首页 > 最新文献

2006 1st International Symposium on Wireless Pervasive Computing最新文献

英文 中文
Privacy protection for secure mobile RFID service 安全移动RFID服务的隐私保护
Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613661
Doo-Ho Choi, Tae Sung Kim, H. Kim
Widespread deployment of radio frequency identification (RFID) tags may create new threats to user privacy due to the automated tracking capability. Recently, RFID technology shows a convergence tendency. RFID reader is contained in a mobile phone. User privacy problem is a prior consideration for mobile RFID service deployment, since most mobile RFID service scenario is based on end-user service. In this paper, we propose a new solution for user privacy protection, which is a modification of EPC Class-1 Generation-2 protocol. Furthermore, we introduce a privacy protection scenario for mobile RFID service using this proposed scheme.
由于射频识别(RFID)标签的自动跟踪功能,其广泛部署可能会对用户隐私造成新的威胁。近年来,RFID技术呈现趋同趋势。RFID读取器包含在移动电话中。用户隐私问题是移动RFID服务部署的首要考虑因素,因为大多数移动RFID服务场景都是基于终端用户服务的。本文提出了一种新的用户隐私保护方案,该方案是对EPC第1类第2代协议的改进。此外,我们还介绍了使用该方案的移动RFID服务的隐私保护场景。
{"title":"Privacy protection for secure mobile RFID service","authors":"Doo-Ho Choi, Tae Sung Kim, H. Kim","doi":"10.1109/ISWPC.2006.1613661","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613661","url":null,"abstract":"Widespread deployment of radio frequency identification (RFID) tags may create new threats to user privacy due to the automated tracking capability. Recently, RFID technology shows a convergence tendency. RFID reader is contained in a mobile phone. User privacy problem is a prior consideration for mobile RFID service deployment, since most mobile RFID service scenario is based on end-user service. In this paper, we propose a new solution for user privacy protection, which is a modification of EPC Class-1 Generation-2 protocol. Furthermore, we introduce a privacy protection scenario for mobile RFID service using this proposed scheme.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of energy consumption of IEEE 802.11 DCF under non-saturation conditions IEEE 802.11 DCF在非饱和条件下的能耗分析
Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613575
K. Sakakibara, H. Nakagawa, J. Yamakita
We develop an analytic model to evaluate non-saturation energy consumption of IEEE 802.11 DCF, based on the model in G.R. Cantieni et al., (2005). The model explicitly takes into account both the carrier sensing mechanism and an additional backoff interval after successful frame transmission, which can be ignored under saturation conditions. The probability generating function with respect to energy consumed between consecutive frame generations is derived. Numerical example shows that most of the energy is wasted in carrier sensing when the frame generation probability is smaller than some critical value and that the energy consumed in overhearing a frame destined to another user occupies the major part otherwise.
基于G.R. Cantieni et al.,(2005)中的模型,我们开发了一个分析模型来评估IEEE 802.11 DCF的非饱和能耗。该模型明确地考虑了载波感知机制和成功传输帧后的额外后退间隔,在饱和条件下可以忽略。推导了连续帧之间能量消耗的概率生成函数。数值算例表明,当帧生成概率小于某个临界值时,大部分能量浪费在载波感知上,而窃听发送给另一个用户的帧所消耗的能量占大部分。
{"title":"Analysis of energy consumption of IEEE 802.11 DCF under non-saturation conditions","authors":"K. Sakakibara, H. Nakagawa, J. Yamakita","doi":"10.1109/ISWPC.2006.1613575","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613575","url":null,"abstract":"We develop an analytic model to evaluate non-saturation energy consumption of IEEE 802.11 DCF, based on the model in G.R. Cantieni et al., (2005). The model explicitly takes into account both the carrier sensing mechanism and an additional backoff interval after successful frame transmission, which can be ignored under saturation conditions. The probability generating function with respect to energy consumed between consecutive frame generations is derived. Numerical example shows that most of the energy is wasted in carrier sensing when the frame generation probability is smaller than some critical value and that the energy consumed in overhearing a frame destined to another user occupies the major part otherwise.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127640158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Broadband access device and user interface design for ubiquitous computing: perspective from a service provider 面向普适计算的宽带接入设备和用户界面设计:服务提供商的视角
Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613642
T. Singh, M. L. Sim
Devices such as cell phones, smart phones, personal digital assistants, are increasing in number. These devices have become almost indispensable in our modern society. In spite of the proliferation of these devices, the design is done by device manufactures with little interaction or input from the service providers. This paper is intended to provide a brief glimpse into the design thought process from the perspective of a service provider. A series of scenarios will be discussed that can be used to generate user requirements for a universal access device. The traditional design approach is then discussed and the perspective of the service provider is presented.
