scispace - formally typeset
Search or ask a question
Conference

International Conference on Mobile and Ubiquitous Systems: Networking and Services 

About: International Conference on Mobile and Ubiquitous Systems: Networking and Services is an academic conference. The conference publishes majorly in the area(s): Wireless sensor network & Ubiquitous computing. Over the lifetime, 955 publications have been published by the conference receiving 16365 citations.


Papers
More filters
Proceedings ArticleDOI
03 Sep 2004
TL;DR: Simulation results demonstrate that the proposed protocol achieves low latency in delivering emergency warnings and efficient bandwidth usage in stressful road scenarios.
Abstract: This paper proposes a vehicle-to-vehicle communication protocol for cooperative collision warning Emerging wireless technologies for vehicle-to-vehicle (V2V) and vehicle-to-roadside (V2R) communications such as DSRC are promising to dramatically reduce the number of fatal roadway accidents by providing early warnings One major technical challenge addressed in this paper is to achieve low-latency in delivering emergency warnings in various road situations Based on a careful analysis of application requirements, we design an effective protocol, comprising congestion control policies, service differentiation mechanisms and methods for emergency warning dissemination Simulation results demonstrate that the proposed protocol achieves low latency in delivering emergency warnings and efficient bandwidth usage in stressful road scenarios

680 citations

Proceedings ArticleDOI
03 Sep 2004
TL;DR: How SOUPA can be extended and used to support the applications of CoBrA, a broker-centric agent architecture for building smart meeting rooms, and MoGATU, a peer-to-peer data management for pervasive environments are discussed.
Abstract: We describe a shared ontology called SOUPA - standard ontology for ubiquitous and pervasive applications. SOUPA is designed to model and support pervasive computing applications. This ontology is expressed using the Web ontology language OWL and includes modular component vocabularies to represent intelligent agents with associated beliefs, desires, and intentions, time, space, events, user profiles, actions, and policies for security and privacy. We discuss how SOUPA can be extended and used to support the applications of CoBrA, a broker-centric agent architecture for building smart meeting rooms, and MoGATU, a peer-to-peer data management for pervasive environments.

660 citations

Proceedings Article
Yannis Labrou1, Jonathan R. Agre1, Lusheng Ji1, Jesus Molina1, W.-I. Chen1 
01 Jan 2004
TL;DR: A framework for agreements in pervasive environments called the Universal Pervasive Transaction Framework (UPTF) for parties transacting in wireless insecure environments using mobile devices and one type of such agreement with commercial interest, namely mobile payments from a payer to a payee is discussed.
Abstract: We present a framework for agreements in pervasive environments called the Universal Pervasive Transaction Framework (UPTF) for parties transacting in wireless insecure environments using mobile devices. We discuss one type of such agreement with commercial interest, namely mobile payments from a payer to a payee. We have implemented two complete systems for purchasing and payment with mobile devices utilizing UPTF. The first introduces a special purpose, new mobile device called the Universal Pervasive Transaction Device (UPTD) and the second utilizes J2ME-capable mobile phones.

593 citations

Proceedings ArticleDOI
17 Jul 2005
TL;DR: This paper proposes a simple and provably secure additively homomorphic stream cipher that allows efficient aggregation of encrypted data and shows that aggregation based on this cipher can be used to efficiently compute statistical values such as mean, variance and standard deviation of sensed data, while achieving significant bandwidth gain.
Abstract: Wireless sensor networks (WSNs) are ad-hoc networks composed of tiny devices with limited computation and energy capacities. For such devices, data transmission is a very energy-consuming operation. It thus becomes essential to the lifetime of a WSN to minimize the number of bits sent by each device. One well-known approach is to aggregate sensor data (e.g., by adding) along the path from sensors to the sink. Aggregation becomes especially challenging if end-to-end privacy between sensors and the sink is required. In this paper, we propose a simple and provably secure additively homomorphic stream cipher that allows efficient aggregation of encrypted data. The new cipher only uses modular additions (with very small moduli) and is therefore very well suited for CPU-constrained devices. We show that aggregation based on this cipher can be used to efficiently compute statistical values such as mean, variance and standard deviation of sensed data, while achieving significant bandwidth gain.

571 citations

Proceedings ArticleDOI
03 Sep 2004
TL;DR: The properties of the received signal strength reported by IEEE 802.11b wireless network interface cards are investigated to understand the underlying features of location fingerprints and the performance of an indoor positioning system in terms of its precision is compared.
Abstract: Indoor positioning systems that make use of received signal strength based location fingerprints and existing wireless local area network infrastructure have recently been the focus for supporting location-based services in indoor and campus areas. A knowledge and understanding of the properties of the location fingerprint can assist in improving design of algorithms and deployment of position location systems. However, most existing research work ignores the radio signal properties. This paper investigates the properties of the received signal strength reported by IEEE 802.11b wireless network interface cards. Analyses of the data are performed to understand the underlying features of location fingerprints. The performance of an indoor positioning system in terms of its precision is compared using measured data and a Gaussian model to see how closely a Gaussian model may fit the measured data.

557 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
20232
202231
202053
201958
201852
201769