首页 > 最新文献

Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)最新文献

英文 中文
A collusion attack on pairwise key predistribution schemes for distributed sensor networks 分布式传感器网络密钥预分配方案的合谋攻击
T. Moore
Key predistribution schemes are a favoured solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback is seen to be the large storage overhead imposed on resource-constrained devices. In this paper, we argue that predistribution schemes can actually be quite insecure: pre-loading global secrets onto exposed devices strengthens the incentive for attackers to compromise nodes. Furthermore, lack of coordination between nodes arising from localised communication helps attackers hide misbehaviour. We consider one scheme in particular - Chan et al.'s random pairwise key predistribution (2003) - and demonstrate an attack where colluding nodes reuse selected pairwise keys to create many false identities. We find that a small, colluding minority can hijack a majority of node communication channels. Finally, we consider countermeasures, from improved detection to scrapping predistribution altogether
密钥预分配方案是在传感器网络中建立安全通信的首选解决方案。通常被视为引导信任的最安全的方法,其主要缺点是在资源受限的设备上施加了大量的存储开销。在本文中,我们认为预分发方案实际上是非常不安全的:将全局秘密预加载到暴露的设备上增强了攻击者破坏节点的动机。此外,由于局部通信导致节点之间缺乏协调,这有助于攻击者隐藏不当行为。我们特别考虑了一种方案- Chan等人的随机配对密钥预分发(2003)-并演示了一种攻击,其中串通节点重用选定的成对密钥来创建许多虚假身份。我们发现,一个小的,勾结的少数人可以劫持大多数节点通信通道。最后,我们考虑了对策,从改进检测到报废预分配
{"title":"A collusion attack on pairwise key predistribution schemes for distributed sensor networks","authors":"T. Moore","doi":"10.1109/PERCOMW.2006.3","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.3","url":null,"abstract":"Key predistribution schemes are a favoured solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback is seen to be the large storage overhead imposed on resource-constrained devices. In this paper, we argue that predistribution schemes can actually be quite insecure: pre-loading global secrets onto exposed devices strengthens the incentive for attackers to compromise nodes. Furthermore, lack of coordination between nodes arising from localised communication helps attackers hide misbehaviour. We consider one scheme in particular - Chan et al.'s random pairwise key predistribution (2003) - and demonstrate an attack where colluding nodes reuse selected pairwise keys to create many false identities. We find that a small, colluding minority can hijack a majority of node communication channels. Finally, we consider countermeasures, from improved detection to scrapping predistribution altogether","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123127496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Sentient processes - process-based applications in pervasive computing 感知过程。普适计算中基于过程的应用
Stephan Urbanski, C. Becker, K. Rothermel
Users' tasks are typically a sequence of steps. Today, the goal of pervasive computing applications - to support users in their tasks by using context information - is only partially met as applications supported by current infrastructures focus on individual steps instead of supporting the coordination of the whole sequence. In this paper, we present an approach for supporting multi-step user tasks by using a process-based application model, called sentient processes. Along with the model, the paper introduces the design of an execution engine for such processes
用户的任务通常是一系列步骤。今天,普适计算应用程序的目标——通过使用上下文信息来支持用户的任务——只是部分实现了,因为当前基础设施支持的应用程序关注于单个步骤,而不是支持整个序列的协调。在本文中,我们提出了一种支持多步骤用户任务的方法,该方法使用基于过程的应用程序模型,称为感知过程。在建立该模型的同时,本文还介绍了该过程的执行引擎的设计
{"title":"Sentient processes - process-based applications in pervasive computing","authors":"Stephan Urbanski, C. Becker, K. Rothermel","doi":"10.1109/PERCOMW.2006.124","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.124","url":null,"abstract":"Users' tasks are typically a sequence of steps. Today, the goal of pervasive computing applications - to support users in their tasks by using context information - is only partially met as applications supported by current infrastructures focus on individual steps instead of supporting the coordination of the whole sequence. In this paper, we present an approach for supporting multi-step user tasks by using a process-based application model, called sentient processes. Along with the model, the paper introduces the design of an execution engine for such processes","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116683040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Law enforcement, forensics and mobile communications 执法,取证和移动通信
Vanessa Gratzer, D. Naccache, D. Znaty
By the end of 2004, the GSM Association reported that over 600 networks in more than 200 countries were serving more than 1.2 billion users (2004). This extraordinary development of inexpensive and flexible mobile communications is also a source of new security challenges. This paper briefly lists the forensic challenges raised by handsets and overviews the handset analysis techniques used (or usable) by law enforcement officers in the course of criminal investigations
