首页 > 最新文献

ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.最新文献

英文 中文
Online optimal data transmission strategy under Markov channel 马尔可夫信道下的在线最优数据传输策略
Pub Date : 2005-07-11 DOI: 10.1109/PERSER.2005.1506560
Zikuan Liu, J. Almhana, V. Choulakian, R. McGorman
The challenges of providing data services over wireless networks come from, their high reliability requirement under noisy wireless channels. In this paper, we model the noisy channel by a continuous-time Markov process and propose a dynamical packet transmission strategy for data service. The transmission strategy optimization is formulated as a Markov decision process. We establish that the optimal strategy has a threshold structure and develop a single sample path-based optimization algorithm to tune the thresholds. Since only a single sample path is involved, the proposed algorithm can be implemented online.
通过无线网络提供数据服务的挑战来自于无线信道噪声下的高可靠性要求。本文利用连续时间马尔可夫过程对噪声信道进行建模,提出了一种用于数据服务的动态分组传输策略。传输策略优化是一个马尔可夫决策过程。我们建立了具有阈值结构的最优策略,并开发了基于单样本路径的优化算法来调整阈值。由于只涉及单个采样路径,因此该算法可以在线实现。
{"title":"Online optimal data transmission strategy under Markov channel","authors":"Zikuan Liu, J. Almhana, V. Choulakian, R. McGorman","doi":"10.1109/PERSER.2005.1506560","DOIUrl":"https://doi.org/10.1109/PERSER.2005.1506560","url":null,"abstract":"The challenges of providing data services over wireless networks come from, their high reliability requirement under noisy wireless channels. In this paper, we model the noisy channel by a continuous-time Markov process and propose a dynamical packet transmission strategy for data service. The transmission strategy optimization is formulated as a Markov decision process. We establish that the optimal strategy has a threshold structure and develop a single sample path-based optimization algorithm to tune the thresholds. Since only a single sample path is involved, the proposed algorithm can be implemented online.","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An infrastructure for a traffic warning system 交通警告系统的基础设施
Pub Date : 2005-07-11 DOI: 10.1109/PERSER.2005.1506402
J. Broensted, K. M. Hansen, L. Kristensen
The LIWAS traffic warning system aims at providing early warning to vehicles about road conditions, such as whether the road is slippery. The LIWAS system is currently being developed and consists of two main parts: sensors for determining the state of the road and a communication infrastructure supporting inter-vehicle communication. This paper presents our results on requirements identification, design, and prototyping of the infrastructure. The infrastructure combines communication via mobile phones with communication based on the principles of ad-hoc networking, and it supports units in being updated during operation. The presented prototypes and associated experimental results demonstrate the main functionalities of the communication infrastructure, and have led to the initial deployment of LIWAS units.
LIWAS交通预警系统旨在向车辆提供道路状况的早期预警,例如道路是否湿滑。LIWAS系统目前正在开发中,由两个主要部分组成:用于确定道路状况的传感器和支持车辆间通信的通信基础设施。本文展示了我们在需求识别、设计和基础结构原型方面的结果。该基础设施将移动电话通信与基于自组织网络原理的通信相结合,并支持单位在运行期间进行更新。所提出的原型和相关的实验结果展示了通信基础设施的主要功能,并导致了LIWAS单元的初步部署。
{"title":"An infrastructure for a traffic warning system","authors":"J. Broensted, K. M. Hansen, L. Kristensen","doi":"10.1109/PERSER.2005.1506402","DOIUrl":"https://doi.org/10.1109/PERSER.2005.1506402","url":null,"abstract":"The LIWAS traffic warning system aims at providing early warning to vehicles about road conditions, such as whether the road is slippery. The LIWAS system is currently being developed and consists of two main parts: sensors for determining the state of the road and a communication infrastructure supporting inter-vehicle communication. This paper presents our results on requirements identification, design, and prototyping of the infrastructure. The infrastructure combines communication via mobile phones with communication based on the principles of ad-hoc networking, and it supports units in being updated during operation. The presented prototypes and associated experimental results demonstrate the main functionalities of the communication infrastructure, and have led to the initial deployment of LIWAS units.","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123565762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Group communication in ad-hoc networks: a few results and a case study 自组织网络中的组通信:一些结果和一个案例研究
Pub Date : 2005-07-11 DOI: 10.1109/PERSER.2005.1506569
R. Baldoni, J. Hélary, S. Piergiovanni
In the context of mobile ad-hoc networks, this paper studies the problem of reliable communication among a set of processes forming a group in a dynamic system with an unbounded number of processes. A communication is reliable if any message sent by a member of the group that never leaves or leaves the group in an intentional way is eventually delivered to every member that doesn't leave the group. The problem is studied in a setting where communication links model a temporary disconnection among group members. The paper shows that additional assumptions on the system model are necessary to assure reliable communication. Then it presents a protocol, based on these assumptions, solving the problem in a meeting/conference room application scenario.
