662201470159","url":null,"abstract":"In the future world filled with pervasive computing, almost all entities can be mobile, which means not only service requesters but also service providers are always dynamic and unpredictable. This raises two security problems. For service providers, how can they keep their security capability when they move here and there? And for service requesters, how can they be trusted by various service providers that may have different security requirements? Unfortunately, available security mechanisms, including traditional authentication and authorization approaches and exotic trust management proposals, cannot solve the both two problems very well. In this paper, we propose a context-aware entity recognition scheme, which enables service providers to use their current trust infrastructures to determine whether requesters are trustworthy or not, and also enables service requesters to be recognized through exchanging different information with service providers according to different services they request and different security level service providers require. We argue for the notion of “Trust Infrastructure”, which is an abstract of all available trusted entities that can help an entity to recognize strangers in pervasive environments and can be dynamically built when entities move about. We also argue for an attribute-based recognition information exchange scheme, which makes it possible for service requesters to be checked in terms of trustworthiness in various scenarios. Finally, we give an algorithm to compute a service requester’s trust value based on the trust infrastructure of the service provider entity..","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133892609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interacting with our Environment through Sentient Mobile Phones 通过智能手机与环境互动
Pub Date : 1900-01-01 DOI: 10.5220/0002564000190027
D. López-de-Ipiña, Juan Ignacio Vázquez, D. Sainz
The latest mobile phones are offering more multimedia features, better communication capabilities (Bluetooth, GPRS, 3G) and are far more easily programmable (extensible) than ever before. So far, the “killer apps” to exploit these new capabilities have been presented in the form of MMS (Multimedia Messaging), video conferencing and multimedia-on-demand services. We deem that a new promising application domain for the latest Smart Phones is their use as intermediaries between us and our surrounding environment. Thus, our mobiles will behave as personal butlers who assist us in our daily tasks, taking advantage of the computational services provided at our working or living environments. For this to happen, a key element is to add senses to our mobiles: capability to see (camera), hear (michrophone), notice (Bluetooth) the objects and devices offering computational services. In this paper, we present a solution to this issue, the MobileSense system. We illustrate its use in two scenarios: (1) making mobiles more accessible to people with disabilities and (2) enabling the mobiles as guiding devices within a museum.
最新的移动电话提供了更多的多媒体功能,更好的通信能力(蓝牙,GPRS, 3G),并且比以前更容易编程(扩展)。到目前为止,利用这些新功能的“杀手级应用”已经以MMS(多媒体消息)、视频会议和多媒体点播服务的形式出现。我们认为最新的智能手机的一个新的应用领域是它们作为我们和周围环境之间的中介。因此,我们的手机将扮演私人管家的角色,利用我们工作或生活环境中提供的计算服务,协助我们完成日常任务。要实现这一目标,一个关键因素是为我们的移动设备增加感官:能够看到(摄像头)、听到(麦克风)、注意到(蓝牙)提供计算服务的物体和设备。在本文中,我们提出了一个解决这个问题的方案,MobileSense系统。我们在两种情况下说明了它的使用:(1)使残疾人更容易使用移动设备;(2)使移动设备成为博物馆内的引导设备。
{"title":"Interacting with our Environment through Sentient Mobile Phones","authors":"D. López-de-Ipiña, Juan Ignacio Vázquez, D. Sainz","doi":"10.5220/0002564000190027","DOIUrl":"https://doi.org/10.5220/0002564000190027","url":null,"abstract":"The latest mobile phones are offering more multimedia features, better communication capabilities (Bluetooth, GPRS, 3G) and are far more easily programmable (extensible) than ever before. So far, the “killer apps” to exploit these new capabilities have been presented in the form of MMS (Multimedia Messaging), video conferencing and multimedia-on-demand services. We deem that a new promising application domain for the latest Smart Phones is their use as intermediaries between us and our surrounding environment. Thus, our mobiles will behave as personal butlers who assist us in our daily tasks, taking advantage of the computational services provided at our working or living environments. For this to happen, a key element is to add senses to our mobiles: capability to see (camera), hear (michrophone), notice (Bluetooth) the objects and devices offering computational services. In this paper, we present a solution to this issue, the MobileSense system. We illustrate its use in two scenarios: (1) making mobiles more accessible to people with disabilities and (2) enabling the mobiles as guiding devices within a museum.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125128281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
iCricket: A Programmable Brick for Kids' Pervasive Computing Applications iCricket:儿童普适计算应用的可编程砖
Pub Date : 1900-01-01 DOI: 10.5220/0002574100750081
F. Martin, K. Par, Kareem Abu-Zahra, Vasiliy Dulsky, A. Chanler
The iCricket is a new internet-enabled embedded control board with built-in motor and sensor interface circuits. It is designed for use by pre-college students and other programming novices. It includes a Logo virtual machine with extensions that allow networked iCrickets communicate with one another, retrieving sensor values and remotely running each other’s Logo procedures. The underlying implementation uses standard HTTP protocols. The iCricket’s key contribution is that it will allow programming novices (children, artists, and other non-engineers) to implement pervasive computing applications with an easy-touse, interactive language (Logo). This paper focuses the iCricket hardware and software design. Later work will evaluate results of using the design with various users.
