The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2011). PerCom-Workshops 2011: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops 2011)
In this paper, we propose a new semi-Markov process based model to compute the network parameters such as saturation throughput, for the IEEE 802.11 Distributed Coordination Function (DCF) employing the Binary Exponential Backoff (BEB). The backoff stages of BEB and their backoff intervals are modeled as the states of semi-Markov process and their state holding-times, respectively. The proposed model...
In this paper, a mechanism for supporting Quality of Service in wireless networks through the dynamic reselection of Access Points (APs) according to a terminal based load balancing scheme is presented. The mechanism is analyzed, and a corresponding implementation on laptops is presented, while evaluation through both simulation and actual field trials are included. Implementation refers to both Linux...
Effective designs rarely emerge from good structural design or aesthetics alone. It is more often the result of the end product's overall design integrity. Added to this, design is inherently an interdisciplinary collaborative activity. With this in mind, today's tools are not powerful enough to design complex physical environments, such as command control centers or hospital operating theaters. In...
In the fast evolving social web domain, users have a growing demand for consuming context-aware social experiences and digital content. However, users currently have their social context distributed everywhere, and have limited ownership and control of it. On the other hand, application developers and content providers are having a hard time in reaching out to the right users and creating personalized...
The need to prolong the ability for older adults to live at home independently has become an important area of smart environment research. In this proposal, we demonstrate a web-based visualization system (CASASviz) that integrates monitoring, analysis, and automated recognition of residents behavior patterns in smart environments. In our data collection module, we collect real sensor data from the...
The Activity Monitor described in this paper is an easy-to-configure context-aware mobile application, capable of estimating and evaluating the user's activity all day long. It relies on fusion strategies for movement and location estimation, which combine acceleration and radio data from in-device and external sensors. The final objective of the Activity Monitor is to deliver adequate context-aware...
The bicycling recently has gained a lot of popularity in many applications, such as transportation, recreation, and exercise. Bikers may ride in different speeds due to their body strengthes and bike performance such that group members using smart phones form two-tier vehicular long-thin networks along the common cycling path, which consist of a 3G/3.5G high-tier interface and an IEEE 802.11-based...
In tactical military networks, decisions must often be made quickly based on information at hand. It is a challenge to provide decision makers with a notion of the quality of the information they have, or to provide a method by which decision makers can specify a required quality of information. It is a further challenge to honor requests for a required quality of information when selecting information...
Wireless sensor networks (WSNs) are frameworks for modern pervasive computing infrastructures, and are often subject to operational difficulties, such as the inability to effectively mitigate signal noise or sensor failure. Natural systems, such as gene regulatory networks (GRNs), participate in similar information transport and are often subject to similar operational disruptions (noise, damage,...
In the pervasive environment, the context, the data/information processing system and the human being comprise an information chain, along which the information from the context is conducted to the user in a comprehensive way. However, current context-aware systems and methodologies are more concerned about the processing systems without sufficient consideration about the relationships between all...
We consider the problem of energy efficient and fault tolerant in-network aggregation for wireless sensor networks (WSNs). We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip-based protocol for in-network aggregation (GPIA) is based on the spreading of information...
In this paper, we address the fidelity of information collected from distributed, interactive, pervasive computing environments. Queries in these dynamic networks come in two forms: snapshot queries and continuous queries. The former executes through the network and returns values that satisfy the query criteria at a particular instant in time. The latter expects a result that is updated over time...
Summary form only given. GPS is one of the best sensors ever. Besides its traditional applications for consumers and business, engineers and researchers continue to find innovative ways to use it. We have been collecting GPS data from vehicles and people for the past six years, with over 155 million GPS points collected from about 700 different cars and individuals. In this talk, I describe our research...
This paper describes ongoing work in analyzing sensor data logged in the homes of seniors. An estimation of relative energy expenditure is computed using motion density from passive infrared motion sensors mounted in the environment. We introduce a new algorithm for detecting visitors in the home using motion sensor data and a set of fuzzy rules. The visitor algorithm, as well as a previous algorithm...
We present a system for managing the screen real estate of interactive public displays with declarative XML-based descriptions of virtual screens and a finite state machine. The proposed approach includes an algorithm for transforming the declarative virtual screens into a sequence of steps required for transiting between layout states. The system is utilized in realizing an interaction model for...
One of the primary issues in pervasive computing is the adaptation of the communication to the needs of limited devices. Web services are one of the technologies that present both big challenges and big potentials when it comes to their adapted usage in pervasive systems, because they carry communication overhead in order to support interoperability and platform-independence through self-description...
In mobile P2P systems over 3G cellular networks, traditional peer selection algorithms with the idea of traffic localization are not suitable due to the architecture and characteristics of 3G cellular networks. In this paper we propose a novel peer selection algorithm named CFPL for mobile P2P systems over 3G cellular networks. By taking not only the available uplink bandwidth of peers but also the...
Discovering users' whereabouts patterns is important for many emerging ubiquitous computing applications. Life-log systems, advertisement and smart environments are only some of the applications that can be supported by information regarding user patterns and routine behaviors. Latent Dirichlet Allocation (LDA) is a powerful mechanism to extract recurrent behaviors and high-level patterns (called...
Context prediction approaches forecast future contexts based on known context patterns to adapt e.g., services in advance. In the case of the user's context history not providing suitable context information for the observed context pattern, to the best of our knowledge context prediction algorithms will fail to forecast the appropriate future context. To overcome the gap of missing context information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.