在移动自组织网络环境下,研究了进程数量无限大的动态系统中进程群之间的可靠通信问题。如果组中从未离开或有意离开组的成员发送的任何消息最终传递给未离开组的每个成员,则通信是可靠的。研究了在通信链路模型中群体成员间存在暂时断开的情况。本文表明,为了保证通信的可靠性,需要对系统模型进行额外的假设。然后在此基础上提出了一个协议,解决了会议/会议室应用场景中的问题。
{"title":"Group communication in ad-hoc networks: a few results and a case study","authors":"R. Baldoni, J. Hélary, S. Piergiovanni","doi":"10.1109/PERSER.2005.1506569","DOIUrl":"https://doi.org/10.1109/PERSER.2005.1506569","url":null,"abstract":"In the context of mobile ad-hoc networks, this paper studies the problem of reliable communication among a set of processes forming a group in a dynamic system with an unbounded number of processes. A communication is reliable if any message sent by a member of the group that never leaves or leaves the group in an intentional way is eventually delivered to every member that doesn't leave the group. The problem is studied in a setting where communication links model a temporary disconnection among group members. The paper shows that additional assumptions on the system model are necessary to assure reliable communication. Then it presents a protocol, based on these assumptions, solving the problem in a meeting/conference room application scenario.","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129441264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Personal coordination server: a system infrastructure for designing pleasurable experience 个人协调服务器:设计愉悦体验的系统基础设施
Pub Date : 2005-07-11 DOI: 10.1109/PERSER.2005.1506404
T. Nakajima
In our daily lives, we have several personal devices carried with us everyday like a mobile phone. These devices contain more functionalities than now, and it is important to consider what these devices can do in the future. For example, these personal devices may be used to coordinate various appliances near a user. This paper proposes a personal coordination server that allows a user to control various information appliances near the user spontaneously. The personal coordination server personalizes the coordination of information appliances in several ways. The personalization can be used to design a user's experience. Our approach embeds preference rules that personalize the coordination among appliance into everyday artefacts such as seals, pens or keys. A user closes and departs the everyday artefacts to/from his/her personal devices to personalize the coordination explicitly. Also a designer embeds preference rules in cups and stuffed animals that a user uses in his/her daily activities or our surrounding environments to design the coordination for the user.
在我们的日常生活中,我们每天都随身携带一些个人设备,比如手机。这些设备包含比现在更多的功能,重要的是要考虑这些设备在未来可以做什么。例如,这些个人设备可用于协调用户附近的各种设备。本文提出了一种个人协调服务器,允许用户自发地控制用户附近的各种信息设备。个人协调服务器以多种方式个性化信息设备的协调。个性化可以用来设计用户体验。我们的方法将偏好规则嵌入到日常物品(如印章、笔或钥匙)中,使设备之间的协调个性化。用户将日常的人工制品关闭并从他/她的个人设备中分离出来,以明确地个性化协调。此外,设计师还会在杯子和毛绒玩具中嵌入偏好规则,让用户在日常活动或周围环境中使用这些规则,为用户设计协调性。
{"title":"Personal coordination server: a system infrastructure for designing pleasurable experience","authors":"T. Nakajima","doi":"10.1109/PERSER.2005.1506404","DOIUrl":"https://doi.org/10.1109/PERSER.2005.1506404","url":null,"abstract":"In our daily lives, we have several personal devices carried with us everyday like a mobile phone. These devices contain more functionalities than now, and it is important to consider what these devices can do in the future. For example, these personal devices may be used to coordinate various appliances near a user. This paper proposes a personal coordination server that allows a user to control various information appliances near the user spontaneously. The personal coordination server personalizes the coordination of information appliances in several ways. The personalization can be used to design a user's experience. Our approach embeds preference rules that personalize the coordination among appliance into everyday artefacts such as seals, pens or keys. A user closes and departs the everyday artefacts to/from his/her personal devices to personalize the coordination explicitly. Also a designer embeds preference rules in cups and stuffed animals that a user uses in his/her daily activities or our surrounding environments to design the coordination for the user.","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129207481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A fault localized scheme for false report filtering in sensor networks 传感器网络误报过滤的故障定位方案
Pub Date : 2005-07-11 DOI: 10.1109/PERSER.2005.1506391
