Pub Date : 2006-04-10DOI: 10.1109/ISWPC.2006.1613665
Yuping Yang, M. Williams, N. Taylor, S. McBurney, E. Papadopoulou
One important feature of a wireless pervasive computing system is to ensure that any incoming communication addressed to the user is dealt with according to the user's wishes - sent to an appropriate device, forwarded to another user, stored, etc. This is referred to as personalized redirection of communication. To do this it is necessary to maintain a profile of user preferences. However, in doing so, there is a natural risk to the security and privacy of the user. This paper considers two systems - one developed specifically to study personalized redirection and the other a wireless pervasive computing system which incorporates some of these ideas. Three different approaches to handling user identity that have been adopted in these two systems are described. The effects of these different approaches on personalization and the consequences for security and privacy in a wireless pervasive computing environment are discussed and compared.
{"title":"Handling personalized redirection in a wireless pervasive computing system with different approaches to identity","authors":"Yuping Yang, M. Williams, N. Taylor, S. McBurney, E. Papadopoulou","doi":"10.1109/ISWPC.2006.1613665","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613665","url":null,"abstract":"One important feature of a wireless pervasive computing system is to ensure that any incoming communication addressed to the user is dealt with according to the user's wishes - sent to an appropriate device, forwarded to another user, stored, etc. This is referred to as personalized redirection of communication. To do this it is necessary to maintain a profile of user preferences. However, in doing so, there is a natural risk to the security and privacy of the user. This paper considers two systems - one developed specifically to study personalized redirection and the other a wireless pervasive computing system which incorporates some of these ideas. Three different approaches to handling user identity that have been adopted in these two systems are described. The effects of these different approaches on personalization and the consequences for security and privacy in a wireless pervasive computing environment are discussed and compared.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126532259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-10DOI: 10.1109/ISWPC.2006.1613575
K. Sakakibara, H. Nakagawa, J. Yamakita
We develop an analytic model to evaluate non-saturation energy consumption of IEEE 802.11 DCF, based on the model in G.R. Cantieni et al., (2005). The model explicitly takes into account both the carrier sensing mechanism and an additional backoff interval after successful frame transmission, which can be ignored under saturation conditions. The probability generating function with respect to energy consumed between consecutive frame generations is derived. Numerical example shows that most of the energy is wasted in carrier sensing when the frame generation probability is smaller than some critical value and that the energy consumed in overhearing a frame destined to another user occupies the major part otherwise.
基于G.R. Cantieni et al.,(2005)中的模型,我们开发了一个分析模型来评估IEEE 802.11 DCF的非饱和能耗。该模型明确地考虑了载波感知机制和成功传输帧后的额外后退间隔,在饱和条件下可以忽略。推导了连续帧之间能量消耗的概率生成函数。数值算例表明,当帧生成概率小于某个临界值时,大部分能量浪费在载波感知上,而窃听发送给另一个用户的帧所消耗的能量占大部分。
{"title":"Analysis of energy consumption of IEEE 802.11 DCF under non-saturation conditions","authors":"K. Sakakibara, H. Nakagawa, J. Yamakita","doi":"10.1109/ISWPC.2006.1613575","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613575","url":null,"abstract":"We develop an analytic model to evaluate non-saturation energy consumption of IEEE 802.11 DCF, based on the model in G.R. Cantieni et al., (2005). The model explicitly takes into account both the carrier sensing mechanism and an additional backoff interval after successful frame transmission, which can be ignored under saturation conditions. The probability generating function with respect to energy consumed between consecutive frame generations is derived. Numerical example shows that most of the energy is wasted in carrier sensing when the frame generation probability is smaller than some critical value and that the energy consumed in overhearing a frame destined to another user occupies the major part otherwise.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127640158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-10DOI: 10.1109/ISWPC.2006.1613659
A. Gyasi-Agyei, Seong-Lyun Kim
We consider scheduling schemes which exploit the random variability in wireless channels to maximize wireless throughput. We survey ten of such opportunistic scheduling policies, namely, PFS, OCASD, TAOS-1, I-OCASD, CASTI, EXP, M-LWDF, FIFO, RR and MaxC/I and compare them in terms of system throughput, fairness (user isolation) and the distributions of user starvation periods (packet delays) in a time-slotted wireless network like CDMA/HDR using adaptive modulation and coding (AMC). The results aids in determining the suitability of any of the ten policies in a wireless network depending on which metric is considered critical.
