首页 > 最新文献

Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).最新文献

英文 中文
On security study of two distance vector routing protocols for mobile ad hoc networks 移动自组网中两种距离矢量路由协议的安全性研究
Weichao Wang, Yi Lu, B. Bhargava
This paper compares the security properties of ad hoc on-demand distance vector (AODV) and destination sequence distance vector (DSDV) protocols, especially the difference caused by on-demand and proactive route queries. The on-demand route query enables the malicious host to conduct real time attacks on AODV. The communication overhead of attacks on DSDV is independent of the attack methods and the width of attack targets. A single false route propagates slower in AODV than in DSDV. The detection of false destination sequence in AODV heavily depends on the mobility of hosts. False distance vector and false destination sequence attacks are studied by simulation. The delivery ratio, communication overhead, and the propagation of false routes are measured by varying the traffic load and the maximum speed of host movement. The anomalous patterns of sequence numbers detected by destination hosts can be applied to detect the false destination sequence attacks.
本文比较了自组织按需距离矢量(AODV)协议和目的序列距离矢量(DSDV)协议的安全特性,特别是按需路由查询和主动路由查询造成的差异。通过按需路由查询,恶意主机可以对AODV进行实时攻击。DSDV攻击的通信开销与攻击方式和攻击目标的宽度无关。单个假路由在AODV中的传播速度比在DSDV中慢。在AODV中,假目的地序列的检测很大程度上依赖于主机的移动性。通过仿真研究了假距离矢量攻击和假目的序列攻击。通过改变流量负载和主机移动的最大速度来测量发送率、通信开销和假路由的传播。目的主机检测到的序列号异常模式可以用于检测虚假目的序列攻击。
{"title":"On security study of two distance vector routing protocols for mobile ad hoc networks","authors":"Weichao Wang, Yi Lu, B. Bhargava","doi":"10.1109/PERCOM.2003.1192740","DOIUrl":"https://doi.org/10.1109/PERCOM.2003.1192740","url":null,"abstract":"This paper compares the security properties of ad hoc on-demand distance vector (AODV) and destination sequence distance vector (DSDV) protocols, especially the difference caused by on-demand and proactive route queries. The on-demand route query enables the malicious host to conduct real time attacks on AODV. The communication overhead of attacks on DSDV is independent of the attack methods and the width of attack targets. A single false route propagates slower in AODV than in DSDV. The detection of false destination sequence in AODV heavily depends on the mobility of hosts. False distance vector and false destination sequence attacks are studied by simulation. The delivery ratio, communication overhead, and the propagation of false routes are measured by varying the traffic load and the maximum speed of host movement. The anomalous patterns of sequence numbers detected by destination hosts can be applied to detect the false destination sequence attacks.","PeriodicalId":230787,"journal":{"name":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114563517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Recognition of human activity through hierarchical stochastic learning 通过分层随机学习识别人类活动
Sebastian Lühr, H. Bui, S. Venkatesh, G. West
Seeking to extend the functional capability of the elderly, we explore the use of probabilistic methods to learn and recognise human activity in order to provide monitoring support. We propose a novel approach to learning the hierarchical structure of sequences of human actions through the application of the hierarchical hidden Markov model (HHMM). Experimental results are presented for learning and recognising sequences of typical activities in a home.
