The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
The Internet of Things (IoT) application development is a complex task that requires a wide range of expertise. Currently, the IoT community lacks a development toolkit that enables inexperienced developers to develop IoT prototypes rapidly. Filling this gap, we propose a development toolkit based on a model-driven approach, called IoT Link. IoT Link allows inexperienced developers to compose mash...
In many ubiquitous intelligent systems, high-level situations are often required to be inferred by fusing several contexts, which is referred to as situation inference. As opportunistic sensing becomes widely accepted, new challenges are brought into situation inference. In the opportunistic sensing paradigm, applications make the best use of the sensors that happen to be available in a certain location,...
With the development of urban traffic, taxi accounts for a large proportion to serve people's daily travel. Besides prebooked taxis, flagged taxis also run in many places of the world, allowing passengers to wave at the driver on the side of the road to flag down the taxi as it is approaching. For flagged taxis service, taxi drivers' passenger-refusal (TPR) behaviors have become a serious problem...
As a typical ubiquitous/pervasive computing environment, a smart space usually consists of many sensors/actuators for interacting with the physical environment together with many context-aware applications providing users with kinds of services. However, as context-aware applications deployed in a smart space share the same physical environment, they may have influences on one another. These influences,...
WiFi-based localization is a promising candidate of indoor localization. In this paper, we present a distributed localization system using a WiFi ad-hoc wireless positioning network (AWPN) to realize on-demand location-based services. The AWPN is a WiFi mesh network with the capability of localizing WiFi devices. Using the AWPN, we can easily build a localization infrastructure by putting WiFi APs...
With the explosion of Online Social Networking (OSN), participation in social networking sites has dramatically increased in organizations like enterprises, campuses, etc. Lots of privacy or security information can be shared by a vast network of people including friends and strangers, which brings potential threats of information leakage. However, existing information protection methods cannot effectively...
Attack representation models (ARMs), such as an Attack Graph and Attack Tree, are widely used for security modeling and analysis. However, they suffer from a scalability problem if the size of a networked system becomes too large. Previous work focused on model simplifications (also known as pruning), but it may lose security information. To cope with the scalability problem without losing any security...
This paper addresses the localization embedded in a wild environment with huge obstacles and limitations of energy and costs. This kind of wild large scale localization often selects the range-free approaches for the reason of hardware consumption. While these approaches always suffered from low accuracy compared with the range-based methods, especially in the scenario of wild environment with huge...
Smartphones, equipped with powerful processors, accelerometers, compasses and Global Positioning Systems (GPS) receivers, have favored the increase of location and context-based services over the last years. Many researchers have attempted to recognize user's semantic location by various methods. The traditional semantic location recognition methods require partitioning the location and registering...
Nowadays, mobile user terminals are usually composed of multiple network interfaces and multiple processors. This means there are usually several independent ways of satisfying the immediate Quality of Service (QoS) expected by the user. Dynamic decision engines are used for selecting the most power-efficient interface and performance states in order to satisfy the QoS while increasing the battery...
This paper introduces Muclouds, a parallel simulation framework for simulating large-scale cloud computing systems. Muclouds improves the simulation performance for these large systems, such that the simulation time can be minimized. To achieve this goal, in this paper we propose a novel technique named stage and partition (SAP). SAP is based on the following observation: in an event-based simulation...
The progressive development of information and communication technologies has led us to a new world called hyper world that is composed by the cyber world and the physical world, which, at the same time, brings us the digital explosions of data and connectivity as well as all kinds of smart services. Based on these, Cyber-I was proposed, which aims at creating a unique, digital, comprehensive description...
Nanotechnology is generally considered a technology of the future. It promises to have many implications in various fields, and create revolutionary methods in some circumstances. Due to their size, nanodevices have limited capacities in terms of energy, computation and transmission among others. Networking them allows to increase their effectiveness, and also their communication range. However, data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.