DMCA
Next century challenges: data-centric networking for invisible computing,” The Portolano Project at the University of Washington (1997)
Cached
Download Links
Venue: | Proceedings of Fifth Annual ACM/IEEE MOBICOM 97 |
Citations: | 135 - 5 self |
Citations
1755 | Security architecture for the internet protocol
- Kent, Seo
- 2005
(Show Context)
Citation Context ...to use. Kerberos [30] is currently a popular system for authenticating network requests, but its statically con gured centralized servers make it a poor choice for mobile networks. The IPsec protocol =-=[17]-=- is a newer scheme for private data transfer built on public-key infrastructure, which may be better suited to the needs of mobile computing. But IPsec does not solve the problems of privacy and authe... |
1449 |
Mobility Support
- Johnson, Perkins, et al.
- 2003
(Show Context)
Citation Context ... o of the DHCP and DNS protocols [3], but their use is limited to IP networks. Other important issues, including IP tunneling and mobile host registration, are contained in the mobile IP speci cation =-=[26]-=-. Each technology is important to the future of mobile computing, but no single protocol is completely satisfactory. The cellular model works well, but is it appropriate for the desired services and a... |
1005 | BRSVP: A new resource reservation protocol,[
- Zhang, Deering, et al.
- 1993
(Show Context)
Citation Context ...rk infrastructure should be able to o er guarantees about the quality of service (QoS) to those users willing to pay a premium, provided the network has su cient free capacity. Protocols such as RSVP =-=[41]-=- and QEX [6] have only laid the initial groundwork for e ective QoS management in mobile applications. Those services which do not have speci c QoS requirements may still bene t from knowledge about t... |
515 | A new location technique for the active office.
- Ward, Jones, et al.
- 1997
(Show Context)
Citation Context ...s. The CAC field is in its infancy, but already groups are exploring this design space with projects such as Georgia Tech 's CyberDesk [1] and the spatial location work at AT&T Laboratories Cambridge =-=[37]-=- and Xerox PARC [36] [35]. The likely result is that the fusion of data from a variety of sensors and databases will be crucial to inferring intention. A major issue will be in how to get the required... |
505 |
The invisible computer.
- Norman
- 1998
(Show Context)
Citation Context ...99. Department of Computer Science and Engineering University ofWashington, Seattle fesler, jeffro, tom, gaetanog@cs.washington.edu 1 A simple analogy inspired by Donald Norman illustrates our vision =-=[22]-=-. Today's desktops and palmtops are multipurpose tools { electronic Swiss Army knives. But how many ofus would use a Swiss Army knife for preparing a dinner at home? It may be ne on a camping trip, bu... |
418 | Software Agents: An Overview,”
- Nwana
- 1996
(Show Context)
Citation Context ...es. The term agent is di cult to de ne. Nwana describes an agent as a \component of software and/or hardware which is capable of acting exactingly in order to accomplish tasks on behalf of its user.&q=-=uot; [23]-=- The technology and protocols used to implement agents are becoming better understood [9] [8], but how they can be applied to mobile applications in environments with widely distributed data sources a... |
401 | ANTS: a toolkit for building and dynamically deploying network protocols, in:
- Wetherall, Guttag, et al.
- 1998
(Show Context)
Citation Context ...ect interface whenever it needs to execute a remote method. How is this accomplished? Several emerging solutions to this problem, including Jini, Liquid Software [13], and the Active Networks Toolkit =-=[40]-=- are based on the Java language. In these models, bytecode is downloaded and executed on the client. Using the Java RMI, clients can then use the services of other devices. Other solutions are based o... |
355 |
Web Consortium, Extensible Markup Language
- Wide
- 1998
(Show Context)
Citation Context ...hich HTML is a subset), for document interchange. XML is not a language as much as it is a standard that permits the creation of custom markup syntax to suit the needs of a particular document format =-=[4]-=-. Another interesting research e ort is the VoxML markup language from Motorola. VoxML allows the integration of speech interfaces for interaction with web content through simulated dialogues [21]. Ma... |
286 | An overview of the PARCTAB ubiquitous computing experiment.