到2004年底,GSM协会报告说,200多个国家的600多个网络服务超过12亿用户(2004年)。廉价和灵活的移动通信的这种非凡发展也是新的安全挑战的来源。本文简要列出了手机提出的法医挑战,并概述了执法人员在刑事调查过程中使用(或可用)的手机分析技术
{"title":"Law enforcement, forensics and mobile communications","authors":"Vanessa Gratzer, D. Naccache, D. Znaty","doi":"10.1109/PERCOMW.2006.73","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.73","url":null,"abstract":"By the end of 2004, the GSM Association reported that over 600 networks in more than 200 countries were serving more than 1.2 billion users (2004). This extraordinary development of inexpensive and flexible mobile communications is also a source of new security challenges. This paper briefly lists the forensic challenges raised by handsets and overviews the handset analysis techniques used (or usable) by law enforcement officers in the course of criminal investigations","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121480904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Pushing doors for modeling contexts with OWL DL - a case study 用OWL DL为上下文建模打开了大门——一个案例研究
Anni-Yasmin Turhan, T. Springer, M. Berger
In this paper we present an integrated view for modeling and reasoning for context applications using OWL DL. In our case study, we describe a task driven approach to model typical situations as context concepts in an OWL DL ontology. At run-time OWL individuals form situation descriptions and by use of realization we recognise a certain context. We demonstrate the feasibility of our approach by performance measurements of available highly optimised description logics (DL) reasoners for OWL DL
在本文中,我们提出了一个使用OWL DL对上下文应用程序进行建模和推理的集成视图。在我们的案例研究中,我们描述了一种任务驱动的方法,将典型情况建模为OWL DL本体中的上下文概念。在运行时OWL个体形成情景描述,并通过使用实现来识别特定的上下文。我们通过对OWL DL可用的高度优化描述逻辑(DL)推理器的性能测量来证明我们方法的可行性
{"title":"Pushing doors for modeling contexts with OWL DL - a case study","authors":"Anni-Yasmin Turhan, T. Springer, M. Berger","doi":"10.1109/PERCOMW.2006.114","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.114","url":null,"abstract":"In this paper we present an integrated view for modeling and reasoning for context applications using OWL DL. In our case study, we describe a task driven approach to model typical situations as context concepts in an OWL DL ontology. At run-time OWL individuals form situation descriptions and by use of realization we recognise a certain context. We demonstrate the feasibility of our approach by performance measurements of available highly optimised description logics (DL) reasoners for OWL DL","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121496132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A hop-by-hop reliability support scheme for wireless sensor networks 一种无线传感器网络逐跳可靠性支持方案
Haejun Lee, Y. Ko, Dongman Lee
The most significant obstacle to multi-hop communications in wireless sensor networks is high link error rate. Thus, an efficient hop-by-hop reliability support scheme is highly required. In this paper, we identify the characteristics of two typical communication patterns in wireless sensor networks and address the problems of previous end-to-end sequence based hop-by-hop error recovery protocols, which cannot work properly with route change events and have a scalability problem with multiple senders. We propose a new hop-by-hop reliability support scheme named HRS. It uses hop-by-hop sequence numbers for hop-by-hop error recovery and operates in two separate modes depending on communication patterns. Through ns-2 based simulations, we show that both modes of HRS outperform the existing protocols in most metrics
无线传感器网络中多跳通信的最大障碍是高链路误差率。因此,需要一种高效的逐跳可靠性支持方案。在本文中,我们识别了无线传感器网络中两种典型通信模式的特征,并解决了以前基于端到端序列的逐跳错误恢复协议不能正常处理路由变化事件和具有多发送方可扩展性问题的问题。提出了一种新的逐跳可靠性支持方案HRS。它使用逐跳序列号进行逐跳错误恢复,并根据通信模式以两种不同的模式运行。通过基于ns-2的仿真,我们表明两种模式的HRS在大多数指标上都优于现有协议
{"title":"A hop-by-hop reliability support scheme for wireless sensor networks","authors":"Haejun Lee, Y. Ko, Dongman Lee","doi":"10.1109/PERCOMW.2006.9","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.9","url":null,"abstract":"The most significant obstacle to multi-hop communications in wireless sensor networks is high link error rate. Thus, an efficient hop-by-hop reliability support scheme is highly required. In this paper, we identify the characteristics of two typical communication patterns in wireless sensor networks and address the problems of previous end-to-end sequence based hop-by-hop error recovery protocols, which cannot work properly with route change events and have a scalability problem with multiple senders. We propose a new hop-by-hop reliability support scheme named HRS. It uses hop-by-hop sequence numbers for hop-by-hop error recovery and operates in two separate modes depending on communication patterns. Through ns-2 based simulations, we show that both modes of HRS outperform the existing protocols in most metrics","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122785820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A reusable, extensible infrastructure for augmented field trips 用于增强实地考察的可重用、可扩展的基础设施
M. Weal, Don Cruickshank, D. Michaelides, D. Millard, D. D. Roure, E. Hornecker, J. Halloran, G. Fitzpatrick
