The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: pervasive systems; wireless sensor networks; user interfaces; user interaction models; resource management; data security; pervasive computing; context aware service; self-organizing networks; pervasive networking; discovery and location; and architectures and platforms
Most existing real-time protocols for sensor data dissemination use packet scheduling schemes to prioritize packets according to their deadlines. However, packet prioritization by itself cannot completely support real-time data dissemination requirements. In this paper, we propose new just-in-time scheduling (JiTS) algorithms that take advantage of the available slack, if any, to reduce contentions...
This paper presents a power aware routing algorithm for WSN exploiting application features and the radio frequency map of the deployed sensors. The suggested methodology can be applied to applications requiring data acquisition from semi-static medium-size networks. The improvement over traditional routing solutions derives from the fact that routing paths and optimal transmission powers are identified...
In this paper we introduce prerequisites for the empowerment of social interaction when using a multi-user mobile service. The paper is based on a case study of user experiences of a multiplayer mobile game where the players attend the game via their mobile phones whilst their activity is materialized on a common public display. Based on the results of user evaluation we introduce three enabling factors...
It is difficult to build user interfaces that must be distributed over a set of dynamic and heterogeneous I/O devices. This difficulty increases when we want to split, merge, replicate, and relocate the UI across a set of heterogeneous devices, without the application intervention. Furthermore, using generic tools, e.g. to search for UI components or to save/restore them, is usually not feasible....
A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where administrators specify the management action to be taken in different situations using event-condition-action (ECA) rules. An important problem with policy-based management of a pervasive system is that multiple rules can get...
Access control policies define the rules for accessing system resources. Traditionally, these are designed to take a reactive view for providing access, based on explicit user request. This methodology may not be sufficient in the case of critical events (emergencies) where automatic and timely access to resources may be required to facilitate corrective actions. This paper introduces the novel concept...
The collection of and search for location information is a core component in many pervasive and mobile computing applications. In distributed collaboration scenarios this location data is collected by different entities, e.g., users with GPS enabled mobile phones. Instead of using a centralized service for managing this distributed dynamic location data, we present a new peer-to-peer data structure,...
One of the challenges in pervasive computing is communication between a mobile user's terminal and the continuously changing local environment. Bluetooth is one potential option for providing connectivity, but its usage is hindered by the time consuming device discovery and service discovery processes. We propose using RFID technology to enhance the Bluetooth connection establishment procedure. We...
This paper reports on recent development of a wearable wireless sensor platform for interactive dance performances. At a fraction of a cubic-centimeter in volume, this platform is truly wearable and scalable informing wireless networks. Integrated with a wide variety of different sensing devices, it is a real-time monitoring system for activities and physical conditions of the human body. The effectiveness...
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow a large display and keyboard from a desktop personal computer. This uniquely ubiquitous computing activity requires effective device and service discovery as well as appropriate media usable across two or more devices. In...
In this paper we introduce the inverted browser, a novel approach to enable mobile users to view content from their personal devices on public displays. The inverted browser is a network service to start and control a browser that is then used to view the content. In contrast to a traditional Web browser, which runs on the client device and pulls content from a server, content is pushed to the inverted...
Human behavior and housing resist every standardization effort. Many aspects such as different technical equipment, furniture, and usage patterns make our surroundings as individual as ourselves. Thus, the personalization of pervasive applications is a fundamental requirement. To enable the development of custom pervasive applications, we propose a software development process. This process is based...
The purpose of this study was to explore the convenient timing for information notification of the users in their daily life. Using the location and the time interval since a location change, we have examined the features of the user's response to information notification. For a period of three weeks, four subjects carried mobile terminals which randomly notified them about daily information. The...
A secure resource discovery model for devices running in pervasive computing environments has become significant. Due to the constrained nature of these devices, the need for a model that allows discovery and sharing of resources without putting much overhead on the operation of devices is needed. The dependency on fixed powerful machines for ensuring security is not desired and also not feasible...
In this work we propose a solution to the RFID privacy problem that has the potential to guarantee user privacy without requiring changes to existing infrastructure or reducing business value from the use of RFID technology. We give emphasis to the development of a lightweight protocol that does not incur costly overheads with respect to computation, storage as well as time and effort needed for deployment...
An intuitive context aware service between two devices is possible using touch with the direct digital intra-body communication. Using this technology, users with multimedia devices may simply touch them to establish network connection, transfer data, and provide the required service; hence the name touch-and-play (TAP). Using TAP, users can disclose their context by touching the specific device....
The widespread adoption of mobile electronic devices and the advent of wearable computing have encouraged the development of compact alternatives to the keyboard and mouse. These include one-handed keyboards, digitizing tablets, and glove-based devices. This paper describes a combination pointer position and non-chorded keystroke input device that relies on miniature wrist-worn wireless video cameras...
This paper presents Cantag, an open source software toolkit for building marker-based vision (MBV) systems that can identify and accurately locate printed markers in three dimensions. The extensibility of the system makes it ideal for dynamic location and poses determination in pervasive computing systems. Unlike prior MBV systems, Cantag supports multiple fiducial shapes, payload types, data sizes...
Offloading is a kind of mechanism utilized in pervasive systems to leverage the severity of resource constraints of mobile devices by migrating part of the classes of a pervasive service/application to some resource-rich nearby surrogates. A pervasive service application needs to be partitioned prior to offloading. Such partitioning algorithms play a critical role in a high-performance offloading...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.