- Want, Schilit, et al.
- 1995
(Show Context)
Citation Context ...in its infancy, but already groups are exploring this design space with projects such as Georgia Tech 's CyberDesk [1] and the spatial location work at AT&T Laboratories Cambridge [37] and Xerox PARC =-=[36]-=- [35]. The likely result is that the fusion of data from a variety of sensors and databases will be crucial to inferring intention. A major issue will be in how to get the required information in a ti... |
123 |
Internetworking with TCP/IP: Volume 1
- Comer
- 2006
(Show Context)
Citation Context ...ngth analysis found in cellular protocols [38]. Mobile devices also need to be able to ascertain information about the networks that they join. Some solutions leverage o of the DHCP and DNS protocols =-=[3]-=-, but their use is limited to IP networks. Other important issues, including IP tunneling and mobile host registration, are contained in the mobile IP speci cation [26]. Each technology is important t... |
115 | Composable ad-hoc Mobile Services for Universal Interaction. In
- Hodes, Katz, et al.
- 1997
(Show Context)
Citation Context ...ed to the client's size, shape, abilities, or resource limitations. Research toward this goal is already underway. A rst attempt was Interface Description Languages (IDLs) as described by Hodes et al =-=[16]-=-. IDLs describe abstract UI semantics via a hierarchical set of types. More recently, IDLs have been superseded by ascheme built on top of the extensible markup language (XML) [15]. XML is a format fo... |
75 | Software Agents: An Overview”, Knowledge Engineering Review, - Nwana - 1996 |
57 | Designing and implementing asynchronous collaborative applications with Bayou
- Edwards, Mynatt, et al.
- 1997
(Show Context)
Citation Context ...users with access security via Kerberos, and a uniform name space for accessing les. The Coda lesystem [31] is 5 a descendant of AFS that is designed speci cally for mobile clients. The Bayou project =-=[7]-=- provides mobile clients access to data by using a distributed database approach. Using these projects as starting points, a combination of storage services will need to be designed and integrated int... |
55 | Liquid software: a new paradigm for networked systems.
- Hartman, Manber, et al.
- 1996
(Show Context)
Citation Context ... his home, so it must request the correct interface whenever it needs to execute a remote method. How is this accomplished? Several emerging solutions to this problem, including Jini, Liquid Software =-=[13]-=-, and the Active Networks Toolkit [40] are based on the Java language. In these models, bytecode is downloaded and executed on the client. Using the Java RMI, clients can then use the services of othe... |
51 | Embodied User Interfaces: Toward Invisible User Interfaces
- Fishkin, Moran, et al.
- 1998
(Show Context)
Citation Context ... interacting with a computing device. Such design is enabled by involving users in the design process. This idea is the thrust of much recent work in the HCI community including that of Fishkin et.al.=-=[10]-=- and Weiser [39]. To achieve this invisible design, we must rst conduct user studies, create prototypes of the new mobile world, and deploy applications and services that a wide range of users will nd... |
36 | mobility support - Ip - 1996 |
29 |
Jini architecture overview”.
- Waldo
- 1998
(Show Context)
Citation Context ...the music. Resource discovery is the subject of numerous research e orts including the RDP [27] and SLP [25] protocols, Berkeley's Service Discovery Service [5], Sun Microsystems' JavaSpaces and Jini =-=[34]-=-, T-Spaces from IBM [29], Universal Plug and Play from Microsoft [28], and the HAVi consumer electronics consortium [14]. Each takes a slightly di erent approach based on the application domain they w... |
25 | Wide Web Consortium. Extensible Markup Language (XML - World - 2013 |
21 | IPCHINOOK: an integrated IP-based design framework for distributed embedded systems,” DAC
- Chou
- 1999
(Show Context)
Citation Context ...ing that applications are written by as large a segment of the population as possible. This automatic code synthesis is similar in spirit to CAD tools for distributed embedded systems such as Chinook =-=[2]-=-. 3.3.4 Intermittent Connectivity In order to achieve invisible, trouble-free connections and disconnections from networks, mobility must be built into our protocols. Indeed, we nd it likely that inte... |
14 | Distributed Systems Support for Adaptive Mobile Applications
- Davies, Friday, et al.