This paper describes a reusable pervasive information infrastructure developed as part of the Equator IRC, designed to allow the construction of literacy based eLearning activities on top of material created as part of a more traditional visitors system. The architecture of the system is described along with details of the creation of the curated material and the subsequent adaption of the system by local primary school teachers to create a literacy experiences. Results of the first trials of the system are presented with conclusions drawn and discussion of future directions
本文描述了作为赤道IRC的一部分开发的可重用的普及信息基础设施,旨在允许在作为更传统的访问者系统的一部分创建的材料之上构建基于识字的电子学习活动。该系统的架构描述了精心制作的材料的细节,以及当地小学教师随后对该系统的改编,以创造一种识字体验。介绍了该系统的初步试验结果,得出了结论,并对未来的发展方向进行了讨论
{"title":"A reusable, extensible infrastructure for augmented field trips","authors":"M. Weal, Don Cruickshank, D. Michaelides, D. Millard, D. D. Roure, E. Hornecker, J. Halloran, G. Fitzpatrick","doi":"10.1109/PERCOMW.2006.12","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.12","url":null,"abstract":"This paper describes a reusable pervasive information infrastructure developed as part of the Equator IRC, designed to allow the construction of literacy based eLearning activities on top of material created as part of a more traditional visitors system. The architecture of the system is described along with details of the creation of the curated material and the subsequent adaption of the system by local primary school teachers to create a literacy experiences. Results of the first trials of the system are presented with conclusions drawn and discussion of future directions","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131207953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Using Kademlia for the configuration of B3G radio access nodes 使用Kademlia进行B3G无线接入节点配置
Simon Oechsner, T. Hossfeld, K. Tutschku, Frank-Uwe Andersen, L. Caviglione
Configuration and management of radio access nodes in beyond 3G (B3G) networks such as nodeBs, wireless LAN or WIMAX access points is a complex task that consumes a high amount of resources. Most configuration changes have to be done by an operator, especially when it comes to the adaption of a node to its environment, i.e., the cells surrounding its own. This is an expensive and inflexible method. Moreover, the required manual interference hampers the adaptivity of B3G networks towards topology changes. In this work, we present an architecture that allows for the detection of neighboring cells, thereby enabling an easy or even autonomic configuration of the access nodes. In addition to this, the presented Kademlia-based overlay network enables the storage of information needed for network management, such as configuration data or performance measures
配置和管理超3G (B3G)网络(如节点b、无线局域网或WIMAX接入点)中的无线接入节点是一项复杂的任务,需要消耗大量资源。大多数配置更改必须由操作人员完成,特别是当涉及到使节点适应其环境(即围绕其自身的单元)时。这是一种昂贵且不灵活的方法。此外,所需的人工干扰阻碍了B3G网络对拓扑变化的自适应。在这项工作中,我们提出了一种允许检测相邻单元的架构,从而实现了访问节点的简单甚至自主配置。除此之外,所提出的基于kademlia的覆盖网络能够存储网络管理所需的信息,例如配置数据或性能度量
{"title":"Using Kademlia for the configuration of B3G radio access nodes","authors":"Simon Oechsner, T. Hossfeld, K. Tutschku, Frank-Uwe Andersen, L. Caviglione","doi":"10.1109/PERCOMW.2006.140","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.140","url":null,"abstract":"Configuration and management of radio access nodes in beyond 3G (B3G) networks such as nodeBs, wireless LAN or WIMAX access points is a complex task that consumes a high amount of resources. Most configuration changes have to be done by an operator, especially when it comes to the adaption of a node to its environment, i.e., the cells surrounding its own. This is an expensive and inflexible method. Moreover, the required manual interference hampers the adaptivity of B3G networks towards topology changes. In this work, we present an architecture that allows for the detection of neighboring cells, thereby enabling an easy or even autonomic configuration of the access nodes. In addition to this, the presented Kademlia-based overlay network enables the storage of information needed for network management, such as configuration data or performance measures","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116527540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Experience report: ontological reasoning for context-aware Internet services 经验报告:面向上下文感知的互联网服务的本体推理
A. Agostini, C. Bettini, Daniele Riboni
This paper reports our experience with representing and reasoning with context information within the CARE middleware. CARE was developed to support context-aware service adaptation for mobile users. Expressiveness and computational issues are discussed and the specific solution adopted in CARE is presented
本文报告了我们在CARE中间件中对上下文信息进行表示和推理的经验。开发CARE是为了支持针对移动用户的上下文感知服务适配。讨论了可表达性和计算性问题,并给出了具体的解决方案