手机、智能手机、个人数字助理等设备的数量正在增加。这些设备在我们的现代社会中几乎是不可或缺的。尽管这些设备越来越多,但设计是由设备制造商完成的,很少有服务提供商的互动或投入。本文旨在从服务提供者的角度简要介绍设计思维过程。将讨论一系列可用于生成通用访问设备的用户需求的场景。然后讨论了传统的设计方法,并提出了服务提供者的观点。
{"title":"Broadband access device and user interface design for ubiquitous computing: perspective from a service provider","authors":"T. Singh, M. L. Sim","doi":"10.1109/ISWPC.2006.1613642","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613642","url":null,"abstract":"Devices such as cell phones, smart phones, personal digital assistants, are increasing in number. These devices have become almost indispensable in our modern society. In spite of the proliferation of these devices, the design is done by device manufactures with little interaction or input from the service providers. This paper is intended to provide a brief glimpse into the design thought process from the perspective of a service provider. A series of scenarios will be discussed that can be used to generate user requirements for a universal access device. The traditional design approach is then discussed and the perspective of the service provider is presented.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131433177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-group-based authentication services for mobile ad hoc networks 移动自组网中基于信任组的身份验证服务
Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613623
Chih Chang, J. Lin, F. Lai
In recent years, mobile ad hoc networks have received more attention, because of their easy deployment. However, the characteristics of mobile ad hoc networks are more prone to physical security threats than the wired network environments. Therefore, it has become a primary concern of securing mobile ad hoc networks. In this paper, we address the problem of authentication in mobile ad hoc networks. Public-key based mechanisms are ideal to provide the authentication services. Although this is already mature in a fixed network, providing public key based authentication is still very challenging in mobile ad-hoc networks because of shared wireless medium, energy constrains, dynamic network topology. Here, we present a more efficient public key management system, like self-organized scheme (S. Capkun et al., 2003), and include the concept of trust group for mobile ad hoc networks.
