In ubiquitous home environment, it is essential that every personal devices at home and out-home can collaborate with others to provide users with the home services and personal contents anywhere and anytime. To achieve this, it is recommended the virtual overlay network where every device can collaborate with others in peer-to-peer manner to share contents, send messages, and control services remotely just like in a local network. In this paper we propose the collaboration platform based on virtual overlay network for ubiquitous home devices.
{"title":"Architecture of Collaboration Platform for Ubiquitous Home Devices","authors":"Hojin Park, E. Paik, Nam Kim","doi":"10.1109/UBICOMM.2009.38","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.38","url":null,"abstract":"In ubiquitous home environment, it is essential that every personal devices at home and out-home can collaborate with others to provide users with the home services and personal contents anywhere and anytime. To achieve this, it is recommended the virtual overlay network where every device can collaborate with others in peer-to-peer manner to share contents, send messages, and control services remotely just like in a local network. In this paper we propose the collaboration platform based on virtual overlay network for ubiquitous home devices.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128072566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Personal Network (PN) is a network of geographically distributed personal devices, which creates a distributed environment of a user and provides access to personal resources and services regardless the location of the user. A Federation of Personal Networks (Fednet) is a peer-to-peer cooperation of PNs of different users to share personal resources and services. Until now little research has been conducted on the service provisioning in Fednets. Based on the current status of the research on Fednets, the service provisioning can be done directly at the personal device (network overlay approach), or at a specific entry point of a PN, called a service proxy (service proxy approach). While the network overlay approach provides quick service access and provisioning, the service proxy approach provides a more elegant solution for service provisioning by preventing direct access of other PNs to the PN’s services and by enabling the control over the access to personal services at a single point of a PN. In this paper, to leverage the advantages of both approaches, we propose a hybrid approach to service provisioning in Fednets, which combines both approaches to provide an optimal and flexible solution for service provisioning in Fednets.
个人网络(Personal Network, PN)是一个由地理上分布的个人设备组成的网络,它为用户创造了一个分布式的环境,并提供了对个人资源和服务的访问,而不管用户在哪里。个人网络联盟(Federation of Personal Networks, federnet)是不同用户的pn之间的点对点合作,共享个人资源和服务。到目前为止,对联邦储备银行服务供给的研究还很少。根据目前Fednets的研究现状,可以直接在个人设备(网络覆盖方法)上提供服务,也可以在PN的特定入口点(称为服务代理方法)上提供服务。虽然网络覆盖方法提供了快速的业务访问和供应,但服务代理方法通过防止其他PN直接访问该PN的服务,并通过在PN的单个点上控制对个人服务的访问,为服务供应提供了更优雅的解决方案。在本文中,为了利用这两种方法的优点,我们提出了一种在Fednets中提供服务的混合方法,该方法结合了这两种方法,为Fednets中的服务提供了一个最优和灵活的解决方案。
{"title":"Policy-Based Hybrid Approach to Service Provisioning in Federations of Personal Networks","authors":"Malohat Ibrohimovna, S. Groot","doi":"10.1109/UBICOMM.2009.47","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.47","url":null,"abstract":"A Personal Network (PN) is a network of geographically distributed personal devices, which creates a distributed environment of a user and provides access to personal resources and services regardless the location of the user. A Federation of Personal Networks (Fednet) is a peer-to-peer cooperation of PNs of different users to share personal resources and services. Until now little research has been conducted on the service provisioning in Fednets. Based on the current status of the research on Fednets, the service provisioning can be done directly at the personal device (network overlay approach), or at a specific entry point of a PN, called a service proxy (service proxy approach). While the network overlay approach provides quick service access and provisioning, the service proxy approach provides a more elegant solution for service provisioning by preventing direct access of other PNs to the PN’s services and by enabling the control over the access to personal services at a single point of a PN. In this paper, to leverage the advantages of both approaches, we propose a hybrid approach to service provisioning in Fednets, which combines both approaches to provide an optimal and flexible solution for service provisioning in Fednets.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115180850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Within the home domain, an outcome of successfully implemented ubiquitous computing is expected to feature an ever-present and – most importantly, convenient to use – ubiquitous home environment. Home automation and wireless sensor networks, as ubiquitous integrations of technology and services at home, are enhancing the quality of life by improved security, information and comfort. We have defined a centric UbiHOMESERVER with three main roles: use of existing interfaces on proprietary systems for remote monitoring and control, serving the surrounding system as a data gateway and providing content-adaptive user interfaces optimised by properties of end-user client devices. Throughout the entire environment, the goal of user interface design is to keep the interaction experience of an end-user as simple and intuitive as possible. In this paper, we present the design of a medicine dose controller, which is our on-going research and development prototype aiming to accomplish this goal. As a ubiquitous device, UbiPILL is targeted to people having problems in remembering to take their medicine on time. Having elderly people in mind, a seamless interoperation between UbiPILL and UbiHOMESERVER has been designed to reliably monitor the medicine box activities by a web browser of any client device.