为了扩展老年人的功能能力,我们探索使用概率方法来学习和识别人类活动,以提供监测支持。我们提出了一种新的方法,通过应用层次隐马尔可夫模型(HHMM)来学习人类行为序列的层次结构。实验结果提出了学习和识别序列的典型活动在一个家庭。
{"title":"Recognition of human activity through hierarchical stochastic learning","authors":"Sebastian Lühr, H. Bui, S. Venkatesh, G. West","doi":"10.1109/PERCOM.2003.1192766","DOIUrl":"https://doi.org/10.1109/PERCOM.2003.1192766","url":null,"abstract":"Seeking to extend the functional capability of the elderly, we explore the use of probabilistic methods to learn and recognise human activity in order to provide monitoring support. We propose a novel approach to learning the hierarchical structure of sequences of human actions through the application of the hierarchical hidden Markov model (HHMM). Experimental results are presented for learning and recognising sequences of typical activities in a home.","PeriodicalId":230787,"journal":{"name":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123987126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Collaborative context recognition for handheld devices 手持设备的协作上下文识别
Jani Mäntyjärvi, J. Himberg, P. Huuskonen
Handheld communication devices equipped with sensing capabilities can recognize some aspects of their context to enable novel applications. We seek to improve the reliability of context recognition through an analogy to human behavior. Where multiple devices are around, they can jointly negotiate on a suitable context and behave accordingly. We have developed a method for this collaborative context recognition for handheld devices. The method determines the need to request and collaboratively recognize the current context of a group of handheld devices. It uses both local context time history information and spatial context information of handheld devices within a certain area. The method exploits dynamic weight parameters that describe content and reliability of context information. The performance of the method is analyzed using artificial and real context data. The results suggest that the method is capable of improving the reliability.
配备传感功能的手持通信设备可以识别其环境的某些方面,从而实现新的应用。我们试图通过类比人类行为来提高上下文识别的可靠性。当周围有多个设备时,它们可以共同协商合适的上下文并相应地表现。我们已经开发了一种用于手持设备的协作上下文识别方法。该方法确定请求和协作识别一组手持设备的当前上下文的需要。它利用了一定区域内手持设备的本地上下文时间历史信息和空间上下文信息。该方法利用描述上下文信息内容和可靠性的动态权重参数。利用人工和真实的上下文数据分析了该方法的性能。结果表明,该方法能够提高可靠性。
{"title":"Collaborative context recognition for handheld devices","authors":"Jani Mäntyjärvi, J. Himberg, P. Huuskonen","doi":"10.1109/PERCOM.2003.1192738","DOIUrl":"https://doi.org/10.1109/PERCOM.2003.1192738","url":null,"abstract":"Handheld communication devices equipped with sensing capabilities can recognize some aspects of their context to enable novel applications. We seek to improve the reliability of context recognition through an analogy to human behavior. Where multiple devices are around, they can jointly negotiate on a suitable context and behave accordingly. We have developed a method for this collaborative context recognition for handheld devices. The method determines the need to request and collaboratively recognize the current context of a group of handheld devices. It uses both local context time history information and spatial context information of handheld devices within a certain area. The method exploits dynamic weight parameters that describe content and reliability of context information. The performance of the method is analyzed using artificial and real context data. The results suggest that the method is capable of improving the reliability.","PeriodicalId":230787,"journal":{"name":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Using peer-to-peer data routing for infrastructure-based wireless networks 为基于基础设施的无线网络使用点对点数据路由
S. B. Kodeswaran, Olga Ratsimor, A. Joshi, Timothy W. Finin, Y. Yesha
A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. Wireless infrastructure in terms of base stations is often available in many popular areas offering highspeed data connectivity to a wired network. In this paper we describe an approach where infrastructure components utilize passing by mobile nodes to route data to other devices that are out of range. In our scheme, base stations track user mobility and determine data usage patterns of users as they pass by. Based on this, base stations predict the future data needs for a passing mobile device. These base stations then collaborate (over the wired network) to identify other mobile devices with spare capacity whose routes intersect that of a needy device and use these carriers to transport the needed data. When such a carrier meets a needy device, they form ad hoc peer-to-peer communities to transfer this data. In this paper, we describe the motivation behind our approach and the different component interactions. We present the results of simulation work that we have done to validate the viability of our approach. We also describe, Numi, our framework for supporting collaborative infrastructure and ad hoc computing along with a sample application built on top of this highlighting the benefits of our proposed approach.