- 1996
(Show Context)
Citation Context ...ture should be able to o er guarantees about the quality of service (QoS) to those users willing to pay a premium, provided the network has su cient free capacity. Protocols such as RSVP [41] and QEX =-=[6]-=- have only laid the initial groundwork for e ective QoS management in mobile applications. Those services which do not have speci c QoS requirements may still bene t from knowledge about the current n... |
12 | Resource discovery protocol for mobile computing.
- Perkins, Harjono
- 1996
(Show Context)
Citation Context ... interface. Similarly, Bob's phone was able to discover the stereo system, retrieve its interface, and pause the music. Resource discovery is the subject of numerous research e orts including the RDP =-=[27]-=- and SLP [25] protocols, Berkeley's Service Discovery Service [5], Sun Microsystems' JavaSpaces and Jini [34], T-Spaces from IBM [29], Universal Plug and Play from Microsoft [28], and the HAVi consume... |
7 |
1394 high performance serial bus: The digital interface for ATV
- Kunzman, Wetzel
- 1995
(Show Context)
Citation Context ...rastructure must be able to inform devices about the network they are using, as well as be able to provide admission control. Unlike the Internet, Bluetooth [32], HomeRF [11], USB [33], and IEEE 1394 =-=[18]-=- networks all reserve bandwidth for synchronous data channels. In these cases, the network infrastructure should be able to o er guarantees about the quality of service (QoS) to those users willing to... |
6 |
Open house
- WEISER
- 1996
(Show Context)
Citation Context ...h a computing device. Such design is enabled by involving users in the design process. This idea is the thrust of much recent work in the HCI community including that of Fishkin et.al.[10] and Weiser =-=[39]-=-. To achieve this invisible design, we must rst conduct user studies, create prototypes of the new mobile world, and deploy applications and services that a wide range of users will nd useful. This pr... |
5 |
Assistive Technology;
- Microsoft
- 2005
(Show Context)
Citation Context ...In these models, bytecode is downloaded and executed on the client. Using the Java RMI, clients can then use the services of other devices. Other solutions are based on CORBA [12] and Microsoft's COM =-=[19]-=-. Both allow clients to execute code located elsewhere, and provide mechanisms that allow clients to discover an object's interface at runtime. Unlike the Java-based solutions, CORBA and COM place res... |
3 |
A New Location Technique for the Active O ce
- Ward, Jones, et al.
- 1997
(Show Context)
Citation Context ...ers. The CAC eld is in its infancy, but already groups are exploring this design space with projects such as Georgia Tech 's CyberDesk [1] and the spatial location work at AT&T Laboratories Cambridge =-=[37]-=- and Xerox PARC [36] [35]. The likely result is that the fusion of data from a variety of sensors and databases will be crucial to inferring intention. A major issue will be in how to get the required... |
3 |
Enabling "smart spaces:" entity description and user interface generation for a heterogeneous component-based distributed system
- Hodes, Katz
- 1998
(Show Context)
Citation Context ...bed by Hodes et al [16]. IDLs describe abstract UI semantics via a hierarchical set of types. More recently, IDLs have been superseded by a scheme built on top of the extensible markup language (XML) =-=[15]-=-. XML is a format for using SGML, the Standard Generalized Markup Language (of which HTML is a subset), for document interchange. XML is not a language as much as it is a standard that permits the cre... |
2 |
Bridging real and virtual worlds with electronic tags
- Want, Fishkin, et al.
- 1999
(Show Context)
Citation Context ...s infancy, but already groups are exploring this design space with projects such as Georgia Tech 's CyberDesk [1] and the spatial location work at AT&T Laboratories Cambridge [37] and Xerox PARC [36] =-=[35]-=-. The likely result is that the fusion of data from a variety of sensors and databases will be crucial to inferring intention. A major issue will be in how to get the required information in a timely ... |
1 |
Future computing environments: Cyberdesk
- Abowd, Atkeson
- 1998
(Show Context)
Citation Context ...ther available data such as the time and knowledge about other users. The CAC eld is in its infancy, but already groups are exploring this design space with projects such as Georgia Tech 's CyberDesk =-=[1]-=- and the spatial location work at AT&T Laboratories Cambridge [37] and Xerox PARC [36] [35]. The likely result is that the fusion of data from a variety of sensors and databases will be crucial to inf... |
1 |
The service discovery service: Searching for computation power
- Czerwinski, Hodes, et al.
