The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatically determining the situation of an ad-hoc group of people and devices within a smart environment is a significant challenge in pervasive computing systems. Current approaches often rely on an environment expert to correlate the situations that occur with the available sensor data, while other machine learning based approaches require long training periods before the system can be used....
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. In an authentication, the portable device is regarded as the human user himself. However, in an open environment like authentication systems, it is necessary to have a way of secure communication between the portable device and the human user. This paper considers an authentication of a server...
This "work in progress" paper reports on a novel approach to pedestrian tracking in confined areas which is based on a combined use of a stereo vision tracking system and a set of sensors available on a mobile platform. This platform is a hands-free, sensory augmented, wearable computer, designed to support visits to museums and archaeological sites. The system is going to be demonstrated...
In the vision of ubiquitous computing, there are billions of context sources that continuously publish their contextual information, and even more user agents that search for and consume such information. These context producers and consumers form a large-scale, wide-area, context-aware network which is both dynamic and heterogeneous. Existing service discovery mechanisms do not address the unique...
Ubiquitous computing environments consist of numerous interacting components, many of which have been developed in isolation from each other. Unless appropriate measures are taken, interference (where a component's behavior in a deployed system differs from its behavior when in isolation) is likely to be commonplace. In this paper we explore the importance of this problem and present our work-in-progress...
In a sensor network monitoring natural environment, the readings of sensor nodes show high temporal and spatial correlation. This stems from the fact that most characteristics of natural environment (chemical concentration, temperature, humidity, pollution, etc.) do not change abruptly in space and time. From a sensor's perspective then, the environmental phenomena are quite predictable, and hence,...
Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems arising from subsequent handover. In this paper, we provide a formal model for subsequent security context transfer and define a set of security requirements. We furthermore present a new solution that meets all but one of these...
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the notion of such environments is the capturing of location and context information. Context awareness and validation enables significant functionality to pervasive computing applications, users, resources and the ways they interact...
Multi-target tracking is an important embranchment of WSN. This paper works on data fusion of multi-target tracking. We choose LEACH by Wook Choi et al. (2004) as the routing protocol, and FCM algorithm to do association in cluster heads. Based on analysis of former FCM, we found a few problems about it. Such as miss association, missing new targets and repeat tracking of targets. We proposed some...
We propose a model driven design and development methodology augmented with formal validation and verification (V&V) for the development of mobile health systems. Systems which deliver healthcare services remotely should be developed using robust and trusted engineering technologies. The methodology instantiates steps in the MDA trajectory using formal methods to verify critical properties of...
In the IEEE 802.15.4 standard, two different operation modes are specified: the beacon-enabled networks, and non-beacon networks. The devices in a beacon-enabled network synchronize with each other and the beacon frame which is treated as synchronization signal also provides some extended features. On the other hand, a beacon-enabled device is hard to implement. Highly processing power is required...
There are a variety of approaches to improve the speed at which large RFID tag populations are being identified. In this paper, we present a transmission control strategy for a common class of RFID multiple access schemes. It builds on earlier work on Bayesian broadcast strategies, but has been adapted to address characteristics of the RFID domain. It has been designed for framed ALOHA and it makes...
Environmental variations cause significant fluctuations in WiFi signals in the same location over time, rendering traditional RF-to-location pre-trained maps quickly obsolete. To solve this problem, we use a two-phase approach to determining the user's location. The first phase utilizes traditional pattern-matching to identify the general location, and a second phase applies logistic regression to...
Molecular communication is one solution for nano-scale communication between nanomachines. Nanomachines (e.g., biological molecules, artificial devices) represent small devices or components that perform computation, sensing, or actuation. Molecular communication provides a mechanism for one nanomachine to encode or decode information into molecules and to send information to another nanomachine....
This paper introduces MobiCare - a novel service architecture that enables a wide range of health-related services for efficient and mobile patient care. These services include: (1) health-related services in medical devices and sensors to remotely install, self-activate, reconfigure or even self-repair with new health services and applications, (2) secure and reliable dynamic software upgrade or...
Molecular communication is a new communication paradigm using molecules as a communication carrier. In molecular communication, information is encoded onto molecules at senders and the molecules propagate to receivers in a controlled manner. The receivers, upon receiving the molecules, decode the encoded information and react biochemically. Molecular communication provides means to deliver molecules...
The lack of structured methodologies and software engineering efforts on designing the support of context-awareness in pervasive systems hinders the potential advantages of analyzing and reusing other practitioners' experience on solving common problems. This paper proposes to exploit design patterns to identify and capture common aspects of various design solutions. Specifically, we reverse-architect...
Consider a placement of heterogeneous, wireless sensors that can vary the transmission range by increasing or decreasing power. The problem of determining an optimal assignment of transmission radii, so that the resulting network is strongly-connected and more generally k-connected has been studied in the literature. In traditional k-connectedness, the network is able resist the failure of up to k...
In mobile peer-to-peer (MP2P) networks, nodes tend to gather together rather than scattered uniformly across the network area. This paper considers the clustering of peer nodes and its performance impact in MP2P networks. The model for node clustering based on a heavy-tail distribution is first introduced and then a topology generation method that produces a clustered network is presented. Experiments...
Scalable distributed management is a key challenge for current Internet services and necessary for future ubiquitous services of wireless mobile users. Policy-based management (PBM) is seen as a practical solution for dealing with the needs of new advanced services for highly dynamic wireless environments. The IETF developed a two-tier client/server PBM framework, yet it requires some important extensions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.