S. Potter, Ricardo A. Baratto, Oren Laadan, Jason Nieh
We present GamePod, a portable system that enables mobile users to use the same persistent, gaming environment on any available computer. No matter what computer is being used, GamePod provides a consistent gaming environment, maintaining all of a user's games, including active game state. This is achieved by leveraging rapid improvements in capacity, cost, and size of portable storage devices. GamePod provides a middleware layer that enables virtualization and checkpoint/restart functionality that decouples the gaming environment from a host machine. This enables gaming sessions to be suspended to portable storage, carried around, and resumed from the storage device on another computer. GamePod's middleware layer also isolates gaming sessions from the host, protecting the host by preventing malicious executable content from damaging the host. We have implemented a Linux GamePod prototype and demonstrate its ability to quickly suspend and resume gaming sessions, enabling a seamless gaming experience for mobile users as they move among computers.
我们推出的 GamePod 是一种便携式系统,可让移动用户在任何可用电脑上使用相同的持久游戏环境。无论使用哪台电脑,GamePod 都能提供一致的游戏环境,维护用户的所有游戏,包括活动游戏状态。这是通过利用便携式存储设备在容量、成本和大小方面的快速改进来实现的。GamePod 提供了一个中间件层,可实现虚拟化和检查点/重启功能,使游戏环境与主机分离。这样,游戏会话就可以暂停到便携式存储设备上,随身携带,并在另一台计算机上从存储设备恢复。GamePod 的中间件层还将游戏会话与主机隔离,通过防止恶意可执行文件破坏主机来保护主机。我们已经实现了一个 Linux GamePod 原型,并演示了它快速暂停和恢复游戏会话的能力,使移动用户在计算机之间移动时能够获得无缝的游戏体验。
{"title":"GamePod: Persistent Gaming Sessions on Pocketable Storage Devices","authors":"S. Potter, Ricardo A. Baratto, Oren Laadan, Jason Nieh","doi":"10.1109/UBICOMM.2009.61","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.61","url":null,"abstract":"We present GamePod, a portable system that enables mobile users to use the same persistent, gaming environment on any available computer. No matter what computer is being used, GamePod provides a consistent gaming environment, maintaining all of a user's games, including active game state. This is achieved by leveraging rapid improvements in capacity, cost, and size of portable storage devices. GamePod provides a middleware layer that enables virtualization and checkpoint/restart functionality that decouples the gaming environment from a host machine. This enables gaming sessions to be suspended to portable storage, carried around, and resumed from the storage device on another computer. GamePod's middleware layer also isolates gaming sessions from the host, protecting the host by preventing malicious executable content from damaging the host. We have implemented a Linux GamePod prototype and demonstrate its ability to quickly suspend and resume gaming sessions, enabling a seamless gaming experience for mobile users as they move among computers.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133462046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ubiquitous computing connects computers, places, people and everyday objects together by providing the support for social interactions in our everyday computing environment. Such interactions are usually impersonal, interpersonal
{"title":"Evaluating Trust-Based Access Control for Social Interaction","authors":"Lang Jia, M. Collins, P. Nixon","doi":"10.1109/UBICOMM.2009.43","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.43","url":null,"abstract":"Ubiquitous computing connects computers, places, people and everyday objects together by providing the support for social interactions in our everyday computing environment. Such interactions are usually impersonal, interpersonal","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130902786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The hard real time guarantee in the Ad hoc networks seems to be a difficult task due to the features of such networks. For that reason, it is not sufficient to propose a routing protocol which guarantees the hard real time transfer. We are also interested in the medium access method. In this paper, after describing our routing protocol RT-DSR (Real-Time DSR), we present the TDMA (Time Division Multiple Access) access methods for the Ad hoc networks and we propose a TDMA approach which can offers better delay guarantees. The simulation results performed with NS2 simulator show that our protocol RT-DSR offers better delay values than the DSR routing protocol and prove that the TDMA access method is more suitable than the 802.11 access method.
{"title":"End-to-End Delay Guarantee for TDMA-Based Ad Hoc Networks with RT-DSR Protocol","authors":"Jihen Bokri, Sofiane Ouni, F. Kamoun","doi":"10.1109/UBICOMM.2009.56","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.56","url":null,"abstract":"The hard real time guarantee in the Ad hoc networks seems to be a difficult task due to the features of such networks. For that reason, it is not sufficient to propose a routing protocol which guarantees the hard real time transfer. We are also interested in the medium access method. In this paper, after describing our routing protocol RT-DSR (Real-Time DSR), we present the TDMA (Time Division Multiple Access) access methods for the Ad hoc networks and we propose a TDMA approach which can offers better delay guarantees. The simulation results performed with NS2 simulator show that our protocol RT-DSR offers better delay values than the DSR routing protocol and prove that the TDMA access method is more suitable than the 802.11 access method.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, aspects affecting remote execution decision in PeerHood environment are studied. This work goes through the parameters that can affect the remote execution, such as the communication capabilities and the processing power and presents how to take them in to account while making a remote execution decision. The implementation part takes place in the previously implemented PeerHood environment and presents a simple heat transfer application and experiments with it. Heat transfer application is purely artificial application and was designed for flexible parameter experiments. The results show that remote execution can in fact be used for the benefit of a mobile device, but for a clear decision point more work needs to be done.