- 1999
(Show Context)
Citation Context ... system, retrieve its interface, and pause the music. Resource discovery is the subject of numerous research e orts including the RDP [27] and SLP [25] protocols, Berkeley's Service Discovery Service =-=[5]-=-, Sun Microsystems' JavaSpaces and Jini [34], T-Spaces from IBM [29], Universal Plug and Play from Microsoft [28], and the HAVi consumer electronics consortium [14]. Each takes a slightly di erent app... |
1 |
et al. Internet softbot research
- Etzioni, Hanks, et al.
- 1998
(Show Context)
Citation Context ...nd/or hardware which is capable of acting exactingly in order to accomplish tasks on behalf of its user." [23] The technology and protocols used to implement agents are becoming better understood=-= [9] [8]-=-, but how they can be applied to mobile applications in environments with widely distributed data sources and intermittent connectivity is research that must be further explored. Of particular importa... |
1 |
Enabling \smart spaces:" entity description and user interface generation for a heterogeneous component-based distributed system
- Hodes, Katz
- 1998
(Show Context)
Citation Context ...ibed by Hodes et al [16]. IDLs describe abstract UI semantics via a hierarchical set of types. More recently, IDLs have been superseded by ascheme built on top of the extensible markup language (XML) =-=[15]-=-. XML is a format for using SGML, the Standard Generalized Markup Language (of which HTML is a subset), for document interchange. XML is not a language as much as it is a standard that permits the cre... |
1 |
The NFS distributed le system
- Microsystems
- 1995
(Show Context)
Citation Context ...t his camera, art display, and friends can all access simultaneously or, alternatively, Bob's photos may reside in several di erent locations { redundantly or in di erent forms. Sun Microsystem's NFS =-=[20]-=- o ers transparent and authenticated access to a global set of les residing on a central server. Unfortunately, this system requires static con guration and has a single point of failure, making it un... |
1 |
SLP white paper
- Perkins
- 1998
(Show Context)
Citation Context ...imilarly, Bob's phone was able to discover the stereo system, retrieve its interface, and pause the music. Resource discovery is the subject of numerous research e orts including the RDP [27] and SLP =-=[25]-=- protocols, Berkeley's Service Discovery Service [5], Sun Microsystems' JavaSpaces and Jini [34], T-Spaces from IBM [29], Universal Plug and Play from Microsoft [28], and the HAVi consumer electronics... |
1 |
IBM T-Spaces project. http://www.almaden.ibm.com/cs/TSpaces
- Research
(Show Context)
Citation Context ...overy is the subject of numerous research e orts including the RDP [27] and SLP [25] protocols, Berkeley's Service Discovery Service [5], Sun Microsystems' JavaSpaces and Jini [34], T-Spaces from IBM =-=[29]-=-, Universal Plug and Play from Microsoft [28], and the HAVi consumer electronics consortium [14]. Each takes a slightly di erent approach based on the application domain they were intended for. None w... |
1 |
The NFS distributed file system
- Microsystems
- 1995
(Show Context)
Citation Context ...s camera, art display, and friends can all access simultaneously or, alternatively, Bob's photos may reside in several different locations -- redundantly or in different forms. Sun Microsystem 's NFS =-=[20]-=- offers transparent and authenticated access to a global set of files residing on a central server. Unfortunately, this system requires static configuration and has a single point of failure, making i... |
1 | Upper Saddle River, NJ, third edition - Hall - 1995 |
1 | Liquid software: A new paradigm for networked systems - Hodes, Katz - 1996 |
1 | Corba news - HomeRF - 1999 |
1 | Motorola. Motorola http://voxml.motorola.com/. VoxML - report, Alto, et al. - 1995 |