移动ad-hoc网络是一个由移动路由器组成的自治系统,它是自组织的,完全分散的,不需要专门的基础设施支持。基站方面的无线基础设施通常在许多流行的地区可用,提供到有线网络的高速数据连接。在本文中,我们描述了一种方法,其中基础设施组件利用移动节点的传递将数据路由到超出范围的其他设备。在我们的方案中,基站跟踪用户的移动性并确定用户经过时的数据使用模式。在此基础上,基站预测经过的移动设备未来的数据需求。然后,这些基站(在有线网络上)协作,识别其他有空闲容量的移动设备,这些设备的路由与需要的设备的路由相交,并使用这些运营商来传输所需的数据。当这样的运营商遇到需要的设备时,它们会形成特定的点对点社区来传输这些数据。在本文中,我们描述了我们的方法背后的动机和不同的组件交互。我们提出了我们所做的模拟工作的结果,以验证我们的方法的可行性。我们还描述了支持协作基础设施和临时计算的框架Numi,以及在此基础上构建的示例应用程序,突出了我们建议的方法的优点。
{"title":"Using peer-to-peer data routing for infrastructure-based wireless networks","authors":"S. B. Kodeswaran, Olga Ratsimor, A. Joshi, Timothy W. Finin, Y. Yesha","doi":"10.1109/PERCOM.2003.1192754","DOIUrl":"https://doi.org/10.1109/PERCOM.2003.1192754","url":null,"abstract":"A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. Wireless infrastructure in terms of base stations is often available in many popular areas offering highspeed data connectivity to a wired network. In this paper we describe an approach where infrastructure components utilize passing by mobile nodes to route data to other devices that are out of range. In our scheme, base stations track user mobility and determine data usage patterns of users as they pass by. Based on this, base stations predict the future data needs for a passing mobile device. These base stations then collaborate (over the wired network) to identify other mobile devices with spare capacity whose routes intersect that of a needy device and use these carriers to transport the needed data. When such a carrier meets a needy device, they form ad hoc peer-to-peer communities to transfer this data. In this paper, we describe the motivation behind our approach and the different component interactions. We present the results of simulation work that we have done to validate the viability of our approach. We also describe, Numi, our framework for supporting collaborative infrastructure and ad hoc computing along with a sample application built on top of this highlighting the benefits of our proposed approach.","PeriodicalId":230787,"journal":{"name":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125819144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Synthesizing distributed controllers for the safe operation of ConnectedSpaces 为ConnectedSpaces的安全运行综合分布式控制器
B. Sridharan, A. Mathur, K. Cai
A collection of one or more devices, each described by its digital device manual and reachable over a network, is a ConnectedSpace. A set of safety policies may be enforced on a ConnectedSpace to ensure the safety of the environment in which the ConnectedSpace is deployed. The enforcement of these safety policies by one or more safely controllers governs the behavior of the devices within the ConnectedSpace. We propose a policy-based partitioning scheme for synthesizing k distributed safety controllers such that: (a) each device is guaranteed to be controlled by no more than two controllers, and (b) each policy is guaranteed to be enforced by exactly one controller. We present an experimental evaluation of our scheme. The experimental results show that the scheme is scalable with respect to the number of devices and the number of policies. We also show how safety controllers that are correct with respect to the policies, are synthesized using the theory of supervisory control.
ConnectedSpace是一个或多个设备的集合,每个设备由其数字设备手册描述,并可通过网络访问。可以在ConnectedSpace上实施一组安全策略,以确保部署ConnectedSpace的环境的安全性。由一个或多个安全控制器执行这些安全策略,管理ConnectedSpace中设备的行为。我们提出了一种基于策略的分区方案,用于综合k个分布式安全控制器,这样:(a)保证每个设备由不超过两个控制器控制,(b)保证每个策略由恰好一个控制器执行。我们对我们的方案进行了实验评估。实验结果表明,该方案在设备数量和策略数量方面具有可扩展性。我们还展示了如何使用监督控制理论合成与策略相关的安全控制器。
{"title":"Synthesizing distributed controllers for the safe operation of ConnectedSpaces","authors":"B. Sridharan, A. Mathur, K. Cai","doi":"10.1109/percom.2003.1192770","DOIUrl":"https://doi.org/10.1109/percom.2003.1192770","url":null,"abstract":"A collection of one or more devices, each described by its digital device manual and reachable over a network, is a ConnectedSpace. A set of safety policies may be enforced on a ConnectedSpace to ensure the safety of the environment in which the ConnectedSpace is deployed. The enforcement of these safety policies by one or more safely controllers governs the behavior of the devices within the ConnectedSpace. We propose a policy-based partitioning scheme for synthesizing k distributed safety controllers such that: (a) each device is guaranteed to be controlled by no more than two controllers, and (b) each policy is guaranteed to be enforced by exactly one controller. We present an experimental evaluation of our scheme. The experimental results show that the scheme is scalable with respect to the number of devices and the number of policies. We also show how safety controllers that are correct with respect to the policies, are synthesized using the theory of supervisory control.","PeriodicalId":230787,"journal":{"name":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131292753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bio-inspired mobility in environment aware wireless sensor networks 环境感知无线传感器网络中的仿生移动性
S. Doumit, D. Agrawal
Today's wireless sensors act as information agents, our eyes and ears, for all types of applications, especially in inaccessible regions. But these sensors are resource-constrained devices; the key challenges remain in exploiting their limited time-life. A crucial factor to achieve this is to develop appropriate mobility models that would assure high information coverage of the desired deployed region within the area. We propose a biologically inspired mobility model to direct sensors' movement towards the target area. We show the benefits acquired in terms of data coverage and efficient resource-utilization.