Li Zhou, C. Ravishankar
Sensor networks frequently deploy many tiny and inexpensive devices over large regions to detect events of interest. It can be easy to compromise sensors, enabling attackers to use the keys and other information stored at the sensors to inject false reports, forging fake events. Existing approaches do not localize the impact of such node compromises, so that compromises in one sensing region may compromise other parts of the system. In this paper, we propose two fault localized schemes for false report filtering. In our basic scheme, sensors signal events using one-way hash chains, which allows en-route nodes to verify the authenticity of received reports based on commitments of detecting sensors, but prevents them from forging events. We extend this basic scheme to a collaborative filtering scheme using commitment predistribution, making it more adaptable for mobile sensor networks and high-density sensor networks. Our scheme can also provide localized protection for areas that require special protection. Our security analysis shows that our schemes can offer stronger security protection than existing schemes, and are efficient.
传感器网络经常在大范围内部署许多微小而廉价的设备来检测感兴趣的事件。传感器很容易被攻破,攻击者可以利用存储在传感器上的密钥和其他信息注入虚假报告,伪造虚假事件。现有的方法没有将这种节点妥协的影响局部化,因此一个感知区域的妥协可能会损害系统的其他部分。本文提出了两种误报过滤的故障定位方案。在我们的基本方案中,传感器使用单向散列链发送事件信号,这允许途中节点根据检测传感器的承诺来验证接收到的报告的真实性,但防止它们伪造事件。我们将此基本方案扩展为使用承诺预分配的协同过滤方案,使其更适合移动传感器网络和高密度传感器网络。我们的方案还可以为需要特殊保护的区域提供局部保护。我们的安全性分析表明,我们的方案可以提供比现有方案更强的安全保护,并且是有效的。
{"title":"A fault localized scheme for false report filtering in sensor networks","authors":"Li Zhou, C. Ravishankar","doi":"10.1109/PERSER.2005.1506391","DOIUrl":"https://doi.org/10.1109/PERSER.2005.1506391","url":null,"abstract":"Sensor networks frequently deploy many tiny and inexpensive devices over large regions to detect events of interest. It can be easy to compromise sensors, enabling attackers to use the keys and other information stored at the sensors to inject false reports, forging fake events. Existing approaches do not localize the impact of such node compromises, so that compromises in one sensing region may compromise other parts of the system. In this paper, we propose two fault localized schemes for false report filtering. In our basic scheme, sensors signal events using one-way hash chains, which allows en-route nodes to verify the authenticity of received reports based on commitments of detecting sensors, but prevents them from forging events. We extend this basic scheme to a collaborative filtering scheme using commitment predistribution, making it more adaptable for mobile sensor networks and high-density sensor networks. Our scheme can also provide localized protection for areas that require special protection. Our security analysis shows that our schemes can offer stronger security protection than existing schemes, and are efficient.","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127101351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
APC: access pass certificate distrust certification model for large access in pervasive environment APC:面向普适环境下大访问的访问通行证证书不信任认证模型
Pub Date : 2005-07-11 DOI: 10.1109/PERSER.2005.1506547
Rachid Saadi, J. Pierson, L. Brunie
The main future challenge of pervasive computing consists in offering access anywhere and anytime with any devices. However, before it becomes a reality, the problems of access control and authentication have to be solved, among others. Existing solutions are inadequate without adaptation to this specific environment. Among the promising approaches, the trust paradigm seems to be more flexible than others. We base this proposal on this paradigm to implement a distrust model, so-called APC (access pass certificate). The main objective of this model is to enable authorized user to roam and to access trusted hosts without being known locally. Each user can have an APC certificate from two kinds of hosts: the main host (where the user is member) and the trusted host (that trusts the user). Using these certificates, the user extends progressively his access scope. Moreover, this model implements a decentralized mapping policy, where correspondence between the user's home profile and its rights on the trusted hosts is determined as needed. This distrust model and its implementation are presented in this article where we exhibit its interests for large but controlled access in pervasive environments.