近年来,移动自组织网络因其易于部署而受到越来越多的关注。然而,移动自组织网络的特点比有线网络环境更容易受到物理安全威胁。因此,它已成为确保移动自组织网络安全的首要问题。本文主要研究移动自组织网络中的身份验证问题。基于公钥的机制是提供身份验证服务的理想选择。尽管这在固定网络中已经很成熟,但由于无线介质共享、能量限制、网络拓扑动态等原因,在移动自组织网络中提供基于公钥的身份验证仍然是非常具有挑战性的。在这里,我们提出了一个更有效的公钥管理系统,如自组织方案(S. Capkun et al., 2003),并包括移动自组织网络信任组的概念。
{"title":"Trust-group-based authentication services for mobile ad hoc networks","authors":"Chih Chang, J. Lin, F. Lai","doi":"10.1109/ISWPC.2006.1613623","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613623","url":null,"abstract":"In recent years, mobile ad hoc networks have received more attention, because of their easy deployment. However, the characteristics of mobile ad hoc networks are more prone to physical security threats than the wired network environments. Therefore, it has become a primary concern of securing mobile ad hoc networks. In this paper, we address the problem of authentication in mobile ad hoc networks. Public-key based mechanisms are ideal to provide the authentication services. Although this is already mature in a fixed network, providing public key based authentication is still very challenging in mobile ad-hoc networks because of shared wireless medium, energy constrains, dynamic network topology. Here, we present a more efficient public key management system, like self-organized scheme (S. Capkun et al., 2003), and include the concept of trust group for mobile ad hoc networks.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Handling personalized redirection in a wireless pervasive computing system with different approaches to identity 在具有不同身份识别方法的无线普适计算系统中处理个性化重定向
Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613665
Yuping Yang, M. Williams, N. Taylor, S. McBurney, E. Papadopoulou
One important feature of a wireless pervasive computing system is to ensure that any incoming communication addressed to the user is dealt with according to the user's wishes - sent to an appropriate device, forwarded to another user, stored, etc. This is referred to as personalized redirection of communication. To do this it is necessary to maintain a profile of user preferences. However, in doing so, there is a natural risk to the security and privacy of the user. This paper considers two systems - one developed specifically to study personalized redirection and the other a wireless pervasive computing system which incorporates some of these ideas. Three different approaches to handling user identity that have been adopted in these two systems are described. The effects of these different approaches on personalization and the consequences for security and privacy in a wireless pervasive computing environment are discussed and compared.
无线普适计算系统的一个重要特征是确保任何针对用户的传入通信都按照用户的意愿进行处理——发送到适当的设备,转发给另一个用户,存储等等。这被称为个性化的通信重定向。为此,有必要维护用户首选项的配置文件。但是,这样做会对用户的安全和隐私造成自然的风险。本文考虑了两个系统——一个是专门研究个性化重定向的系统,另一个是集成了这些思想的无线普适计算系统。本文描述了在这两个系统中采用的处理用户身份的三种不同方法。讨论并比较了这些不同方法对个性化的影响以及在无线普适计算环境中对安全性和隐私的影响。
{"title":"Handling personalized redirection in a wireless pervasive computing system with different approaches to identity","authors":"Yuping Yang, M. Williams, N. Taylor, S. McBurney, E. Papadopoulou","doi":"10.1109/ISWPC.2006.1613665","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613665","url":null,"abstract":"One important feature of a wireless pervasive computing system is to ensure that any incoming communication addressed to the user is dealt with according to the user's wishes - sent to an appropriate device, forwarded to another user, stored, etc. This is referred to as personalized redirection of communication. To do this it is necessary to maintain a profile of user preferences. However, in doing so, there is a natural risk to the security and privacy of the user. This paper considers two systems - one developed specifically to study personalized redirection and the other a wireless pervasive computing system which incorporates some of these ideas. Three different approaches to handling user identity that have been adopted in these two systems are described. The effects of these different approaches on personalization and the consequences for security and privacy in a wireless pervasive computing environment are discussed and compared.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126532259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Adaptive Reception Technique for Satellite-DMB systems in a Rician Channel 一种新的卫星- dmb信道自适应接收技术
Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613568
Jae Sung Lee, Peng Gong, D. Kim
Satellite-Digital Multimedia Broadcasting (S-DMB) systems make it possible to watch the televisions on the hands as well as in the vehicular outside. But in case of handheld version of terminal, especially S-DMB phone, there are several challenging issues, which have not been seen in the other terminals. One of these issues is short viewing time, which is caused by limited battery. In this paper, we propose an Adaptive Reception Technique (ART) which provides power saving when the line-of-sight path exists from the satellite. By launching the Frame Selection Control (FSC) at the receiver and modifying the puncturing algorithm, we can simply employ ART and reduce power consumption by about 17.5∼25.5%/.