iCricket是一款内置电机和传感器接口电路的新型互联网嵌入式控制板。它是为大学预科学生和其他编程新手设计的。它包括一个带有扩展的Logo虚拟机,允许联网的icricket相互通信,检索传感器值并远程运行彼此的Logo过程。底层实现使用标准HTTP协议。iCricket的主要贡献在于,它允许编程新手(儿童、艺术家和其他非工程师)使用易于使用的交互式语言(Logo)实现普及计算应用程序。本文重点介绍了iCricket的硬件和软件设计。后期的工作将评估不同用户使用该设计的结果。
{"title":"iCricket: A Programmable Brick for Kids' Pervasive Computing Applications","authors":"F. Martin, K. Par, Kareem Abu-Zahra, Vasiliy Dulsky, A. Chanler","doi":"10.5220/0002574100750081","DOIUrl":"https://doi.org/10.5220/0002574100750081","url":null,"abstract":"The iCricket is a new internet-enabled embedded control board with built-in motor and sensor interface circuits. It is designed for use by pre-college students and other programming novices. It includes a Logo virtual machine with extensions that allow networked iCrickets communicate with one another, retrieving sensor values and remotely running each other’s Logo procedures. The underlying implementation uses standard HTTP protocols. The iCricket’s key contribution is that it will allow programming novices (children, artists, and other non-engineers) to implement pervasive computing applications with an easy-touse, interactive language (Logo). This paper focuses the iCricket hardware and software design. Later work will evaluate results of using the design with various users.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Service Composition in eHome Systems: A Rule-based Approach eHome系统中的服务组合:基于规则的方法
Pub Date : 1900-01-01 DOI: 10.5220/0002576700280038
M. Kirchhof, Philipp Stinauer
This paper deals with eHome systems. We focus on theservice composition in order to reduce complexity and to leverage maintainability and extensibility of eHome services. Talking about services, we mean any piece of software, which is executed in a network environment, making the usage and administration of ubiquitous appliances easier. Current situation is, that the complete functionality is hard-coded into services without the facilities to be extended or reused. Many logical correlations (e.g., how to react if an alarm condition is raised) are made explicit in an inappropriate way. To tackle this problem, we introduce a declarative approach to specify logical correlations and to combine functionalities and services to new services, offering the required flexibility and comprehen-
本文研究的是eHome系统。我们关注这些服务组合是为了降低复杂性,并利用eHome服务的可维护性和可扩展性。谈到服务,我们指的是在网络环境中执行的任何软件,这使得无处不在的设备的使用和管理变得更加容易。目前的情况是,完整的功能被硬编码到服务中,没有可扩展或重用的设施。许多逻辑相关性(例如,如果警报条件出现,如何反应)以不适当的方式显式表示。为了解决这个问题,我们引入了一种声明性方法来指定逻辑相关性,并将功能和服务组合到新服务中,从而提供所需的灵活性和综合性
{"title":"Service Composition in eHome Systems: A Rule-based Approach","authors":"M. Kirchhof, Philipp Stinauer","doi":"10.5220/0002576700280038","DOIUrl":"https://doi.org/10.5220/0002576700280038","url":null,"abstract":"This paper deals with eHome systems. We focus on theservice composition in order to reduce complexity and to leverage maintainability and extensibility of eHome services. Talking about services, we mean any piece of software, which is executed in a network environment, making the usage and administration of ubiquitous appliances easier. Current situation is, that the complete functionality is hard-coded into services without the facilities to be extended or reused. Many logical correlations (e.g., how to react if an alarm condition is raised) are made explicit in an inappropriate way. To tackle this problem, we introduce a declarative approach to specify logical correlations and to combine functionalities and services to new services, offering the required flexibility and comprehen-","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115652445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Workshop on Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1