普适计算未来的主要挑战在于通过任何设备随时随地提供访问。然而,在它成为现实之前,必须解决访问控制和身份验证等问题。如果不适应这种具体环境,现有的解决办法是不够的。在有前途的方法中,信任范式似乎比其他方法更灵活。我们基于这个范例来实现不信任模型,即所谓的APC(访问通行证证书)。该模型的主要目标是使授权用户能够漫游并访问受信任的主机,而不需要知道本地的情况。每个用户都可以拥有来自两种主机的APC证书:主主机(用户是其中的成员)和受信任主机(信任用户)。使用这些证书,用户可以逐步扩展其访问范围。此外,该模型实现了分散的映射策略,根据需要确定用户的主配置文件与其在可信主机上的权限之间的对应关系。本文介绍了这种不信任模型及其实现,其中我们展示了它对普遍环境中大规模但受控制的访问的兴趣。
{"title":"APC: access pass certificate distrust certification model for large access in pervasive environment","authors":"Rachid Saadi, J. Pierson, L. Brunie","doi":"10.1109/PERSER.2005.1506547","DOIUrl":"https://doi.org/10.1109/PERSER.2005.1506547","url":null,"abstract":"The main future challenge of pervasive computing consists in offering access anywhere and anytime with any devices. However, before it becomes a reality, the problems of access control and authentication have to be solved, among others. Existing solutions are inadequate without adaptation to this specific environment. Among the promising approaches, the trust paradigm seems to be more flexible than others. We base this proposal on this paradigm to implement a distrust model, so-called APC (access pass certificate). The main objective of this model is to enable authorized user to roam and to access trusted hosts without being known locally. Each user can have an APC certificate from two kinds of hosts: the main host (where the user is member) and the trusted host (that trusts the user). Using these certificates, the user extends progressively his access scope. Moreover, this model implements a decentralized mapping policy, where correspondence between the user's home profile and its rights on the trusted hosts is determined as needed. This distrust model and its implementation are presented in this article where we exhibit its interests for large but controlled access in pervasive environments.","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128130545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Autonomous middleware framework for sensor networks 传感器网络自治中间件框架
Pub Date : 2005-07-11 DOI: 10.1108/17427370580000136
Kiran Modukari, S. Hariri, N. Chalfoun, Mazin S. Yousif
Programming sensor networks currently is a subtle task not because of enormous amount of code but due to inherent limitations of embedded hardware like the power, memory, network bandwidth and clock speed. In addition, there are very few programming abstractions and standards available which lead to close coupling between the application code and the embedded OS requiring understanding of low-level primitives during implementation. A middleware can provide glue code between the applications and the heterogeneity of devices by providing optimized set of services for autonomously managing the resources and functionality of wireless nodes in a distributed wireless sensor network. This paper presents an autonomous middleware framework for low power distributed wireless sensor networks that support adaptive sensor functionality, context aware communications, clustering, quality of service and fault-tolerance. Finally an application on how to use the autonomous middleware is illustrated on the envelope system research apparatus (ESRA).