今天的无线传感器作为信息代理,我们的眼睛和耳朵,适用于所有类型的应用,特别是在难以到达的地区。但这些传感器是资源有限的设备;关键的挑战仍然是如何利用他们有限的时间。实现这一目标的一个关键因素是制定适当的移动模式,以确保在区域内所需部署区域的高信息覆盖率。我们提出了一个受生物学启发的移动模型来指导传感器向目标区域的运动。我们展示了在数据覆盖和有效资源利用方面获得的好处。
{"title":"Bio-inspired mobility in environment aware wireless sensor networks","authors":"S. Doumit, D. Agrawal","doi":"10.1109/PERCOM.2003.1192782","DOIUrl":"https://doi.org/10.1109/PERCOM.2003.1192782","url":null,"abstract":"Today's wireless sensors act as information agents, our eyes and ears, for all types of applications, especially in inaccessible regions. But these sensors are resource-constrained devices; the key challenges remain in exploiting their limited time-life. A crucial factor to achieve this is to develop appropriate mobility models that would assure high information coverage of the desired deployed region within the area. We propose a biologically inspired mobility model to direct sensors' movement towards the target area. We show the benefits acquired in terms of data coverage and efficient resource-utilization.","PeriodicalId":230787,"journal":{"name":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127794144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy-optimal and energy-balanced sorting in a single-hop wireless sensor network 单跳无线传感器网络中的能量优化与能量平衡分拣
Mitali Singh, V. Prasanna
A large number of sensors networked together form selforganizing pervasive systems that provide the basis for implementation of several applications involving distributed, collaborative computations. Energy dissipation is a critical issue for these networks, as their life-time is limited by the battery power of the sensors. In this paper, we focus on design of an energy-balanced, energy-optimal algorithm for sorting in a single-hop sensor network. Energy optimality implies that the overall energy dissipation in the system is minimized. Energy-balancedness ensures that all the sensors spend asymptotically equivalent amount of energy in the system. Uniform energy dissipation is desirable as it enables the network to remain fully functional for the maximum time. We demonstrate that given a single-hop, singlechannel network of n randomly distributed sensors, sorting can be performed in O(n log n) time and energy, with no sensor being awake for more than O(log n) time steps. In a p-channel network, where p ∓ n1-ϵ for 0 < ϵ ∓ 1, sorting can be performed in O(n = p log n) time and O(n log n) energy with no node being awake for more than O(log n) time steps.
