Results 1 - 10
of
135
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
"... This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six principles for guiding system design, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and l ..."
Abstract
-
Cited by 288 (4 self)
- Add to MetaCart
(Show Context)
This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six principles for guiding system design, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and locality, anonymity and pseudonymity, security, and access and recourse. A brief look at the history of privacy protection, its legal status, and its expected utility is provided as a background.
GaiaOS: An Infrastructure for Active Spaces
"... We envision a world of mobile users in an unobtrusive ubiquitous computing environment that couples a computational model, digital media, and virtual representations of the physical world. Hundreds of embedded computers support the information and computational needs of each user. Users, application ..."
Abstract
-
Cited by 187 (9 self)
- Add to MetaCart
We envision a world of mobile users in an unobtrusive ubiquitous computing environment that couples a computational model, digital media, and virtual representations of the physical world. Hundreds of embedded computers support the information and computational needs of each user. Users, applications, and computing devices move. The location of users and devices drives applications and resource management. Users have anytime/anywhere access to information, the network, and computational resources. Within this world, applications that make effective use of resources to support the activities of users must be simple and efficient to construct. Changes to the physical environment alter the computational model and information space of the users. Similarly, changes to the computational model and information space may alter the physical environment. We call this environment an Active Space. We propose a systems software infrastructure that functions in much the same way as a traditional operating system.
ICrafter: A Service Framework for Ubiquitous Computing Environments.” In Ubicomp
, 2001
"... Abstract. In this paper, we propose ICrafter, a framework for services and their user interfaces in a class of ubiquitous computing environments. The chief objective of ICrafter is to let users flexibly interact with the services in their environment using a variety of modalities and input devices. ..."
Abstract
-
Cited by 186 (5 self)
- Add to MetaCart
(Show Context)
Abstract. In this paper, we propose ICrafter, a framework for services and their user interfaces in a class of ubiquitous computing environments. The chief objective of ICrafter is to let users flexibly interact with the services in their environment using a variety of modalities and input devices. We extend existing service frameworks in three ways. First, to offload services and user input devices, ICrafter provides infrastructure support for UI selection, generation, and adaptation. Second, ICrafter allows UIs to be associated with service patterns for on-the-fly aggregation of services. Finally, ICrafter facilitates the design of service UIs that are portable but still reflect the context of the local environment. In addition, we also focus on the system properties such as incremental deployability and robustness that are critical for ubiquitous computing environments. We describe the goals and architecture of ICrafter, a prototype implementation that validates its design, and the key lessons learnt from our experiences.
Modelling Data-Centric Routing in Wireless Sensor Networks
"... Sensor networks differ from traditional networks in several ways: sensor networks have severe energy constraints, redundant low-rate data, and many-to-one flows. The end-to-end routing schemes that have been proposed in the literature for mobile ad-hoc networks are not appropriate under these settin ..."
Abstract
-
Cited by 129 (1 self)
- Add to MetaCart
Sensor networks differ from traditional networks in several ways: sensor networks have severe energy constraints, redundant low-rate data, and many-to-one flows. The end-to-end routing schemes that have been proposed in the literature for mobile ad-hoc networks are not appropriate under these settings. Data-centric technologies are needed that perform in-network aggregation of data to yield energy-efficient dissemination. In this paper we model data-centric routing and compare its performance with traditional end-to-end routing schemes. We examine the impact of source-destination placement and communication network density on the energy costs, delay, and robustness of data aggregation. We show that data-centric routing offers significant performance gains across a wide range of operational scenarios.
Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks
, 2001
"... this paper, we propose using multipath routing to increase resilience to node failure. Multipath routing techniques have been discussed in the literature for several years now (Section V). However, the application of multipath routing to sensor networks and other systems that permit data-centric rou ..."
Abstract
-
Cited by 128 (0 self)
- Add to MetaCart
(Show Context)
this paper, we propose using multipath routing to increase resilience to node failure. Multipath routing techniques have been discussed in the literature for several years now (Section V). However, the application of multipath routing to sensor networks and other systems that permit data-centric routing with localized path setup has not yet been explored. We consider two different approaches to constructing multipaths between two nodes. One is the classical node-disjoint multipath adopted by prior work, where the alternate paths do not intersect the original path (or each other). The disjoint property ensures that, when k alternate paths are constructed, no set of k node failures can eliminate all the paths. The other approach abandons the requirement for disjoint paths and instead builds many braided paths. With braided paths, there are typically no completely disjoint paths but rather many partially disjoint alternate paths
System support for pervasive applications.
- ACM Trans. on Computer Systems,
, 2004
"... ..."