{"title":"UbiPILL A Medicine Dose Controller of Ubiquitous Home Environment","authors":"Leo Ilkko, Jori Karppinen","doi":"10.1109/UBICOMM.2009.41","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.41","url":null,"abstract":"Within the home domain, an outcome of successfully implemented ubiquitous computing is expected to feature an ever-present and – most importantly, convenient to use – ubiquitous home environment. Home automation and wireless sensor networks, as ubiquitous integrations of technology and services at home, are enhancing the quality of life by improved security, information and comfort. We have defined a centric UbiHOMESERVER with three main roles: use of existing interfaces on proprietary systems for remote monitoring and control, serving the surrounding system as a data gateway and providing content-adaptive user interfaces optimised by properties of end-user client devices. Throughout the entire environment, the goal of user interface design is to keep the interaction experience of an end-user as simple and intuitive as possible. In this paper, we present the design of a medicine dose controller, which is our on-going research and development prototype aiming to accomplish this goal. As a ubiquitous device, UbiPILL is targeted to people having problems in remembering to take their medicine on time. Having elderly people in mind, a seamless interoperation between UbiPILL and UbiHOMESERVER has been designed to reliably monitor the medicine box activities by a web browser of any client device.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124746384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhenchen Wang, S. Poslad, C. Patrikakis, A. Pearmain
A personalised mobile sports event viewing system that enables users to efficiently and naturally direct movies of their own live sports events on mobile devices is described. Personalisation here focuses on the selection of live events with respect to multiple sports disciplines. An implicit user model driven approach is used to enable the system to adaptively predict users’ preferred events during live sports shows. The design of this personalisation model, developed as part of the My-e-Director 2012 project, is described and an associated mobile prototype system is presented.
{"title":"Personalised Live Sports Event Viewing on Mobile Devices","authors":"Zhenchen Wang, S. Poslad, C. Patrikakis, A. Pearmain","doi":"10.1109/UBICOMM.2009.25","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.25","url":null,"abstract":"A personalised mobile sports event viewing system that enables users to efficiently and naturally direct movies of their own live sports events on mobile devices is described. Personalisation here focuses on the selection of live events with respect to multiple sports disciplines. An implicit user model driven approach is used to enable the system to adaptively predict users’ preferred events during live sports shows. The design of this personalisation model, developed as part of the My-e-Director 2012 project, is described and an associated mobile prototype system is presented.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129789555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prediction of wireless network conditions enables the reconfiguration of mobile applications in a varying network environment, which in turn might gain more energy savings and better quality of service. In this paper, we focus on the prediction of network signal strength and its potential of improving energy saving in network-based power adaptations. We evaluate the performance of three prediction algorithms, namely, ARIMA, Linear regression and NFI, based on the data sets collected from diverse real-life network environments. Later, we apply the network prediction algorithms to adaptive file download, and compare their effectiveness in terms of energy savings. The results show that the adaptations using prediction could save up to 14.7% more energy when compared to prediction-less adaptation.