{"title":"Comparison of opportunistic scheduling policies in time-slotted AMC wireless networks","authors":"A. Gyasi-Agyei, Seong-Lyun Kim","doi":"10.1109/ISWPC.2006.1613659","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613659","url":null,"abstract":"We consider scheduling schemes which exploit the random variability in wireless channels to maximize wireless throughput. We survey ten of such opportunistic scheduling policies, namely, PFS, OCASD, TAOS-1, I-OCASD, CASTI, EXP, M-LWDF, FIFO, RR and MaxC/I and compare them in terms of system throughput, fairness (user isolation) and the distributions of user starvation periods (packet delays) in a time-slotted wireless network like CDMA/HDR using adaptive modulation and coding (AMC). The results aids in determining the suitability of any of the ten policies in a wireless network depending on which metric is considered critical.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115449547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-10DOI: 10.1109/ISWPC.2006.1613605
M. Do, W. Chin, Y. Wu
In this paper we study a hybrid space time block coded system with four transmit antennas. The system consists of one Alamouti space time block coded stream, and two spatial multiplexing streams which are transmitted using two antennas each. The paper also describes and analyze the merits and performance of several detection schemes for a hybrid space time block coded system. These systems are interesting as they allow for both diversity and multiplexing gains in a MIMO system. Most multiantenna systems exploit either diversity or spatial multiplexing gains, but not both. Simulation results comparing the performance of different detection schemes and their performance relative to other transmission schemes such as Alamouti space time block codes and conventional spatial multiplexing are shown.
{"title":"Performance study of a hybrid space time block coded system","authors":"M. Do, W. Chin, Y. Wu","doi":"10.1109/ISWPC.2006.1613605","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613605","url":null,"abstract":"In this paper we study a hybrid space time block coded system with four transmit antennas. The system consists of one Alamouti space time block coded stream, and two spatial multiplexing streams which are transmitted using two antennas each. The paper also describes and analyze the merits and performance of several detection schemes for a hybrid space time block coded system. These systems are interesting as they allow for both diversity and multiplexing gains in a MIMO system. Most multiantenna systems exploit either diversity or spatial multiplexing gains, but not both. Simulation results comparing the performance of different detection schemes and their performance relative to other transmission schemes such as Alamouti space time block codes and conventional spatial multiplexing are shown.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122825319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-10DOI: 10.1109/ISWPC.2006.1613642
T. Singh, M. L. Sim
Devices such as cell phones, smart phones, personal digital assistants, are increasing in number. These devices have become almost indispensable in our modern society. In spite of the proliferation of these devices, the design is done by device manufactures with little interaction or input from the service providers. This paper is intended to provide a brief glimpse into the design thought process from the perspective of a service provider. A series of scenarios will be discussed that can be used to generate user requirements for a universal access device. The traditional design approach is then discussed and the perspective of the service provider is presented.
