The paper introduces two tools, MoBiS process modeling and MoBiS cost measurements, to initiate the discussions of mobile data costs, their effect on experienced usefulness of a service, and more sustainable, economic growth. Based on the small scale study described on this paper, more innovative pricing models would be needed to support the mobile service innovations and adoption. Development of pricing models will need to be supported by more exact measurements and statistical reliability.
{"title":"Measuring Mobile Service Innovation","authors":"Mari Tiainen, Heli Wigelius, Antti Lönnqvist","doi":"10.1109/UBICOMM.2009.46","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.46","url":null,"abstract":"The paper introduces two tools, MoBiS process modeling and MoBiS cost measurements, to initiate the discussions of mobile data costs, their effect on experienced usefulness of a service, and more sustainable, economic growth. Based on the small scale study described on this paper, more innovative pricing models would be needed to support the mobile service innovations and adoption. Development of pricing models will need to be supported by more exact measurements and statistical reliability.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121266318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The accelerometers integrated in today’s phones can be used to estimate the distance travelled from the accelerations made while walking. The placement of the sensor on the body is important to take into consideration. In this paper, the accelerations recorded with a daily-used phone in the trouser pocket were processed on a mobile device to detect steps and estimate the distance travelled. The outcome of the distance estimates shows an error of 0.05 metres per one metre and can be improved through calibration. This distance was applied in the motion model of a particle filter, and fused with a map of the building. The results establish that the estimates of the algorithm are valuable when fusing with other technologies or environment information, to aid the estimation of the location.
{"title":"Mobile Phone-Based Displacement Estimation for Opportunistic Localisation Systems","authors":"Inge Bylemans, M. Weyn, M. Klepal","doi":"10.1109/UBICOMM.2009.23","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.23","url":null,"abstract":"The accelerometers integrated in today’s phones can be used to estimate the distance travelled from the accelerations made while walking. The placement of the sensor on the body is important to take into consideration. In this paper, the accelerations recorded with a daily-used phone in the trouser pocket were processed on a mobile device to detect steps and estimate the distance travelled. The outcome of the distance estimates shows an error of 0.05 metres per one metre and can be improved through calibration. This distance was applied in the motion model of a particle filter, and fused with a map of the building. The results establish that the estimates of the algorithm are valuable when fusing with other technologies or environment information, to aid the estimation of the location.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115485299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matthias Wieland, Carsten Längerer, F. Leymann, O. Siemoneit, C. Hubig
In the last years context-aware workflow systems have gained more and more importance. However, in research little emphasis has been put on workplace privacy and humane system design. It is the aim of this paper to give an overview on the effects of combining workflow systems and context-aware systems and to discuss its implications for workplace privacy and human-oriented design. Different methods are to be depicted that help to overcome certain ethical problems thus allowing for the development of acceptable, justified and justifiable technical solutions which are likely to be also adopted by its latter users. Finally a “best practice” prototype is to be presented which implements the introduced methods.
{"title":"Methods for Conserving Privacy in Workflow Controlled Smart Environments","authors":"Matthias Wieland, Carsten Längerer, F. Leymann, O. Siemoneit, C. Hubig","doi":"10.1109/UBICOMM.2009.44","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.44","url":null,"abstract":"In the last years context-aware workflow systems have gained more and more importance. However, in research little emphasis has been put on workplace privacy and humane system design. It is the aim of this paper to give an overview on the effects of combining workflow systems and context-aware systems and to discuss its implications for workplace privacy and human-oriented design. Different methods are to be depicted that help to overcome certain ethical problems thus allowing for the development of acceptable, justified and justifiable technical solutions which are likely to be also adopted by its latter users. Finally a “best practice” prototype is to be presented which implements the introduced methods.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114939708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Separately, context-aware sensing and networked sensing systems have been fast progressing research domains. The emergence of wireless sensor networks (WSN) has introduced a way of implementing a distributed self-organized intelligence in myriads of sensing applications. In this work, WSN and sensing technologies are combined to monitor behavior of a target object. The paper presents design and implementation of a distributed adaptive networked system for strain mapping in a wooden table. The system is intended to provide real-time data on strain development in the target object. The strain gauge deployment layout is designed based on comparison between simulated strain results and strain interpolation on various numbers of sensors. Clustering of densely deployed strain sensors, data collection and processing is organized using tiered wireless network. Experiments on capturing the evolution of strain distribution in an object subject to various loading conditions were carried out and results are reported.