{"title":"Network Prediction for Adaptive Mobile Applications","authors":"Ramya Sri Kalyanaraman, Yu Xiao, Antti Ylä-Jääski","doi":"10.1109/UBICOMM.2009.10","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.10","url":null,"abstract":"Prediction of wireless network conditions enables the reconfiguration of mobile applications in a varying network environment, which in turn might gain more energy savings and better quality of service. In this paper, we focus on the prediction of network signal strength and its potential of improving energy saving in network-based power adaptations. We evaluate the performance of three prediction algorithms, namely, ARIMA, Linear regression and NFI, based on the data sets collected from diverse real-life network environments. Later, we apply the network prediction algorithms to adaptive file download, and compare their effectiveness in terms of energy savings. The results show that the adaptations using prediction could save up to 14.7% more energy when compared to prediction-less adaptation.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"504 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113999505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahdi Sharifi, Sayed Gholam Hassan Tabatabaei, Homa Movahednejad, A. Manaf, S. Ibrahim
In today’s Web environments, digital world is witnessing the birth of a revolutionary computing paradigm called pervasive or ubiquitous computing that promises to have a profound effect on the way users interact with computers, devices, physical spaces, and other users. Pervasive computing is aimed to eliminate time and place barriers by making services available to users anytime and anywhere. Due to the numerous numbers of services which are available in pervasive environments, the presence of service discovery is a necessity to help users to discover and utilize their desired services. However, tackling security issues such as preserving transferred information reliable and private, in service discovery process in pervasive environments is a demanding task. In this paper, we propose a secure framework to support service discovery in pervasive computing environments. The proposed framework can support efficiently security issues considering pervasive environments features.
{"title":"A Security Conscious Service Discovery Framework in Pervasive Computing Environments","authors":"Mahdi Sharifi, Sayed Gholam Hassan Tabatabaei, Homa Movahednejad, A. Manaf, S. Ibrahim","doi":"10.1109/UBICOMM.2009.54","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.54","url":null,"abstract":"In today’s Web environments, digital world is witnessing the birth of a revolutionary computing paradigm called pervasive or ubiquitous computing that promises to have a profound effect on the way users interact with computers, devices, physical spaces, and other users. Pervasive computing is aimed to eliminate time and place barriers by making services available to users anytime and anywhere. Due to the numerous numbers of services which are available in pervasive environments, the presence of service discovery is a necessity to help users to discover and utilize their desired services. However, tackling security issues such as preserving transferred information reliable and private, in service discovery process in pervasive environments is a demanding task. In this paper, we propose a secure framework to support service discovery in pervasive computing environments. The proposed framework can support efficiently security issues considering pervasive environments features.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125364507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Context-aware applications use information from their surrounding environment to adapt their behavior. This paper proposes a reflexive, loose-coupled, event-based infrastructure named CxFramework to aid the development of such complex applications. CxFramework is composed of several kinds of services. Context information is modeled using ontologies from which higher-level context information can be inferred. The details of context acquisition and processing are transparent to the developer. Implementation aspects of the prototype are discussed and a performance analysis is presented to show its viability.
{"title":"A Reflexive Infrastructure for Context-Aware Applications","authors":"Carlos Eduardo Tosin, Luiz Lima Jr.","doi":"10.1109/UBICOMM.2009.14","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.14","url":null,"abstract":"Context-aware applications use information from their surrounding environment to adapt their behavior. This paper proposes a reflexive, loose-coupled, event-based infrastructure named CxFramework to aid the development of such complex applications. CxFramework is composed of several kinds of services. Context information is modeled using ontologies from which higher-level context information can be inferred. The details of context acquisition and processing are transparent to the developer. Implementation aspects of the prototype are discussed and a performance analysis is presented to show its viability.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In highly mobile Ad hoc networks, network topology changes frequently, and routes have a poor stability, which degrades communication performance. This paper proposes a multipath routing protocol LBR (Link lifetime based Backup Routing) to improve routing stability. LBR is based on link lifetime, while obtaining the shortest path between source and destination through flooding, and setting up a local backup path for each link in the primary path concerning link lifetime. This scheme effectively avoids backup paths being out-of-date and increases the availability of backup paths. Both theoretical analyses and simulation results show that LBR has an improvement in route lifetime, packet delivery ratio, end-to-end delay, and so on, compared with single-path routing protocols.