编程传感器网络目前是一项微妙的任务,不是因为大量的代码,而是由于嵌入式硬件的固有限制,如功率,内存,网络带宽和时钟速度。此外,很少有编程抽象和标准可用,这导致应用程序代码和嵌入式操作系统之间的紧密耦合,需要在实现期间理解低级原语。中间件可以通过提供一组优化的服务来自主管理分布式无线传感器网络中无线节点的资源和功能,从而在应用程序和设备的异构性之间提供粘合代码。本文提出了一个用于低功耗分布式无线传感器网络的自主中间件框架,该框架支持自适应传感器功能、上下文感知通信、集群、服务质量和容错。最后介绍了自主中间件在包络系统研究装置(ESRA)上的应用。
{"title":"Autonomous middleware framework for sensor networks","authors":"Kiran Modukari, S. Hariri, N. Chalfoun, Mazin S. Yousif","doi":"10.1108/17427370580000136","DOIUrl":"https://doi.org/10.1108/17427370580000136","url":null,"abstract":"Programming sensor networks currently is a subtle task not because of enormous amount of code but due to inherent limitations of embedded hardware like the power, memory, network bandwidth and clock speed. In addition, there are very few programming abstractions and standards available which lead to close coupling between the application code and the embedded OS requiring understanding of low-level primitives during implementation. A middleware can provide glue code between the applications and the heterogeneity of devices by providing optimized set of services for autonomously managing the resources and functionality of wireless nodes in a distributed wireless sensor network. This paper presents an autonomous middleware framework for low power distributed wireless sensor networks that support adaptive sensor functionality, context aware communications, clustering, quality of service and fault-tolerance. Finally an application on how to use the autonomous middleware is illustrated on the envelope system research apparatus (ESRA).","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133991289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Local data protection for in-network processing in sensor networks 传感器网络网络内处理的本地数据保护
Pub Date : 2005-07-11 DOI: 10.1109/PERSER.2005.1506392
Yi Ouyang, Zhengyi Le, J. Ford, F. Makedon
Sensor networks are playing a more and more important role in monitoring problems such as surveillance and tracking moving objects. In-network processing has been shown to improve scalability, prolong sensor network lifetimes, and diminish computational demands. However, securely querying past data becomes a challenge. An unimportant event in the past could become interesting later; therefore, methods for securely placing a query on a past event should be available. This paper focuses on the challenges associated with securing queries on past data in a sensor network, and proposes methods for past data aggregation using in-network processing. Two different methods are proposed for securing queries on past data; both use forward secure cryptography and provide forward secure data authentication. We compare their security and performance, and also compare them with previous schemes.
传感器网络在监视和跟踪运动物体等监测问题中发挥着越来越重要的作用。网络内处理已被证明可以提高可扩展性,延长传感器网络的生命周期,并减少计算需求。然而,安全查询过去的数据成为一个挑战。过去一件不重要的事情可能在以后变得有趣;因此,应该提供对过去事件安全地放置查询的方法。本文重点研究了传感器网络中对过去数据的安全查询所面临的挑战,并提出了使用网络内处理对过去数据进行聚合的方法。提出了两种不同的方法来保护对过去数据的查询;两者都使用前向安全加密并提供前向安全数据身份验证。我们比较了它们的安全性和性能,并与以前的方案进行了比较。
{"title":"Local data protection for in-network processing in sensor networks","authors":"Yi Ouyang, Zhengyi Le, J. Ford, F. Makedon","doi":"10.1109/PERSER.2005.1506392","DOIUrl":"https://doi.org/10.1109/PERSER.2005.1506392","url":null,"abstract":"Sensor networks are playing a more and more important role in monitoring problems such as surveillance and tracking moving objects. In-network processing has been shown to improve scalability, prolong sensor network lifetimes, and diminish computational demands. However, securely querying past data becomes a challenge. An unimportant event in the past could become interesting later; therefore, methods for securely placing a query on a past event should be available. This paper focuses on the challenges associated with securing queries on past data in a sensor network, and proposes methods for past data aggregation using in-network processing. Two different methods are proposed for securing queries on past data; both use forward secure cryptography and provide forward secure data authentication. We compare their security and performance, and also compare them with previous schemes.","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Matching system knowledge and user expectations in situation-aware systems 在态势感知系统中匹配系统知识和用户期望
Pub Date : 2005-07-11 DOI: 10.1109/PERSER.2005.1506420
U. Meissen, S. Pfennigschmidt, A. Voisard, Tjark Wahnfried
Demand-orientation is of crucial importance in mobile and pervasive information services in order to ensure the delivery of the right information at the right time and at the right place. Increasing attention has been devoted to the notion of personalized services that take the situation of the user into account. The trade-off is to ensure appropriate information supply while preventing information overload. Comparing situations predicted by the system with the expectations of a user yields information about "so-far-unexpected" changes the user should be informed about. This paper describes an approach to support situation-awareness and introduces an underlying model that additionally handles information from various sources. Our approach is illustrated in a driving assistance application.