{"title":"Distributed Adaptive Networked System for Strain Mapping","authors":"Jian Liang, Maryna Lishchynska, K. Delaney","doi":"10.1109/UBICOMM.2009.28","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.28","url":null,"abstract":"Separately, context-aware sensing and networked sensing systems have been fast progressing research domains. The emergence of wireless sensor networks (WSN) has introduced a way of implementing a distributed self-organized intelligence in myriads of sensing applications. In this work, WSN and sensing technologies are combined to monitor behavior of a target object. The paper presents design and implementation of a distributed adaptive networked system for strain mapping in a wooden table. The system is intended to provide real-time data on strain development in the target object. The strain gauge deployment layout is designed based on comparison between simulated strain results and strain interpolation on various numbers of sensors. Clustering of densely deployed strain sensors, data collection and processing is organized using tiered wireless network. Experiments on capturing the evolution of strain distribution in an object subject to various loading conditions were carried out and results are reported.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115138098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper an extension to activity diagrams from the Unified Modeling Language (UML) is proposed that supports the definition of several kinds of location constraints. A location constraint is a statement that says whether it is allowed to perform an activity within a mobile workflow at a particular location or not. They therefore constitute a special case of access control that is location-aware. We cover location constraints that are assigned at the design time of the workflow schema as well as constraints that a derived during the runtime of a workflow instance. Location constraints can help to tackle mobile-specific challenges that come along with the employment of mobile workflow systems, namely security issues and usability problems.
{"title":"Modelling Location-Aware Access Control Constraints for Mobile Workflows with UML Activity Diagrams","authors":"M. Decker","doi":"10.1109/UBICOMM.2009.30","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.30","url":null,"abstract":"In this paper an extension to activity diagrams from the Unified Modeling Language (UML) is proposed that supports the definition of several kinds of location constraints. A location constraint is a statement that says whether it is allowed to perform an activity within a mobile workflow at a particular location or not. They therefore constitute a special case of access control that is location-aware. We cover location constraints that are assigned at the design time of the workflow schema as well as constraints that a derived during the runtime of a workflow instance. Location constraints can help to tackle mobile-specific challenges that come along with the employment of mobile workflow systems, namely security issues and usability problems.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129622114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of the log of personal life experiences recorded on cameras, microphones, GPS devices, etc., is studied. A record of a person’s personal life is called as a life-log. Since the amount of data stored in a life-log system is vast and since the data may also include redundant data, methods for the retrieval and summarization of the data are required for the effective use of the life-log data. In this paper, audio life-log recorded by wearable microphones is described. The purpose of this study is classifying audio life-log according to places, speakers, and time. However, the places stored in an audio life-log are obtained by GPS devices; information about rooms in buildings cannot be obtained. In this study, experiments were carried out on audio life-log. The audio life-log was divided into segments and clustered by spectrum envelopes according to rooms. The experiments show two situations in which the location information are captured and not captured. The results of the experiments showed that the location information helped in room clustering. Audio life-log browsing on a map using GPS is also suggested.
{"title":"Browsing Audio Life-log Data Using Acoustic and Location Information","authors":"Kiichiro Yamano, K. Itou","doi":"10.1109/UBICOMM.2009.57","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.57","url":null,"abstract":"The use of the log of personal life experiences recorded on cameras, microphones, GPS devices, etc., is studied. A record of a person’s personal life is called as a life-log. Since the amount of data stored in a life-log system is vast and since the data may also include redundant data, methods for the retrieval and summarization of the data are required for the effective use of the life-log data. In this paper, audio life-log recorded by wearable microphones is described. The purpose of this study is classifying audio life-log according to places, speakers, and time. However, the places stored in an audio life-log are obtained by GPS devices; information about rooms in buildings cannot be obtained. In this study, experiments were carried out on audio life-log. The audio life-log was divided into segments and clustered by spectrum envelopes according to rooms. The experiments show two situations in which the location information are captured and not captured. The results of the experiments showed that the location information helped in room clustering. Audio life-log browsing on a map using GPS is also suggested.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121505286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose two RAKE receiving methods of the chirp spread spectrum (CSS) system to suppress the influence of the multipath-fading channel. The first one has low complexity by using the simple accumulator to collect the energies of the multi-paths. The second one can enhance the PER performance of the differential detection by adopting the concept of the multiple-symbol differential detection (MS-DD). We verified the proposed architectures through Monte-carlo simulations in diffuse channels. The simulation results show that the RAKE receiving methods can efficiently reduce performance degradation in multipath channel.