卫星数字多媒体广播(S-DMB)系统使得人们可以像在车外一样在手上观看电视。但是对于手持版本的终端,特别是S-DMB手机,存在一些其他终端没有出现的具有挑战性的问题。其中一个问题是观看时间短,这是由有限的电池造成的。在本文中,我们提出了一种自适应接收技术(ART),该技术可以在卫星视线路径存在时节省功率。通过在接收端启动帧选择控制(FSC)并修改穿刺算法,我们可以简单地采用ART并将功耗降低约17.5 ~ 25.5%/。
{"title":"A Novel Adaptive Reception Technique for Satellite-DMB systems in a Rician Channel","authors":"Jae Sung Lee, Peng Gong, D. Kim","doi":"10.1109/ISWPC.2006.1613568","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613568","url":null,"abstract":"Satellite-Digital Multimedia Broadcasting (S-DMB) systems make it possible to watch the televisions on the hands as well as in the vehicular outside. But in case of handheld version of terminal, especially S-DMB phone, there are several challenging issues, which have not been seen in the other terminals. One of these issues is short viewing time, which is caused by limited battery. In this paper, we propose an Adaptive Reception Technique (ART) which provides power saving when the line-of-sight path exists from the satellite. By launching the Frame Selection Control (FSC) at the receiver and modifying the puncturing algorithm, we can simply employ ART and reduce power consumption by about 17.5∼25.5%/.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117288216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Dynamic Composition of Services and Resources in a Wireless Pervasive Computing Environment 无线普适计算环境中服务和资源的个性化动态组合
Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613627
M. Williams, Yuping Yang, N. Taylor, S. McBurney, E. Papadopoulou, F. Mahon, M. Crotty
A wireless pervasive computing environment needs to dynamically adapt its functionality and behaviour to changes in the resources and services available to a user at any point in time. For a mobile user this means that as the user changes location, the pervasive environment should take account of any changes to the services that are available. Thus initially when the user requests a service the most appropriate service must be provided, but as the user moves around, the service provided could change. To handle this, a wireless pervasive system needs to provide dynamic service composition (and re-composition) based on the user's personal preferences and current context. The Daidalos project is developing a platform to support pervasive services, which provides dynamic personalized service composition. This paper describes the problems and the role of personalization in the approaches adopted in Daidalos to deal with dynamic service composition and re-composition. The basic ideas have been prototyped and demonstrated, and are currently being integrated and extended.
无线普适计算环境需要动态地调整其功能和行为,以适应用户在任何时间点可用的资源和服务的变化。对于移动用户,这意味着当用户更改位置时,普及环境应该考虑到可用服务的任何更改。因此,最初当用户请求服务时,必须提供最合适的服务,但随着用户的移动,所提供的服务可能会发生变化。为了处理这个问题,无线普及系统需要根据用户的个人偏好和当前上下文提供动态的服务组合(和重新组合)。Daidalos项目正在开发一个支持普适服务的平台,该平台提供动态的个性化服务组合。本文描述了在Daidalos中用于处理动态服务组合和重新组合的方法中存在的问题和个性化的作用。基本思想已经原型化和演示,目前正在整合和扩展。
{"title":"Personalized Dynamic Composition of Services and Resources in a Wireless Pervasive Computing Environment","authors":"M. Williams, Yuping Yang, N. Taylor, S. McBurney, E. Papadopoulou, F. Mahon, M. Crotty","doi":"10.1109/ISWPC.2006.1613627","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613627","url":null,"abstract":"A wireless pervasive computing environment needs to dynamically adapt its functionality and behaviour to changes in the resources and services available to a user at any point in time. For a mobile user this means that as the user changes location, the pervasive environment should take account of any changes to the services that are available. Thus initially when the user requests a service the most appropriate service must be provided, but as the user moves around, the service provided could change. To handle this, a wireless pervasive system needs to provide dynamic service composition (and re-composition) based on the user's personal preferences and current context. The Daidalos project is developing a platform to support pervasive services, which provides dynamic personalized service composition. This paper describes the problems and the role of personalization in the approaches adopted in Daidalos to deal with dynamic service composition and re-composition. The basic ideas have been prototyped and demonstrated, and are currently being integrated and extended.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115560930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Active Node supporting Context-aware Vertical Handover in Pervasive Computing Environment with Redundant Positioning 基于冗余定位的普适计算环境下支持上下文感知垂直切换的主动节点
Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613612
S. Balasubramaniam, T. Pfeifer, J. Indulska
A major requirement for pervasive systems is to integrate context-awareness to support heterogeneous networks and device technologies and at the same time support application adaptations to suit user activities. However, current infrastructures for pervasive systems are based on centralized architectures which are focused on context support for service adaptations in response to changes in the computing environment or user mobility. In this paper, we propose a hierarchical architecture based on active nodes, which maximizes the computational capabilities of various nodes within the pervasive computing environment, while efficiently gathering and evaluating context information from the user's working environment. The migratable active node architecture employs various decision making processes for evaluating a rich set of context information in order to dynamically allocate active nodes in the working environment, perform application adaptations and predict user mobility. The active node also utilizes the Redundant Positioning System to accurately manage user's mobility. This paper demonstrates the active node capabilities through context-aware vertical handover applications.
普及系统的一个主要需求是集成上下文感知,以支持异构网络和设备技术,同时支持应用程序适应用户活动。然而,普适系统的当前基础设施是基于集中式体系结构的,其重点是上下文支持,以适应计算环境或用户移动性的变化。在本文中,我们提出了一种基于活动节点的分层架构,在普适计算环境中最大化各节点的计算能力,同时有效地收集和评估来自用户工作环境的上下文信息。可迁移活动节点体系结构采用各种决策制定流程来评估丰富的上下文信息集,以便在工作环境中动态分配活动节点、执行应用程序调整和预测用户移动性。主节点还利用冗余定位系统来精确管理用户的移动。本文通过上下文感知的垂直切换应用程序演示了活动节点的功能。
{"title":"Active Node supporting Context-aware Vertical Handover in Pervasive Computing Environment with Redundant Positioning","authors":"S. Balasubramaniam, T. Pfeifer, J. Indulska","doi":"10.1109/ISWPC.2006.1613612","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613612","url":null,"abstract":"A major requirement for pervasive systems is to integrate context-awareness to support heterogeneous networks and device technologies and at the same time support application adaptations to suit user activities. However, current infrastructures for pervasive systems are based on centralized architectures which are focused on context support for service adaptations in response to changes in the computing environment or user mobility. In this paper, we propose a hierarchical architecture based on active nodes, which maximizes the computational capabilities of various nodes within the pervasive computing environment, while efficiently gathering and evaluating context information from the user's working environment. The migratable active node architecture employs various decision making processes for evaluating a rich set of context information in order to dynamically allocate active nodes in the working environment, perform application adaptations and predict user mobility. The active node also utilizes the Redundant Positioning System to accurately manage user's mobility. This paper demonstrates the active node capabilities through context-aware vertical handover applications.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124471709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A distributed context aware model for pervasive service environment 面向普适服务环境的分布式上下文感知模型
Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613629
Tang Xiaosheng, Shen Qinghua, Zhang Ping
Context-based service is the trend of next generation service especially under the wireless pervasive computing environment. In order to provide the always best experience (ABE) under heterogeneous communication system, it's very important for applications to get support from distributed context information. So, the context aware system should have the ability of collecting, processing and providing inferred result to applications in distributed environment. In this paper, we introduce a distributed context aware model to accomplish this goal and give some explanations for every module. We have also carried out a prototype testbed to give a demonstration of this model.