{"title":"Experience report: ontological reasoning for context-aware Internet services","authors":"A. Agostini, C. Bettini, Daniele Riboni","doi":"10.1109/PERCOMW.2006.52","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.52","url":null,"abstract":"This paper reports our experience with representing and reasoning with context information within the CARE middleware. CARE was developed to support context-aware service adaptation for mobile users. Expressiveness and computational issues are discussed and the specific solution adopted in CARE is presented","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132610586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Healthcare aide: towards a virtual assistant for doctors using pervasive middleware 医疗保健助手:面向使用普及中间件的医生的虚拟助手
Moushumi Sharmin, Shameem Ahmed, Ahmed J. Khan
The advancement of available, portable, low cost handheld devices (PDAs, cell phones, etc.), bluetooth, and WiFi has resulted in the users' mobility at unprecedented levels. As these devices can communicate with one another, the combined capabilities can be leveraged to form a useful new set of tools. Presently, pervasive computing is being extended into the sophisticated healthcare sector with the promise of providing an easier and more efficient mode of communication among healthcare professionals. In this paper, we present the details of our application `Healthcare Aide', which has been designed to provide not only more convenience for doctor-doctor, resident doctor-doctor, patient-doctor and nurse-doctor interaction but also a smooth pathway for real-time decision making along with survey results from users' point view and performance analysis. Our pervasive middleware MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) provides the underlying support for `Healthcare Aide' in a completely transparent manner
可用的、便携的、低成本的手持设备(pda、手机等)、蓝牙和WiFi的进步使用户的移动性达到了前所未有的水平。由于这些设备可以相互通信,因此可以利用组合的功能来形成一组有用的新工具。目前,普适计算正在扩展到复杂的医疗保健领域,有望在医疗保健专业人员之间提供更简单、更有效的通信模式。在本文中,我们介绍了我们的应用程序“Healthcare Aide”的细节,该应用程序的设计不仅为医生与医生、住院医生与医生、病人与医生以及护士与医生的互动提供了更多的便利,而且还为实时决策提供了一条畅通的途径,同时还提供了来自用户观点和性能分析的调查结果。我们的普及中间件MARKS(用于资源发现、知识可用性和自我修复的中间件适应性)以完全透明的方式为“Healthcare Aide”提供底层支持
{"title":"Healthcare aide: towards a virtual assistant for doctors using pervasive middleware","authors":"Moushumi Sharmin, Shameem Ahmed, Ahmed J. Khan","doi":"10.1109/PERCOMW.2006.63","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.63","url":null,"abstract":"The advancement of available, portable, low cost handheld devices (PDAs, cell phones, etc.), bluetooth, and WiFi has resulted in the users' mobility at unprecedented levels. As these devices can communicate with one another, the combined capabilities can be leveraged to form a useful new set of tools. Presently, pervasive computing is being extended into the sophisticated healthcare sector with the promise of providing an easier and more efficient mode of communication among healthcare professionals. In this paper, we present the details of our application `Healthcare Aide', which has been designed to provide not only more convenience for doctor-doctor, resident doctor-doctor, patient-doctor and nurse-doctor interaction but also a smooth pathway for real-time decision making along with survey results from users' point view and performance analysis. Our pervasive middleware MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) provides the underlying support for `Healthcare Aide' in a completely transparent manner","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114613943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Dead reckoning supports stereo vision in pedestrians tracking 航位推算支持立体视觉行人跟踪
T. S. Cinotti, L. D. Stefano, G. Raffa, L. Roffia, M. Pettinari, M. Mola
This "work in progress" paper reports on a novel approach to pedestrian tracking in confined areas which is based on a combined use of a stereo vision tracking system and a set of sensors available on a mobile platform. This platform is a hands-free, sensory augmented, wearable computer, designed to support visits to museums and archaeological sites. The system is going to be demonstrated within the framework of a cultural heritage application at the "Musei Universitari di Palazzo Poggi" in Bologna
这篇“正在进行的工作”论文报告了一种在受限区域内跟踪行人的新方法,该方法基于立体视觉跟踪系统和移动平台上可用的一组传感器的组合使用。这个平台是一个免提,感官增强,可穿戴的电脑,旨在支持参观博物馆和考古遗址。该系统将在博洛尼亚的“波吉宫大学博物馆”的文化遗产申请框架内进行演示
{"title":"Dead reckoning supports stereo vision in pedestrians tracking","authors":"T. S. Cinotti, L. D. Stefano, G. Raffa, L. Roffia, M. Pettinari, M. Mola","doi":"10.1109/PERCOMW.2006.35","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.35","url":null,"abstract":"This \"work in progress\" paper reports on a novel approach to pedestrian tracking in confined areas which is based on a combined use of a stereo vision tracking system and a set of sensors available on a mobile platform. This platform is a hands-free, sensory augmented, wearable computer, designed to support visits to museums and archaeological sites. The system is going to be demonstrated within the framework of a cultural heritage application at the \"Musei Universitari di Palazzo Poggi\" in Bologna","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123467174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1