{"title":"RAKE Receiving Methods for IEEE 802.15.4a CSS System","authors":"Jindoo Jeong, Seong-Hyun Jang, J. Chong","doi":"10.1109/UBICOMM.2009.37","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.37","url":null,"abstract":"In this paper, we propose two RAKE receiving methods of the chirp spread spectrum (CSS) system to suppress the influence of the multipath-fading channel. The first one has low complexity by using the simple accumulator to collect the energies of the multi-paths. The second one can enhance the PER performance of the differential detection by adopting the concept of the multiple-symbol differential detection (MS-DD). We verified the proposed architectures through Monte-carlo simulations in diffuse channels. The simulation results show that the RAKE receiving methods can efficiently reduce performance degradation in multipath channel.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123435633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, many fields of industry, which include the ECHONET, UPnP, DLNA and OSGi, evolved to create an interworking solution for ubiquitous home networking. Accordingly, a service provider, which is providing an integrated service in an infrastructure from outdoor, starts needing to composite devices on these solutions including legacy appliances since these devices have been formed a network as more complicated home environment by various industries. In this paper, we propose a composition algorithm of appliances using representation of home devices that could be applied to systems for integrated service on networked home environments. The proposed algorithm give results which is possible composition lists among devices. we believe that our system architecture will provide a methodology of compositing appliances for integrate service flexibly even if each of homes have different environment.
{"title":"A Composition Algorithm of Appliances for Flexible Integrated Service on Home Network Systems","authors":"Junsoo Kim, J. Nakata, T. Okada, Yasuo Tan","doi":"10.1109/UBICOMM.2009.40","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.40","url":null,"abstract":"In recent years, many fields of industry, which include the ECHONET, UPnP, DLNA and OSGi, evolved to create an interworking solution for ubiquitous home networking. Accordingly, a service provider, which is providing an integrated service in an infrastructure from outdoor, starts needing to composite devices on these solutions including legacy appliances since these devices have been formed a network as more complicated home environment by various industries. In this paper, we propose a composition algorithm of appliances using representation of home devices that could be applied to systems for integrated service on networked home environments. The proposed algorithm give results which is possible composition lists among devices. we believe that our system architecture will provide a methodology of compositing appliances for integrate service flexibly even if each of homes have different environment.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132668204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents an infrastructure for building and operating context-aware services in ambient computing environments. The system is managed in a non-centralized manner and provides users with agents and detects the locations of users and deploys multiple location-aware service-provider agents at distributed computers by using active RFID-tags and mobile agent technology. For example, when a user moves from location to location, the system can dynamically deploy his/her service-provider agents at the computers close to the current location. We also evaluated the system in the real world to demonstrate its utility and effectiveness.
{"title":"Context-Aware Service Infrastructure","authors":"I. Satoh","doi":"10.1109/UBICOMM.2009.58","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.58","url":null,"abstract":"This paper presents an infrastructure for building and operating context-aware services in ambient computing environments. The system is managed in a non-centralized manner and provides users with agents and detects the locations of users and deploys multiple location-aware service-provider agents at distributed computers by using active RFID-tags and mobile agent technology. For example, when a user moves from location to location, the system can dynamically deploy his/her service-provider agents at the computers close to the current location. We also evaluated the system in the real world to demonstrate its utility and effectiveness.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Multimedia Sensor Networks (WMSNs) are used in many application domains, such as surveillance systems, telemedicine and so on. In order to ensure a broad deployment of such innovative services, strict requirements on security, privacy, and distributed processing of multimedia contents should be satisfied, taking also into account the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes. Thus, with respect to classic Wireless Sensor Networks, the achievement of these goals is more challenging due to the presence of multimedia data, which usually requires complex compression and aggregation algorithms. In order to provide a unifying synthesis on the last achievements, this survey summarizes the main findings on secure WMSNs proposed in the literature and forecasts future perspectives of such a technology.
{"title":"Secure Wireless Multimedia Sensor Networks: A Survey","authors":"L. Grieco, G. Boggia, S. Sicari, Pietro Colombo","doi":"10.1109/UBICOMM.2009.27","DOIUrl":"https://doi.org/10.1109/UBICOMM.2009.27","url":null,"abstract":"Wireless Multimedia Sensor Networks (WMSNs) are used in many application domains, such as surveillance systems, telemedicine and so on. In order to ensure a broad deployment of such innovative services, strict requirements on security, privacy, and distributed processing of multimedia contents should be satisfied, taking also into account the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes. Thus, with respect to classic Wireless Sensor Networks, the achievement of these goals is more challenging due to the presence of multimedia data, which usually requires complex compression and aggregation algorithms. In order to provide a unifying synthesis on the last achievements, this survey summarizes the main findings on secure WMSNs proposed in the literature and forecasts future perspectives of such a technology.","PeriodicalId":150024,"journal":{"name":"2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124968169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}