Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology recedes in the background of everyday a...
详细信息
Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology recedes in the background of everyday activities. The ubiquitous computing world then, is a world largely defined by applications. But such applications present an altogether new set of requirements. The special track on ubiquitous computing applications, first introduced in acm SAC 2004, provides a forum for the discussion of all types of ubiquitous computing applications and related specialized infrastructures built for the deployment of targeted applications. Individual papers place applications within their use context and introduce novel and appropriate interaction paradigms while at the same time addressing related technical and business aspects and consequently identify novel opportunities or constraints.
This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agent-based network security approach. MAST has been designed to support flexible and customizable ne...
详细信息
ISBN:
(纸本)9781581138122
This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agent-based network security approach. MAST has been designed to support flexible and customizable network security tasks and training. This paper focuses on the implementation details and security aspects of MAST's components, services, and mobile-agent architecture.
In this paper, we propose a new index structure for object-oriented databases. The main idea of this is a graph structure, called a signature graph, which is constructed over a signature file generated for a class and...
详细信息
In this paper, we propose a new index structure for object-oriented databases. The main idea of this is a graph structure, called a signature graph, which is constructed over a signature file generated for a class and improves the search of a signature file dramatically. In addition, the signature files (accordingly, the signature graphs) can be organized into a hierarchy according to the nested structure (called the aggregation hierarchy) of classes in an object-oriented database, which leads to another significant improvements.
Context-awareness is a key concept in ubiquitous computing, which sometimes seems to be a technology looking for a purpose. In this paper we report on the application of context-aware computing for medical work in hos...
详细信息
Context-awareness is a key concept in ubiquitous computing, which sometimes seems to be a technology looking for a purpose. In this paper we report on the application of context-aware computing for medical work in hospitals, which has appeared to be a strong case for applying context-aware computing. We present the design of a context-aware pill container and a context-aware hospital bed, both of which reacts and adapts according to what is happening in their context. The applications have been evaluated in a number of workshop with clinicians and patients. Based on this empirical work of designing, developing, and evaluating context-aware clinical applications, the paper outlines some key design principles for a context-awareness framework, supporting the development and deployment of context-aware clinical computer applications.
Mobile computing allows for the development of new and sophisticated database applications. Such applications require the reading of current and consistent data. In order to improve data availability, increase perform...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Mobile computing allows for the development of new and sophisticated database applications. Such applications require the reading of current and consistent data. In order to improve data availability, increase performance and maximize throughput, data replication is used. However, due to inherent limitations in mobile and other loosely-coupled environments, the concurrency control and replica control mechanisms must be revisited. This paper proposes a new protocol that guarantees the consistency of replicated data in a mobile computing environment, while provide high data availability and ensure an eventual replica convergence towards a strongly consistent state. Copyright 2007 acm.
Ubiquitous computing bears a high potential in the area of aircraft maintenance. Extensive requirements regarding quality, safety, and documentation as well as high costs for having aircrafts idle during maintenance d...
详细信息
ISBN:
(纸本)9781581138122
Ubiquitous computing bears a high potential in the area of aircraft maintenance. Extensive requirements regarding quality, safety, and documentation as well as high costs for having aircrafts idle during maintenance demand for an efficient execution of the process. Major weaknesses that impact the efficiency of the process are an inadequate tool management, human errors, and labour intensive manual documentation and check procedures. In this paper we propose a solution using ubiquitous computing technologies that improves aircraft maintenance and provides a high level of usability. A scenario, a systems architecture, and maintenance applications are presented. The Smart Toolbox and the Smart Tool Inventory were implemented as proof of concept.
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from other related proxy signature schemes ...
详细信息
ISBN:
(纸本)9781581138122
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from other related proxy signature schemes in that in addition to providing confidentiality protection to the proxy key, the method provides non-repudiation services to all the parties involved. In particular, it protects against repudiation of signature delegation by the original signer, repudiation of proxy signature generation by the proxy signer, and repudiation of receipt of the proxy signature by the signature recipient. This feature is attractive for signature delegation in agent-based paradigm in which proxy signers are mobile agents that are executed in remote untrustworthy hosts.
The efficient execution of a method has a great impact on a system response time. Optimising access to data returned by methods is difficult as methods are written in high-level programming languages. Moreover, estima...
详细信息
ISBN:
(纸本)9781581138122
The efficient execution of a method has a great impact on a system response time. Optimising access to data returned by methods is difficult as methods are written in high-level programming languages. Moreover, estimating a method's execution cost is another serious problem because of the complexity of a method's code. A promising technique to tackle the problem of optimising execution of methods is based on method materialisation, Within our project we developed, so called, hierarchical method materialisation technique. In this paper we present a prototype system for hierarchical materialisation of methods and for the management of their results in an object-oriented database.
The article presents a list of papers, courses and magazines downloaded, in July 2005, from the Association of computing Machinery's digital library. Some of the papers that were downloaded are: "Architecture...
详细信息
The article presents a list of papers, courses and magazines downloaded, in July 2005, from the Association of computing Machinery's digital library. Some of the papers that were downloaded are: "Architectures for a Temporal Workflow Management System," by Carlo Combi, Giuseppe Pozzi and published in the March 2004 issue of the journal "proceedings of the 2004acmsymposium on appliedcomputing"; and "The Google File System," by Sanjay Ghemawat, Howard Gobioff and Shun-Tak Leung and published in the October 2003 issue of the journal "proceedings of the 19th acmsymposium on Operating Systems Principles." Some of the courses that were downloaded are: Introduction to the Java Programming Language; UML Fundamentals; Data Modeling; Beginning to Program With the Java Programming Language; Project Management: Initiation and Plan Launch; and Basic Programming in C.
暂无评论