(Show Context)
DFT-MSN: The Delay/Fault-Tolerant Mobile Sensor Network for Pervasive Information Gathering
- INFOCOM 2006
, 2006
"... Abstract — This paper focuses on the Delay/Fault-Tolerant Mobile Sensor Network (DFT-MSN) for pervasive information gathering. We develop simple and efficient data delivery schemes tailored for DFT-MSN, which has several unique characteristics such as sensor mobility, loose connectivity, fault toler ..."
Abstract
-
Cited by 74 (6 self)
- Add to MetaCart
(Show Context)
Abstract — This paper focuses on the Delay/Fault-Tolerant Mobile Sensor Network (DFT-MSN) for pervasive information gathering. We develop simple and efficient data delivery schemes tailored for DFT-MSN, which has several unique characteristics such as sensor mobility, loose connectivity, fault tolerability, delay tolerability, and buffer limit. We first study two basic approaches, namely, direct transmission and flooding. We analyze their performance by using queuing theory and statistics. Based on the analytic results that show the tradeoff between data delivery delay/ratio and transmission overhead, we introduce an optimized flooding scheme that minimizes transmission overhead in flooding. Then, we propose a simple and effective DFT-MSN data delivery scheme, which consists of two key components for data transmission and queue management, respectively. The former makes decision on when and where to transmit data messages based on the delivery probability, which reflects the likelihood that a sensor can deliver data messages to the sink. The latter decides which messages to transmit or drop based on the fault tolerance, which indicates the importance of the messages. The system parameters are carefully tuned on the basis of thorough analyses to optimize network performance. Extensive simulations are carried out for performance evaluation. Our results show that the proposed DFT-MSN data delivery scheme achieves the highest message delivery ratio with acceptable delay and transmission overhead. I.
Programming for Pervasive Computing Environments
, 2001
"... Pervasive computing provides an attractive vision for the future of computing. Computational power will be available everywhere. Mobile and stationary devices will dynamically connect and coordinate to seamlessly help users in accomplishing their tasks. However, for this vision to become a reality, ..."
Abstract
-
Cited by 52 (6 self)
- Add to MetaCart
(Show Context)
Pervasive computing provides an attractive vision for the future of computing. Computational power will be available everywhere. Mobile and stationary devices will dynamically connect and coordinate to seamlessly help users in accomplishing their tasks. However, for this vision to become a reality, developers must build applications that constantly adapt to a highly dynamic computing environment. To make the developers' task feasible, we introduce a system architecture for pervasive computing, called one.world . Our architecture provides an integrated and comprehensive framework for building pervasive applications. It includes a set of services, such as service discovery, checkpointing, migration, and replication, that help to structure applications and directly simplify the task of coping with constant change. We describe the design and implementation of our architecture and present the results of an evaluation, which includes two case studies.
Developing ambient intelligence systems: A solution based on web services
- Journal of Automated Software Engineering
, 2005
"... Abstract. Enabling the ambient intelligence vision means that consumers will be provided with universal and immediate access to available content and services, together with ways of effectively exploiting them. Concentrating on the software system development aspect, this means that the actual imple ..."
Abstract
-
Cited by 45 (21 self)
- Add to MetaCart
(Show Context)
Abstract. Enabling the ambient intelligence vision means that consumers will be provided with universal and immediate access to available content and services, together with ways of effectively exploiting them. Concentrating on the software system development aspect, this means that the actual implementation of any ambient intelligence application requested by a user can only be resolved at runtime according to the user’s specific situation. This paper introduces a base declarative language and associated core middleware, which supports the abstract specification of Ambient Intelligence applications together with their dynamic composition according to the environment. The proposed solution builds on the Web services architecture, whose pervasiveness enables both services availability in most environments, and specification of applications supporting automated retrieval and composition. In addition, dynamic composition of applications is dealt in a way that enforces the quality of service of deployed applications in terms of security and performance.
Towards a Distributed Platform for Resource-Constrained Devices
- PROC. OF IEEE 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2002
, 2002
"... Many visions of the future predict a world with pervasive computing, where computing services and resources permeate the environment. In these visions, people will want to execute a service on any available device without worrying about whether the service has been tailored for the device. We believ ..."
Abstract
-
Cited by 41 (3 self)
- Add to MetaCart
Many visions of the future predict a world with pervasive computing, where computing services and resources permeate the environment. In these visions, people will want to execute a service on any available device without worrying about whether the service has been tailored for the device. We believe that it will be difficult to create services that can execute well on the wide variety of devices that are being developed because of problems with diversity and resource constraints. We believe