scispace - formally typeset
Search or ask a question

Showing papers in "Pervasive and Mobile Computing in 2008"


Journal ArticleDOI
TL;DR: Several state-of-the-art algorithms and techniques are presented and compared that aim to address the coverage-connectivity issue in wireless sensor networks.

508 citations


Journal ArticleDOI
TL;DR: This work proposes a context-aware framework for routing and forwarding in opportunistic networks, and presents a particular protocol, HiBOp, which, by exploiting the framework, learns and represents through context information, the users' behavior and their social relations, and uses this knowledge to drive the forwarding process.

192 citations


Journal ArticleDOI
TL;DR: It is concluded that a data-centric infrastructure is necessary to facilitate both the development and deployment of context-aware pervasive-computing applications.

119 citations


Journal ArticleDOI
TL;DR: This paper proposes an end-to-end, statistical approach for data authentication that provides inherent support for in-network processing and shows that the proposed scheme can successfully authenticate the sensory data with high confidence.

93 citations


Journal ArticleDOI
TL;DR: A new analytical model is presented that applies proximity graphs for approximating the probability distribution of error distance given a location fingerprint database using WLANs received signals, and its associated statistics.

81 citations


Journal ArticleDOI
TL;DR: A concrete architecture for a home in which the health of an elder is monitored is proposed and conclusions on the feasibility of using service-oriented approaches in ubiquitous computing are drawn.

74 citations


Journal ArticleDOI
TL;DR: The design of the object location system is described and an algorithm is provided which can be used to search for lost or misplaced items efficiently by selecting the most suitable sensors based on arbitrary domain knowledge is provided.

73 citations


Journal ArticleDOI
TL;DR: CoWSAMI is a middleware infrastructure that enables context awareness in open ambient intelligence environments, consisting of mobile users and context sources that become dynamically available as the users move from one location to another.

59 citations


Journal ArticleDOI
TL;DR: The design, implementation and evaluation of a software framework that supports the development of mobile, context-aware trails-based applications that overcome limitations with traditional time management techniques based on static to-do lists by dynamically reordering activities based on emergent context are described.

57 citations


Journal ArticleDOI
TL;DR: The ECORA framework for context-aware computing is presented, which is designed with a focus on reasoning about context under uncertainty and addressing issues of heterogeneity, scalability, communication and usability.

52 citations


Journal ArticleDOI
TL;DR: A tamper-proof and lightweight challenge-response authentication scheme, based on 2-level noisy Physically Unclonable Functions (PUF), and an extensive analysis of PUFs.

Journal ArticleDOI
TL;DR: This article is an initial study on how constrained connected random unit graphs (C-CRUG) can be generated by fast algorithms and what kind of desirable characteristics can be achieved compared to completely random graphs, especially for sparse node densities.

Journal ArticleDOI
TL;DR: This paper proposes a permission-based message efficient mutual exclusion (MUTEX) algorithm for mobile ad hoc networks (MANETs) that uses the ''look-ahead'' technique, which enforces MUTEX only among the hosts currently competing for the critical section.

Journal ArticleDOI
TL;DR: A futuristic HMWN where heterogeneous networks, operating in single-hop and multi-hop modes are integrated to provide increased capacity and enhanced coverage for the users is envisioned.

Journal ArticleDOI
TL;DR: An architecture based on a local proxy on a mobile device and a lightweight algorithm for a comprehensive analysis of forms, which leads to the most probable user data to be filled in, driven by an initial rule set are developed.

Journal ArticleDOI
TL;DR: This work presents a novel approach to support nearest neighbor queries from mobile hosts by leveraging the sharing capabilities of wireless ad-hoc networks, and illustrates how previous query results cached in the local storage of neighboring mobile users can be leveraged to either fully or partially compute and verify nearest neighbors queries at a local host.

Journal ArticleDOI
TL;DR: In MNP, mobile users cooperatively share a single message notification channel to reduce users' telecommunication charges and extend a device's battery life and the results of performance evaluation show that the MNP protocol could be able to save significant energy consumed in a mobile device.

Journal ArticleDOI
TL;DR: This work creates an opportunistic distributed storage for cooperative content caching and retrieval using the nodes' buffers that leverage DTN characteristics and provide application support in intermediate nodes.

Journal ArticleDOI
TL;DR: This paper addresses the problem of designing the reasoning core of a middleware that supports advanced forms of adaptation in pervasive and mobile computing, while guaranteeing very low response times as required by mobile applications.

Journal ArticleDOI
TL;DR: An integrated view of cognitive radio technologies for efficient wireless services in dense spectrum environments is presented, and a preview of the network-centric WiNC2R prototype under development at WINLAB as an experimental cognitive radio platform is given.

Journal ArticleDOI
TL;DR: CASD is proposed, a context-aware service directory envisioned as acontext-based index for services on top of any traditional service directory, and design algorithms for construction, search, update and merge of such directories.

Journal ArticleDOI
TL;DR: A novel characterization of the accuracy of sensor location-estimates is derived, which provides new insights into the design of multiple-access schemes from the perspective of sensor localization accuracy.

Journal ArticleDOI
TL;DR: An extended reference model is proposed that allows the integration of the concept of connectivity opportunity and the proposed CSA with the framework being defined by the upcoming IEEE 802.21 standard for Media Independent Handover services.

Journal ArticleDOI
TL;DR: An entirely decentralized key generation mechanism, employing a central trusted entity only during initialization and introducing a novel concept of Node-Group-Key (NGK) mapping, which can be established between group members with absolutely no prior communication.

Journal ArticleDOI
TL;DR: The use of the method delegation design pattern, the resolution of service bindings through the use of dynamically adjustable characteristics and the late binding of services as key features in simplifying the service composition task are proposed.

Journal ArticleDOI
TL;DR: In a flexible manufacturing systems (FMS) scenario, how the Peer-it technology can improve over centralized FMSs with respect to fault tolerance, scalability, flexibility in reconfiguration, productivity and efficiency is demonstrated.

Journal ArticleDOI
TL;DR: This work designs a cross-layer optimised protocol (XScribe) that addresses most of the Scribe problems on ad hoc networks, and significantly reduces the packet loss and the delay experienced by multicast receivers, and increases the maximum throughput that can be delivered to multicast groups.

Journal ArticleDOI
TL;DR: It is shown that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users.

Journal ArticleDOI
TL;DR: A cross-layer framework for enhancing privacy in RFID systems relies on masking of the identifier at the PHY layer, whereby bit-collisions are induced between the backscattered tag identifier and a protective mask, such that a legitimate reader can be allowed to recover the tag identifier but an illegitimate party would not be able to do so.

Journal ArticleDOI
TL;DR: Simulations and real-world experiments provide a comparison to other reference strategies, showing a superior performance of the single-link and multi-link energy-efficient forwarding scheme in terms of energy efficiency.