{"title":"Elements Affecting Remote Execution Decision on PeerHood Environment","authors":"Anaël Racine, J. Porras","doi":"10.1109/UBICOMM.2009.18","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.18","url":null,"abstract":"In this paper, aspects affecting remote execution decision in PeerHood environment are studied. This work goes through the parameters that can affect the remote execution, such as the communication capabilities and the processing power and presents how to take them in to account while making a remote execution decision. The implementation part takes place in the previously implemented PeerHood environment and presents a simple heat transfer application and experiments with it. Heat transfer application is purely artificial application and was designed for flexible parameter experiments. The results show that remote execution can in fact be used for the benefit of a mobile device, but for a clear decision point more work needs to be done.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126236875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pervasive computing requires that devices must be context-aware in order to provide proactively adapted services to both user and applications according to the current context. Most of the proposed approaches of service adaptation in a pervasive computing system are either not context-aware or based on an inappropriate definition of context. In this paper we propose a context-aware dynamic service adaptation approach for a device operating in a pervasive computing system. The approach is then modeled using colored Petri Nets and simulated using the CPN-Tools in order to validate it.
{"title":"Dynamic Context-Aware Service Adaptation in a Pervasive Computing System","authors":"Moeiz Miraoui, C. Tadj, C. Amar","doi":"10.1109/UBICOMM.2009.55","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.55","url":null,"abstract":"Pervasive computing requires that devices must be context-aware in order to provide proactively adapted services to both user and applications according to the current context. Most of the proposed approaches of service adaptation in a pervasive computing system are either not context-aware or based on an inappropriate definition of context. In this paper we propose a context-aware dynamic service adaptation approach for a device operating in a pervasive computing system. The approach is then modeled using colored Petri Nets and simulated using the CPN-Tools in order to validate it.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123426006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Remote desktop systems enable business users to access critical data located in the office from outside it with a mobile thin client or any other portable ubiquitous devices without having to worry about data leakage. However, high latency and low bandwidth in wireless-network environments may degrade the performance of remote desktop clients, such as causing slow responses to keyboard/mouse input and low speed in playing animated presentations. We therefore propose a method of transmitting data to improve the way business applications are perceived in wireless thin clients. It utilizes multiple wireless-network paths to achieve short latency in transmitting input signals and receiving responses as well as increases the throughput of large desktop images. We present the results of implementation in a laboratory network environment that validate the superiority of the proposed method.
{"title":"Multipath Data Transmission for Wireless Thin Clients","authors":"Cao LeThanhMan, Hiromi Isokawa, Takatoshi Kato","doi":"10.1109/UBICOMM.2009.8","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.8","url":null,"abstract":"Remote desktop systems enable business users to access critical data located in the office from outside it with a mobile thin client or any other portable ubiquitous devices without having to worry about data leakage. However, high latency and low bandwidth in wireless-network environments may degrade the performance of remote desktop clients, such as causing slow responses to keyboard/mouse input and low speed in playing animated presentations. We therefore propose a method of transmitting data to improve the way business applications are perceived in wireless thin clients. It utilizes multiple wireless-network paths to achieve short latency in transmitting input signals and receiving responses as well as increases the throughput of large desktop images. We present the results of implementation in a laboratory network environment that validate the superiority of the proposed method.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121390439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tremendous efforts have been conferred towards the congestion control concern in mobile wireless networks while dealing with maximizing both throughput and fair bandwidth allocation. Unfortunately, this is made limited by the variable and unpredictable behaviour of such networks. In this paper we propose a new congestion control mechanism for Multimedia traffic in mobile wireless networks. Our proposed scheme, called PRDR, uses an explicit rate feedback control drawn by the intermediate routers along a connection path and based on a proportional and derivative controller to compute the supported rate at every router. We explicitly present the router model and propose some improvement to overcome the problem of the unknown capacities of contending multihop links. Moreover, we show through extensive simulations that our proposed scheme insures both robustness and fairness. Moreover, it guarantees the convergence and the stability of the system.
