52,158 research outputs found

    Analysis of pervasive mobile ad hoc routing protocols

    Get PDF
    Pervasive computing (also referred to as ubiquitous computing or ambient intelligence) aims to create environments where computers are invisibly and seamlessly integrated and connected into our everyday environment. Pervasive computing and intelligent multimedia technologies are becoming increasingly important, although many potential applications have not yet been fully realized. These key technologies are creating a multimedia revolution that will have significant impact across a wide spectrum of consumer, business, healthcare, and governmental domains. This useful volume provides up-to-date and state-of-the-art coverage of the diverse topics related to pervasive computing and intelligent multimedia technologies. The use of different computational intelligence-based approaches to various problems in pervasive computing are examined, including video streaming, intelligent behavior modeling and control for mobile manipulators, tele-gaming, indexing video summaries for quick video browsing, web service processes, virtual environments, ambient intelligence, and prevention and detection of attacks to ubiquitous databases. Topics and features: -Includes a comprehensive overview, providing a thorough literature review and an outline of the important research challenges -Discusses pervasive computing approaches in the context of intelligent multimedia -Examines virtual reality technology, mobile virtual environments, and the potential use of intelligent multimedia and ubiquitous computing in the hotels of the future -Describes various approaches in ambient intelligence for home health care for the elderly and those suffering from Alzheimer’s disease, for volcano monitoring, and for preventing attacks to ubiquitous databases Investigates issues in web services and situation awareness in pervasive computing environments -Explores wireless network applications, such as mobile agents and e-commerce

    Balancing smartness and privacy for the Ambient Intelligence

    Get PDF
    Ambient Intelligence (AmI) will introduce large privacy risks. Stored context histories are vulnerable for unauthorized disclosure, thus unlimited storing of privacy-sensitive context data is not desirable from the privacy viewpoint. However, high quality and quantity of data enable smartness for the AmI, while less and coarse data benefit privacy. This raises a very important problem to the AmI, that is, how to balance the smartness and privacy requirements in an ambient world. In this article, we propose to give to donors the control over the life cycle of their context data, so that users themselves can balance their needs and wishes in terms of smartness and privacy

    Delivering real-world ubiquitous location systems

    Get PDF
    Location-enhanced applications are poised to become the first real-world example of ubiquitous computing. In this paper, we emphasize the practical aspects of getting location-enhanced applications deployed on existing devices, such as laptops, tablets, PDAs, and cell phones, without the need to purchase additional sensors or install special infrastructure. Our goal is to provide readers with an overview of the practical considerations that are currently being faced, and the research challenges that lie ahead. We ground the article with a summary of initial work on two deployments of location- enhanced computing: multi-player location-based games and a guide for the Edinburgh Festival

    Data degradation to enhance privacy for the Ambient Intelligence

    Get PDF
    Increasing research in ubiquitous computing techniques towards the development of an Ambient Intelligence raises issues regarding privacy. To gain the required data needed to enable application in this Ambient Intelligence to offer smart services to users, sensors will monitor users' behavior to fill personal context histories. Those context histories will be stored on database/information systems which we consider as honest: they can be trusted now, but might be subject to attacks in the future. Making this assumption implies that protecting context histories by means of access control might be not enough. To reduce the impact of possible attacks, we propose to use limited retention techniques. In our approach, we present applications a degraded set of data with a retention delay attached to it which matches both application requirements and users privacy wishes. Data degradation can be twofold: the accuracy of context data can be lowered such that the less privacy sensitive parts are retained, and context data can be transformed such that only particular abilities for application remain available. Retention periods can be specified to trigger irreversible removal of the context data from the system

    Secret charing vs. encryption-based techniques for privacy preserving data mining

    Get PDF
    Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data mining researchers to investigate privacy implications of data mining and how data mining can be performed without violating privacy. In this paper, we first provide an overview of privacy preserving data mining focusing on distributed data sources, then we compare two technologies used in privacy preserving data mining. The first technology is encryption based, and it is used in earlier approaches. The second technology is secret-sharing which is recently being considered as a more efficient approach

    Towards Knowledge in the Cloud

    Get PDF
    Knowledge in the form of semantic data is becoming more and more ubiquitous, and the need for scalable, dynamic systems to support collaborative work with such distributed, heterogeneous knowledge arises. We extend the “data in the cloud” approach that is emerging today to “knowledge in the cloud”, with support for handling semantic information, organizing and finding it efficiently and providing reasoning and quality support. Both the life sciences and emergency response fields are identified as strong potential beneficiaries of having ”knowledge in the cloud”

    Implanting Life-Cycle Privacy Policies in a Context Database

    Get PDF
    Ambient intelligence (AmI) environments continuously monitor surrounding individuals' context (e.g., location, activity, etc.) to make existing applications smarter, i.e., make decision without requiring user interaction. Such AmI smartness ability is tightly coupled to quantity and quality of the available (past and present) context. However, context is often linked to an individual (e.g., location of a given person) and as such falls under privacy directives. The goal of this paper is to enable the difficult wedding of privacy (automatically fulfilling users' privacy whishes) and smartness in the AmI. interestingly, privacy requirements in the AmI are different from traditional environments, where systems usually manage durable data (e.g., medical or banking information), collected and updated trustfully either by the donor herself, her doctor, or an employee of her bank. Therefore, proper information disclosure to third parties constitutes a major privacy concern in the traditional studies
    corecore