{"title":"Broadband access device and user interface design for ubiquitous computing: perspective from a service provider","authors":"T. Singh, M. L. Sim","doi":"10.1109/ISWPC.2006.1613642","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613642","url":null,"abstract":"Devices such as cell phones, smart phones, personal digital assistants, are increasing in number. These devices have become almost indispensable in our modern society. In spite of the proliferation of these devices, the design is done by device manufactures with little interaction or input from the service providers. This paper is intended to provide a brief glimpse into the design thought process from the perspective of a service provider. A series of scenarios will be discussed that can be used to generate user requirements for a universal access device. The traditional design approach is then discussed and the perspective of the service provider is presented.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131433177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-10DOI: 10.1109/ISWPC.2006.1613568
Jae Sung Lee, Peng Gong, D. Kim
Satellite-Digital Multimedia Broadcasting (S-DMB) systems make it possible to watch the televisions on the hands as well as in the vehicular outside. But in case of handheld version of terminal, especially S-DMB phone, there are several challenging issues, which have not been seen in the other terminals. One of these issues is short viewing time, which is caused by limited battery. In this paper, we propose an Adaptive Reception Technique (ART) which provides power saving when the line-of-sight path exists from the satellite. By launching the Frame Selection Control (FSC) at the receiver and modifying the puncturing algorithm, we can simply employ ART and reduce power consumption by about 17.5∼25.5%/.
{"title":"A Novel Adaptive Reception Technique for Satellite-DMB systems in a Rician Channel","authors":"Jae Sung Lee, Peng Gong, D. Kim","doi":"10.1109/ISWPC.2006.1613568","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613568","url":null,"abstract":"Satellite-Digital Multimedia Broadcasting (S-DMB) systems make it possible to watch the televisions on the hands as well as in the vehicular outside. But in case of handheld version of terminal, especially S-DMB phone, there are several challenging issues, which have not been seen in the other terminals. One of these issues is short viewing time, which is caused by limited battery. In this paper, we propose an Adaptive Reception Technique (ART) which provides power saving when the line-of-sight path exists from the satellite. By launching the Frame Selection Control (FSC) at the receiver and modifying the puncturing algorithm, we can simply employ ART and reduce power consumption by about 17.5∼25.5%/.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117288216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-10DOI: 10.1109/ISWPC.2006.1613589
J. Barria, Ricardo Lent
We define a MANET route discovery protocol particularly suitable for networks that exhibit a rapid changing topology. LDRP relies on an auxiliary sensor network to gather localization information of nodes and makes use of this information to identify links of high residual lifetime for communications. In simulation, we show that LDRP outperforms the level of service provided by a flooding based algorithm. This advantage is clearly seen in terms of both higher throughput and lower packet loss for UDP or TCP based traffic.
{"title":"MANET Route Discovery using Residual Lifetime Estimation","authors":"J. Barria, Ricardo Lent","doi":"10.1109/ISWPC.2006.1613589","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613589","url":null,"abstract":"We define a MANET route discovery protocol particularly suitable for networks that exhibit a rapid changing topology. LDRP relies on an auxiliary sensor network to gather localization information of nodes and makes use of this information to identify links of high residual lifetime for communications. In simulation, we show that LDRP outperforms the level of service provided by a flooding based algorithm. This advantage is clearly seen in terms of both higher throughput and lower packet loss for UDP or TCP based traffic.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133280979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-10DOI: 10.1109/ISWPC.2006.1613627
M. Williams, Yuping Yang, N. Taylor, S. McBurney, E. Papadopoulou, F. Mahon, M. Crotty
A wireless pervasive computing environment needs to dynamically adapt its functionality and behaviour to changes in the resources and services available to a user at any point in time. For a mobile user this means that as the user changes location, the pervasive environment should take account of any changes to the services that are available. Thus initially when the user requests a service the most appropriate service must be provided, but as the user moves around, the service provided could change. To handle this, a wireless pervasive system needs to provide dynamic service composition (and re-composition) based on the user's personal preferences and current context. The Daidalos project is developing a platform to support pervasive services, which provides dynamic personalized service composition. This paper describes the problems and the role of personalization in the approaches adopted in Daidalos to deal with dynamic service composition and re-composition. The basic ideas have been prototyped and demonstrated, and are currently being integrated and extended.