{"title":"Congestion Control for Multimedia Flows in Multihop Wireless Networks: Case of Chain Topology","authors":"A. Ali, Ilhem Lengliz, F. Kamoun","doi":"10.1109/UBICOMM.2009.34","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.34","url":null,"abstract":"Tremendous efforts have been conferred towards the congestion control concern in mobile wireless networks while dealing with maximizing both throughput and fair bandwidth allocation. Unfortunately, this is made limited by the variable and unpredictable behaviour of such networks. In this paper we propose a new congestion control mechanism for Multimedia traffic in mobile wireless networks. Our proposed scheme, called PRDR, uses an explicit rate feedback control drawn by the intermediate routers along a connection path and based on a proportional and derivative controller to compute the supported rate at every router. We explicitly present the router model and propose some improvement to overcome the problem of the unknown capacities of contending multihop links. Moreover, we show through extensive simulations that our proposed scheme insures both robustness and fairness. Moreover, it guarantees the convergence and the stability of the system.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115983870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Local Area Networks are becoming necessary in university campuses and enterprise areas. Taking advantage of this technology, many benefits can be obtained. One of them is the use of the user’s mobility information when there is ubiquity in the wireless network. This information can tell us which places are most visited, if people have to go to places that are far from their office, detect the best situation for critic points, etc. The study presented in this paper show us the case study of a university campus of two square kilometers and how we have taken advantage of the information gathered from the wireless network. This approach can be used by the enterprises to optimize the sites to place their resources (network printers, servers, meeting rooms, etc.). Furthermore, a network administrator will be able to relocate bandwidth in order to increase the comfort of the end users.
{"title":"People Mobility Behaviour Study in a University Campus Using WLANs","authors":"S. Sendra, Miguel Garcia, C. Turró, Jaime Lloret","doi":"10.1109/UBICOMM.2009.32","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.32","url":null,"abstract":"Wireless Local Area Networks are becoming necessary in university campuses and enterprise areas. Taking advantage of this technology, many benefits can be obtained. One of them is the use of the user’s mobility information when there is ubiquity in the wireless network. This information can tell us which places are most visited, if people have to go to places that are far from their office, detect the best situation for critic points, etc. The study presented in this paper show us the case study of a university campus of two square kilometers and how we have taken advantage of the information gathered from the wireless network. This approach can be used by the enterprises to optimize the sites to place their resources (network printers, servers, meeting rooms, etc.). Furthermore, a network administrator will be able to relocate bandwidth in order to increase the comfort of the end users.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126780190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Radiation hazard problem, which creates multiple adverse effects on human body, is mainly because of antenna technology; this paper explains these different effects by calculating specific absorption rate (SAR) of these radiations in different people exposed to radio frequency (RF), electromagnetic (EM) and microwave radiations from handheld and antennas devices. The effects of antennas were investigated by varying the distances between the antennas and the human head. Discussions with multiple groups of people were held and the data investigated. This paper suggests the ways to minimize the effects of SAR. It is recommended that these techniques will reduce the health risks from handheld devices.
{"title":"Investigating Radiation Hazard and Safety Aspects of Handheld Mobile","authors":"Muzaffar Ahmed","doi":"10.1109/UBICOMM.2009.33","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.33","url":null,"abstract":"Radiation hazard problem, which creates multiple adverse effects on human body, is mainly because of antenna technology; this paper explains these different effects by calculating specific absorption rate (SAR) of these radiations in different people exposed to radio frequency (RF), electromagnetic (EM) and microwave radiations from handheld and antennas devices. The effects of antennas were investigated by varying the distances between the antennas and the human head. Discussions with multiple groups of people were held and the data investigated. This paper suggests the ways to minimize the effects of SAR. It is recommended that these techniques will reduce the health risks from handheld devices.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126713619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper proposes a social network solution that has been designed to fit equally well for use at mobile devices, PCs and even other types of consumer electronics. This solution is targeted to become a core element of the personal knowledge space and the design has be been done on top of M3 smart space. The result solution will be able to pre- and post-process the collected information and perform efficient reasoning over and organization of the data. Another key advantage of the proposed social network is that it is primary targeted to support professional social communications within a geo-distributed teams working on the same project. For that the solution proposes a flexible and easily extendable set of additional services, such as a variety of conference call and virtual meeting services with logging service, sharable whiteboard, automatic maintenance of action point lists and calendars and so on. As a result the service provides users with completely new experience.
{"title":"Distributed Architecture of a Professional Social Network on Top of M3 Smart Space Solution Made in PCs and Mobile Devices Friendly Manner","authors":"S. Balandin, I. Oliver, S. Boldyrev","doi":"10.1109/UBICOMM.2009.21","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.21","url":null,"abstract":"The paper proposes a social network solution that has been designed to fit equally well for use at mobile devices, PCs and even other types of consumer electronics. This solution is targeted to become a core element of the personal knowledge space and the design has be been done on top of M3 smart space. The result solution will be able to pre- and post-process the collected information and perform efficient reasoning over and organization of the data. Another key advantage of the proposed social network is that it is primary targeted to support professional social communications within a geo-distributed teams working on the same project. For that the solution proposes a flexible and easily extendable set of additional services, such as a variety of conference call and virtual meeting services with logging service, sharable whiteboard, automatic maintenance of action point lists and calendars and so on. As a result the service provides users with completely new experience.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132604001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}