大量的传感器联网在一起形成了自组织的普适系统,为涉及分布式、协作计算的几个应用程序的实现提供了基础。能量耗散是这些网络的一个关键问题,因为它们的寿命受到传感器电池电量的限制。本文主要研究了单跳传感器网络中能量平衡、能量最优排序算法的设计。能量最优是指系统的总能量耗散最小。能量平衡确保所有传感器在系统中消耗的能量渐近相等。均匀的能量耗散是理想的,因为它可以使网络在最大时间内保持完整的功能。我们证明了给定一个由n个随机分布的传感器组成的单跳、单通道网络,排序可以在O(n log n)时间和能量内完成,并且没有传感器被唤醒超过O(log n)时间步长。在p通道网络中,当p- n1- λ≥0 < λ - 1时,排序可以在O(n = p log n)时间和O(n log n)能量内完成,且没有节点被唤醒超过O(log n)时间步。
{"title":"Energy-optimal and energy-balanced sorting in a single-hop wireless sensor network","authors":"Mitali Singh, V. Prasanna","doi":"10.1109/PERCOM.2003.1192726","DOIUrl":"https://doi.org/10.1109/PERCOM.2003.1192726","url":null,"abstract":"A large number of sensors networked together form selforganizing pervasive systems that provide the basis for implementation of several applications involving distributed, collaborative computations. Energy dissipation is a critical issue for these networks, as their life-time is limited by the battery power of the sensors. In this paper, we focus on design of an energy-balanced, energy-optimal algorithm for sorting in a single-hop sensor network. Energy optimality implies that the overall energy dissipation in the system is minimized. Energy-balancedness ensures that all the sensors spend asymptotically equivalent amount of energy in the system. Uniform energy dissipation is desirable as it enables the network to remain fully functional for the maximum time. We demonstrate that given a single-hop, singlechannel network of n randomly distributed sensors, sorting can be performed in O(n log n) time and energy, with no sensor being awake for more than O(log n) time steps. In a p-channel network, where p ∓ n1-ϵ for 0 < ϵ ∓ 1, sorting can be performed in O(n = p log n) time and O(n log n) energy with no node being awake for more than O(log n) time steps.","PeriodicalId":230787,"journal":{"name":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122406419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Dealing with continuous location-dependent queries: Just-in-time data refreshment 处理连续的位置相关查询:即时数据刷新
S. Ilarri, E. Mena, A. Illarramendi
Among mobile computing applications, location-based services are expected to be a big business for wireless operators. These services provide value added by considering the location of the user in order to give him/her more customized information. However, the processing of continuous location-dependent queries is still a subject of research. One of the key issues is how to update the answer presented to the user efficiently as it becomes obsolete very quickly. The goal of this paper is to analyze how to deal with situations where the answer cannot be updated with the desired frequency. We present several approaches to this problem and evaluate their performance.
在移动计算应用中,基于位置的服务有望成为无线运营商的一大业务。这些服务通过考虑用户的位置来提供附加价值,以便为他/她提供更多定制信息。然而,连续位置相关查询的处理仍然是一个研究课题。其中一个关键问题是如何有效地更新呈现给用户的答案,因为它很快就会过时。本文的目的是分析如何处理答案不能以期望的频率更新的情况。我们提出了解决这个问题的几种方法,并评估了它们的性能。
{"title":"Dealing with continuous location-dependent queries: Just-in-time data refreshment","authors":"S. Ilarri, E. Mena, A. Illarramendi","doi":"10.1109/PERCOM.2003.1192751","DOIUrl":"https://doi.org/10.1109/PERCOM.2003.1192751","url":null,"abstract":"Among mobile computing applications, location-based services are expected to be a big business for wireless operators. These services provide value added by considering the location of the user in order to give him/her more customized information. However, the processing of continuous location-dependent queries is still a subject of research. One of the key issues is how to update the answer presented to the user efficiently as it becomes obsolete very quickly. The goal of this paper is to analyze how to deal with situations where the answer cannot be updated with the desired frequency. We present several approaches to this problem and evaluate their performance.","PeriodicalId":230787,"journal":{"name":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129046064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Providing contextual information to pervasive computing applications 向普及计算应用程序提供上下文信息
Glenn Judd, P. Steenkiste
Pervasive computing applications are increasingly leveraging contextual information from several sources to provide users with behavior appropriate to the environment in which they reside. If these sources of contextual information are used and deployed in an ad hoc manner however they may provide overlapping functionality, fail to provide needed functionality, and require the use of inconsistent interfaces by applications. To overcome these problems, we introduce a contextual information service that provides applications with contextual information via a virtual database. Unlike previous efforts, our service provides applications a consistent, lightweight, and powerful mechanism for obtaining contextual information, and includes explicit support for the on demand computation of contextual information. We show, via example applications and a contextual information service prototype that we have implemented, how this approach can be used to allow proactive applications to adapt their behavior to match a user's current environment.