基于上下文的服务是下一代服务的发展趋势,特别是在无线普适计算环境下。为了在异构通信系统中提供始终最佳的体验(ABE),应用程序从分布式上下文信息中获得支持是非常重要的。因此,在分布式环境下,上下文感知系统应该具有收集、处理并向应用程序提供推断结果的能力。在本文中,我们引入了一个分布式上下文感知模型来实现这一目标,并对每个模块进行了说明。我们还建立了一个原型试验台,对该模型进行了验证。
{"title":"A distributed context aware model for pervasive service environment","authors":"Tang Xiaosheng, Shen Qinghua, Zhang Ping","doi":"10.1109/ISWPC.2006.1613629","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613629","url":null,"abstract":"Context-based service is the trend of next generation service especially under the wireless pervasive computing environment. In order to provide the always best experience (ABE) under heterogeneous communication system, it's very important for applications to get support from distributed context information. So, the context aware system should have the ability of collecting, processing and providing inferred result to applications in distributed environment. In this paper, we introduce a distributed context aware model to accomplish this goal and give some explanations for every module. We have also carried out a prototype testbed to give a demonstration of this model.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124901488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Balancing image quality and energy consumption in visual sensor networks 在视觉传感器网络中平衡图像质量和能量消耗
Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613565
K. Chow, K. Lui, E. Lam
Applications of wireless sensor networks have attracted a lot of attention recently. Cameras are installed in various locations of a wide area to capture images of targeted objects. Because of constraints in computational capability in these distributed cameras, it may not be feasible to analyze these images in the sensors but they have to be transmitted to a centralized server hop by hop through the sensor network. To reduce the energy used in transmission, the size of the images should be kept small by applying a large compression ratio, which may degrade image quality. This paper studies the tradeoff between image quality and energy consumption. We study the scenario that a number of camera-equipped sensors are taking pictures of the same object, and the pictures of adjacent cameras may overlap. We demonstrate that by allowing intermediate sensors to process the images and combine the overlapping portions, the total energy spent on transmission is reduced subject to a certain degradation in image quality. The tradeoff between image quality and energy consumption of different routing presents an important study on the practicability of visual sensor networks.
近年来,无线传感器网络的应用受到了广泛的关注。摄像机安装在广阔区域的不同位置,以捕捉目标物体的图像。由于这些分布式摄像机的计算能力的限制,在传感器中分析这些图像可能是不可行的,但它们必须通过传感器网络一跳一跳地传输到中央服务器。为了减少传输过程中所消耗的能量,应该采用较大的压缩比来保持图像的小尺寸,这可能会降低图像质量。本文研究了图像质量和能耗之间的权衡。我们研究了多个配备摄像头的传感器对同一物体进行拍照的场景,相邻摄像头的照片可能会重叠。我们证明,通过允许中间传感器处理图像并组合重叠部分,在一定程度上降低图像质量的前提下,减少了传输上花费的总能量。不同路由的图像质量和能量消耗之间的权衡是视觉传感器网络实用性研究的重要内容。
{"title":"Balancing image quality and energy consumption in visual sensor networks","authors":"K. Chow, K. Lui, E. Lam","doi":"10.1109/ISWPC.2006.1613565","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613565","url":null,"abstract":"Applications of wireless sensor networks have attracted a lot of attention recently. Cameras are installed in various locations of a wide area to capture images of targeted objects. Because of constraints in computational capability in these distributed cameras, it may not be feasible to analyze these images in the sensors but they have to be transmitted to a centralized server hop by hop through the sensor network. To reduce the energy used in transmission, the size of the images should be kept small by applying a large compression ratio, which may degrade image quality. This paper studies the tradeoff between image quality and energy consumption. We study the scenario that a number of camera-equipped sensors are taking pictures of the same object, and the pictures of adjacent cameras may overlap. We demonstrate that by allowing intermediate sensors to process the images and combine the overlapping portions, the total energy spent on transmission is reduced subject to a certain degradation in image quality. The tradeoff between image quality and energy consumption of different routing presents an important study on the practicability of visual sensor networks.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116009073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2006 1st International Symposium on Wireless Pervasive Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1