在高度移动的Ad hoc网络中,网络拓扑变化频繁,路由稳定性差,降低了通信性能。为了提高路由的稳定性,本文提出了一种多路径路由协议LBR (Link lifetime based Backup routing)。LBR基于链路生存期,通过泛洪获取源和目的之间的最短路径,并在主路径上为每一条链路建立一个本地备份路径。该方案有效地避免了备份路径的过期,提高了备份路径的可用性。理论分析和仿真结果表明,与单路径路由协议相比,LBR在路由生存时间、分组分发率、端到端时延等方面都有提高。
{"title":"A Stable Backup Routing Protocol Based on Link Lifetime in Mobile Ad Hoc Networks","authors":"Wenjing Yang, Xinyu Yang, Shu Yang","doi":"10.1109/UBICOMM.2009.12","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.12","url":null,"abstract":"In highly mobile Ad hoc networks, network topology changes frequently, and routes have a poor stability, which degrades communication performance. This paper proposes a multipath routing protocol LBR (Link lifetime based Backup Routing) to improve routing stability. LBR is based on link lifetime, while obtaining the shortest path between source and destination through flooding, and setting up a local backup path for each link in the primary path concerning link lifetime. This scheme effectively avoids backup paths being out-of-date and increases the availability of backup paths. Both theoretical analyses and simulation results show that LBR has an improvement in route lifetime, packet delivery ratio, end-to-end delay, and so on, compared with single-path routing protocols.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our paper presents a field study arranged at a Finnish primary school where two classes and a total of 23 pupils between the ages of 6 and 8 trialed an attendance supervision system supported by Near Field Communication technology in 2008. In the trial the pupils marked their arrival at and departure from the school by touching a reader device or NFC-enabled mobile phone with a smart contactless card. The system simplified attendance monitoring by replacing manual roll calls leaving thus more time for teaching. Parents were able to receive real-time information on children’s attendance, which reduced their concerns about whether their child had arrived at school safely. Information about user experience was obtained by using a variety of data collection methods. Children, as well as their teachers, became fast familiar with the touch-based interaction, and the attendance supervision was soon integrated into their everyday school routines. Our analysis shows that a technology-supported attendance supervision system can bring value for all end-user groups but it seems that the system will serve primarily the teachers and the parents.
{"title":"Experiences from NFC Supported School Attendance Supervision for Children","authors":"M. Ervasti, M. Isomursu, Marianne Kinnula","doi":"10.1109/UBICOMM.2009.9","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.9","url":null,"abstract":"Our paper presents a field study arranged at a Finnish primary school where two classes and a total of 23 pupils between the ages of 6 and 8 trialed an attendance supervision system supported by Near Field Communication technology in 2008. In the trial the pupils marked their arrival at and departure from the school by touching a reader device or NFC-enabled mobile phone with a smart contactless card. The system simplified attendance monitoring by replacing manual roll calls leaving thus more time for teaching. Parents were able to receive real-time information on children’s attendance, which reduced their concerns about whether their child had arrived at school safely. Information about user experience was obtained by using a variety of data collection methods. Children, as well as their teachers, became fast familiar with the touch-based interaction, and the attendance supervision was soon integrated into their everyday school routines. Our analysis shows that a technology-supported attendance supervision system can bring value for all end-user groups but it seems that the system will serve primarily the teachers and the parents.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sensor networks are deployed on various environments in order to collect sensing information in many cases. It is not easy to optimize program codes of all nodes due to the environmental variety of deployment of sensor networks. Therefore, commissioning procedure for each sensor node is required for optimized node programming. We suggest a new commissioning and deployment method for wireless sensor network. In this paper, we introduce our partial download procedure of node program for the efficient node commissioning. As a result, the update time of node program can be dramatically reduced by using a proposed method.
{"title":"A New Commissioning and Deployment Method for Wireless Sensor Networks","authors":"B. Kim, Seong-Soon Joo","doi":"10.1109/UBICOMM.2009.63","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.63","url":null,"abstract":"Sensor networks are deployed on various environments in order to collect sensing information in many cases. It is not easy to optimize program codes of all nodes due to the environmental variety of deployment of sensor networks. Therefore, commissioning procedure for each sensor node is required for optimized node programming. We suggest a new commissioning and deployment method for wireless sensor network. In this paper, we introduce our partial download procedure of node program for the efficient node commissioning. As a result, the update time of node program can be dramatically reduced by using a proposed method.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}