普适计算应用程序越来越多地利用来自多个来源的上下文信息,为用户提供适合其所处环境的行为。但是,如果这些上下文信息源以特别的方式使用和部署,它们可能会提供重叠的功能,无法提供所需的功能,并且需要应用程序使用不一致的接口。为了克服这些问题,我们引入了一个上下文信息服务,它通过虚拟数据库为应用程序提供上下文信息。与之前的努力不同,我们的服务为应用程序提供了一致的、轻量级的、强大的机制来获取上下文信息,并包括对上下文信息随需应变计算的显式支持。通过示例应用程序和我们已经实现的上下文信息服务原型,我们展示了如何使用这种方法来允许主动应用程序调整其行为以匹配用户当前的环境。
{"title":"Providing contextual information to pervasive computing applications","authors":"Glenn Judd, P. Steenkiste","doi":"10.1109/PERCOM.2003.1192735","DOIUrl":"https://doi.org/10.1109/PERCOM.2003.1192735","url":null,"abstract":"Pervasive computing applications are increasingly leveraging contextual information from several sources to provide users with behavior appropriate to the environment in which they reside. If these sources of contextual information are used and deployed in an ad hoc manner however they may provide overlapping functionality, fail to provide needed functionality, and require the use of inconsistent interfaces by applications. To overcome these problems, we introduce a contextual information service that provides applications with contextual information via a virtual database. Unlike previous efforts, our service provides applications a consistent, lightweight, and powerful mechanism for obtaining contextual information, and includes explicit support for the on demand computation of contextual information. We show, via example applications and a contextual information service prototype that we have implemented, how this approach can be used to allow proactive applications to adapt their behavior to match a user's current environment.","PeriodicalId":230787,"journal":{"name":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116352064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 202
Indirect routing using distributed location information 使用分布式位置信息的间接路由
A. C. Viana, M. Amorim, S. Fdida, J. Rezende
This paper proposes the Tribe protocol, an indirect routing strategy for wireless self-organizing networks. The protocol is intended to be applied in environments with large number of users, where mobility is taken into account, and the correct operation of the system does not require the support of a fixed (wired or wireless) infrastructure. In Tribe, nodes build a network infrastructure which describes the node's relative location according to the current node's neighborhood. Furthermore, routing is unique and completely independent of any global connectivity ensured by a network-level routing protocol. The architecture is generic, self-organizing, and independent of IP-like addressing limitations.
本文提出了一种用于无线自组织网络的间接路由策略Tribe协议。该协议旨在应用于具有大量用户的环境中,其中考虑了移动性,并且系统的正确操作不需要固定(有线或无线)基础设施的支持。在Tribe中,节点建立一个网络基础设施,该基础设施根据当前节点的邻域描述节点的相对位置。此外,路由是唯一的,完全独立于由网络级路由协议保证的任何全局连接。该体系结构是通用的、自组织的,并且独立于类似ip的寻址限制。
{"title":"Indirect routing using distributed location information","authors":"A. C. Viana, M. Amorim, S. Fdida, J. Rezende","doi":"10.1109/PERCOM.2003.1192745","DOIUrl":"https://doi.org/10.1109/PERCOM.2003.1192745","url":null,"abstract":"This paper proposes the Tribe protocol, an indirect routing strategy for wireless self-organizing networks. The protocol is intended to be applied in environments with large number of users, where mobility is taken into account, and the correct operation of the system does not require the support of a fixed (wired or wireless) infrastructure. In Tribe, nodes build a network infrastructure which describes the node's relative location according to the current node's neighborhood. Furthermore, routing is unique and completely independent of any global connectivity ensured by a network-level routing protocol. The architecture is generic, self-organizing, and independent of IP-like addressing limitations.","PeriodicalId":230787,"journal":{"name":"Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126730371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
期刊
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003).
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1