为确保在正确的时间和正确的地点提供正确的信息,以需求为导向在移动和无处不在的信息服务中至关重要。考虑到用户情况的个性化服务的概念受到越来越多的关注。权衡是在确保适当的信息供应的同时防止信息过载。将系统预测的情况与用户的期望进行比较,可以得到关于用户应该被告知的“迄今为止未预料到的”变化的信息。本文描述了一种支持态势感知的方法,并介绍了一个额外处理来自各种来源的信息的底层模型。我们的方法是在驾驶辅助应用程序说明。
{"title":"Matching system knowledge and user expectations in situation-aware systems","authors":"U. Meissen, S. Pfennigschmidt, A. Voisard, Tjark Wahnfried","doi":"10.1109/PERSER.2005.1506420","DOIUrl":"https://doi.org/10.1109/PERSER.2005.1506420","url":null,"abstract":"Demand-orientation is of crucial importance in mobile and pervasive information services in order to ensure the delivery of the right information at the right time and at the right place. Increasing attention has been devoted to the notion of personalized services that take the situation of the user into account. The trade-off is to ensure appropriate information supply while preventing information overload. Comparing situations predicted by the system with the expectations of a user yields information about \"so-far-unexpected\" changes the user should be informed about. This paper describes an approach to support situation-awareness and introduces an underlying model that additionally handles information from various sources. Our approach is illustrated in a driving assistance application.","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131157593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Pushing the envelope of pervasive access 推动普及访问的极限
Pub Date : 2005-07-11 DOI: 10.1109/PERSER.2005.1506424
B. Chandramouli, H. Lei, K. Bhaskaran, Henry Chang, M. Dikun, F. Heath
This paper presents the design and implementation of the Puma middleware system. Puma enables pervasive access to Web applications from a wide range of clients. In addition to traditional, browser-equipped client devices such as laptops and PDAs, Puma supports the use of peer collaboration tools such as instant messengers, SMS devices, email clients and telephones. While those collaboration tools were initially intended for free-form interaction between people, Puma leverages them for structured interaction between people and computers in order to offer more flexibility, convenience and intimacy to end users. In addition to user-initiated, or pull-based, interactions, Puma allows an application to proactively push an interaction to a user, in a manner sensitive to the application's needs and the user's current context. Architecturally, Puma employs various Modality Bots to mediate between application servers and heterogeneous clients. The Modality Bots also serve as the initial point of contact for application-initiated interactions. As an experiment, Puma has been used to mobilize the human tasks application, which supports the creation, processing, and management of the manual steps in business processes.
本文介绍了Puma中间件系统的设计与实现。Puma支持广泛的客户端对Web应用程序的普遍访问。除了传统的,配备浏览器的客户端设备,如笔记本电脑和pda, Puma支持使用对等协作工具,如即时通讯工具,短信设备,电子邮件客户端和电话。虽然这些协作工具最初是为人与人之间的自由交互而设计的,但Puma利用它们来实现人与计算机之间的结构化交互,以便为最终用户提供更大的灵活性、便利性和亲密性。除了用户发起的或基于拉的交互之外,Puma还允许应用程序以一种对应用程序需求和用户当前上下文敏感的方式主动向用户推送交互。在体系结构上,Puma使用各种Modality Bots在应用服务器和异构客户端之间进行中介。模态机器人还充当应用程序发起的交互的初始联系点。作为实验,Puma已被用于调动人工任务应用程序,该应用程序支持业务流程中手动步骤的创建、处理和管理。
{"title":"Pushing the envelope of pervasive access","authors":"B. Chandramouli, H. Lei, K. Bhaskaran, Henry Chang, M. Dikun, F. Heath","doi":"10.1109/PERSER.2005.1506424","DOIUrl":"https://doi.org/10.1109/PERSER.2005.1506424","url":null,"abstract":"This paper presents the design and implementation of the Puma middleware system. Puma enables pervasive access to Web applications from a wide range of clients. In addition to traditional, browser-equipped client devices such as laptops and PDAs, Puma supports the use of peer collaboration tools such as instant messengers, SMS devices, email clients and telephones. While those collaboration tools were initially intended for free-form interaction between people, Puma leverages them for structured interaction between people and computers in order to offer more flexibility, convenience and intimacy to end users. In addition to user-initiated, or pull-based, interactions, Puma allows an application to proactively push an interaction to a user, in a manner sensitive to the application's needs and the user's current context. Architecturally, Puma employs various Modality Bots to mediate between application servers and heterogeneous clients. The Modality Bots also serve as the initial point of contact for application-initiated interactions. As an experiment, Puma has been used to mobilize the human tasks application, which supports the creation, processing, and management of the manual steps in business processes.","PeriodicalId":375822,"journal":{"name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125400279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1