{"title":"Personalized Dynamic Composition of Services and Resources in a Wireless Pervasive Computing Environment","authors":"M. Williams, Yuping Yang, N. Taylor, S. McBurney, E. Papadopoulou, F. Mahon, M. Crotty","doi":"10.1109/ISWPC.2006.1613627","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613627","url":null,"abstract":"A wireless pervasive computing environment needs to dynamically adapt its functionality and behaviour to changes in the resources and services available to a user at any point in time. For a mobile user this means that as the user changes location, the pervasive environment should take account of any changes to the services that are available. Thus initially when the user requests a service the most appropriate service must be provided, but as the user moves around, the service provided could change. To handle this, a wireless pervasive system needs to provide dynamic service composition (and re-composition) based on the user's personal preferences and current context. The Daidalos project is developing a platform to support pervasive services, which provides dynamic personalized service composition. This paper describes the problems and the role of personalization in the approaches adopted in Daidalos to deal with dynamic service composition and re-composition. The basic ideas have been prototyped and demonstrated, and are currently being integrated and extended.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115560930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-10DOI: 10.1109/ISWPC.2006.1613612
S. Balasubramaniam, T. Pfeifer, J. Indulska
A major requirement for pervasive systems is to integrate context-awareness to support heterogeneous networks and device technologies and at the same time support application adaptations to suit user activities. However, current infrastructures for pervasive systems are based on centralized architectures which are focused on context support for service adaptations in response to changes in the computing environment or user mobility. In this paper, we propose a hierarchical architecture based on active nodes, which maximizes the computational capabilities of various nodes within the pervasive computing environment, while efficiently gathering and evaluating context information from the user's working environment. The migratable active node architecture employs various decision making processes for evaluating a rich set of context information in order to dynamically allocate active nodes in the working environment, perform application adaptations and predict user mobility. The active node also utilizes the Redundant Positioning System to accurately manage user's mobility. This paper demonstrates the active node capabilities through context-aware vertical handover applications.
{"title":"Active Node supporting Context-aware Vertical Handover in Pervasive Computing Environment with Redundant Positioning","authors":"S. Balasubramaniam, T. Pfeifer, J. Indulska","doi":"10.1109/ISWPC.2006.1613612","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613612","url":null,"abstract":"A major requirement for pervasive systems is to integrate context-awareness to support heterogeneous networks and device technologies and at the same time support application adaptations to suit user activities. However, current infrastructures for pervasive systems are based on centralized architectures which are focused on context support for service adaptations in response to changes in the computing environment or user mobility. In this paper, we propose a hierarchical architecture based on active nodes, which maximizes the computational capabilities of various nodes within the pervasive computing environment, while efficiently gathering and evaluating context information from the user's working environment. The migratable active node architecture employs various decision making processes for evaluating a rich set of context information in order to dynamically allocate active nodes in the working environment, perform application adaptations and predict user mobility. The active node also utilizes the Redundant Positioning System to accurately manage user's mobility. This paper demonstrates the active node capabilities through context-aware vertical handover applications.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124471709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-10DOI: 10.1109/ISWPC.2006.1613629
Tang Xiaosheng, Shen Qinghua, Zhang Ping
Context-based service is the trend of next generation service especially under the wireless pervasive computing environment. In order to provide the always best experience (ABE) under heterogeneous communication system, it's very important for applications to get support from distributed context information. So, the context aware system should have the ability of collecting, processing and providing inferred result to applications in distributed environment. In this paper, we introduce a distributed context aware model to accomplish this goal and give some explanations for every module. We have also carried out a prototype testbed to give a demonstration of this model.
{"title":"A distributed context aware model for pervasive service environment","authors":"Tang Xiaosheng, Shen Qinghua, Zhang Ping","doi":"10.1109/ISWPC.2006.1613629","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613629","url":null,"abstract":"Context-based service is the trend of next generation service especially under the wireless pervasive computing environment. In order to provide the always best experience (ABE) under heterogeneous communication system, it's very important for applications to get support from distributed context information. So, the context aware system should have the ability of collecting, processing and providing inferred result to applications in distributed environment. In this paper, we introduce a distributed context aware model to accomplish this goal and give some explanations for every module. We have also carried out a prototype testbed to give a demonstration of this model.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124901488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}