E-Book, Englisch, Band 7, 417 Seiten
Bonnin / Akan / Bellavista Mobile Wireless Middleware
1. Auflage 2009
ISBN: 978-3-642-01802-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Operating Systems and Applications. Second International Conference, Mobilware 2009, Berlin, Germany, April 28-29, 2009. Proceedings
E-Book, Englisch, Band 7, 417 Seiten
ISBN: 978-3-642-01802-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the thoroughly refereed proceedings of the Second International Conference on MOBILe Wireless MiddleWARE, Mobilware 2009, held in Berlin, Germany, in April 2009. The 29 revised full papers presented were carefully reviewed and selected from 63 contributions. The papers are organized in topical sections on location and tracking supports and services, Location-aware and context-aware mobile support and services.middleware for QoS awareness, adaptation, and fault-tolerance of mobile services, mobility-aware wireless service discovery, management, and delivery, middleware for mobile computing & Intelligent and mobile agent technologies for mobile systems and services, OS/middleware for embedded systems, wearable networks, and personal area networks, mobility management and handoff management in heterogeneous networks.
Autoren/Hrsg.
Weitere Infos & Material
1;Title Page;2
2;Preface;5
3;Organization;7
4;Table of Contents;8
5;A Base Solution for Exposing IMS Telecommunication Services to Web 2.0 Enabled Applications;11
5.1;Introduction;11
5.2;Related Work;13
5.2.1;Widget Engines;13
5.2.2;W3C Widget Standard;13
5.2.3;BONDI;14
5.2.4;Parlay X - Telecommunication API;14
5.3;JavaScript Telecommunication API;15
5.3.1;API;15
5.3.2;Telecommunication Services;15
5.4;Widget Engine;16
5.4.1;Requirements for a Widget Engine with Telecommunication Features;17
5.4.2;Architectural Design;17
5.4.3;Implementation of the Desktop Widget Engine;18
5.4.4;Mobile Version Using Google Android;20
5.4.5;IMS Widgets;21
5.5;Evaluation;21
5.5.1;Call Widget Example;21
5.5.2;Presence and Address Book Example Widget;22
5.5.3;Widgets on Android;23
5.6;Conclusion;24
5.7;References;24
6;FINDR: Low-Cost Indoor Positioning Using FM Radio;25
6.1;Introduction;25
6.2;Related Work;26
6.2.1;Wireless Positioning Techniques;26
6.3;FM Positioning;27
6.3.1;Our Approach;27
6.3.2;Experimental Setup;28
6.4;Results;30
6.4.1;RSSI Dependency on Distance;30
6.4.2;2D Positioning;32
6.4.3;RSSI Stability over Time;33
6.5;Application Scenarios;33
6.6;Conclusion;34
6.7;References;35
7;IEEE 802.21 Assisted Seamless and Energy Efficient Handovers in Mixed Networks;37
7.1;Introduction;37
7.2;Background and Related Work;38
7.2.1;IEEE 802.21 Media Independent Handover;38
7.2.2;Mixed Network Architecture;39
7.2.3;Smart Handover Trigger;40
7.2.4;Cost-Function-Based Media Independent Handover;40
7.3;IEEE 802.21 Assisted Network Selection;41
7.4;Evaluation;43
7.4.1;Network Selection Simulator;43
7.4.2;Performance Analysis;45
7.5;Conclusion;51
7.6;References;52
8;Intelligent Middle-Ware Architecture for Mobile Networks;53
8.1;Introduction;53
8.2;Related Works;56
8.3;Architecture Overview;57
8.3.1;Interface Management;57
8.3.2;Flow Management;59
8.3.3;Application Management;59
8.4;Stake-Holders Policies Awareness;59
8.4.1;Car Manufacturers and Operators Policy Awareness;60
8.4.2;Applications and Final Users Requirements Awareness;61
8.4.3;Mobile Network Administrator Policy Awareness;62
8.5;Context Awareness;63
8.6;Processing Policies and Producing Rules;64
8.7;Conclusion;65
8.8;References;66
9;Middleware Solutions for Self-organizing Multi-hop Multi-path Internet Connectivity Based on Bluetooth;68
9.1;Introduction;68
9.2;Deployment Scenario, Motivations, and Solution Guidelines;70
9.3;The MMHC Architecture;74
9.3.1;Network Interface Provider (NIP);74
9.3.2;Connector Manager (CM);75
9.3.3;Routing Manager (RM);76
9.4;Implementation Insights and Performance Considerations;76
9.5;The MMHC Extensions to the JSR-82 APIs;78
9.6;Conclusions;80
9.7;References;81
10;Location-Based Botany Guide: A Prototype of Web-Based Tracking and Guiding;82
10.1;Introduction;82
10.2;The Location-Based Botany Guide;83
10.2.1;Botanical Domain;84
10.2.2;Interactive Map;85
10.2.3;Botany Guide;86
10.3;Architecture;87
10.3.1;Client;88
10.3.2;Botanical Guiding Web Server;88
10.3.3;Location Server;88
10.3.4;Content Server;89
10.4;Location-Based and Personalized Services;89
10.4.1;User and Context Modeling;89
10.4.2;Location Determination;90
10.4.3;Content Query and Recommendations;91
10.4.4;Personalized Presentation;92
10.5;PrivacyandSecurity;93
10.6;Conclusions and Future Work;94
10.7;References;95
11;Parallel Data Transfer with Voice Calls for Energy-Efficient Mobile Services;97
11.1;Introduction;97
11.2;Interoperability of Mobile Service Data Transfer and Voice Calls;98
11.3;Quantitative Evaluation with Nokia N95;100
11.4;Background of the Phenomenon;102
11.5;Implementation;103
11.5.1;Application Level Implementation;103
11.5.2;Middleware Level Implementation;104
11.6;Discussion;105
11.6.1;Data Transfer Potential During Voice Calls;105
11.6.2;User Experience;106
11.6.3;Limitations;106
11.7;Related Research;107
11.8;Conclusions;108
11.9;References;109
12;Policy-Based Device and Mobility Management;111
12.1;Introduction;111
12.2;Exemplary Use Cases;113
12.3;User-Related Aspects;114
12.4;Architecture;116
12.5;Policy Management;118
12.5.1;Policies;118
12.5.2;Policy Management Layout and Mechanism;119
12.5.3;Policy Definition Language and Examples;119
12.6;Protocols;120
12.6.1;Protocol Operation for Device Recognition and Session Mobility;120
12.6.2;Protocol Operation for Multi-access Flow Distribution;122
12.7;Conclusion;123
12.8;References;124
13;Policy-Based Middleware for QoS Management and Signaling in the Evolved Packet System;125
13.1;Introduction;125
13.2;Evolution of 3GPP Policy Control Framework;126
13.2.1;R5/R6 Service Based Local Policy Architecture;127
13.2.2;R7 PCC Architecture;127
13.2.3;R8 Evolved PCC Architecture;127
13.3;Requirements for End-to-End Evolved 3GPP PCC;129
13.3.1;Inter-domain Solutions;129
13.4;Inter-domain Route Discovery;130
13.4.1;Necessary Assumptions;130
13.4.2;Signaling Path Discovery;131
13.4.3;Bearer Path Discovery;131
13.5;Implementation Experience;134
13.5.1;Metrics of Interest;135
13.5.2;Session Setup Delay;135
13.5.3;Inter-domain Resource Reservation with Application Invocation;136
13.6;Conclusions;137
13.7;References;137
14;Proactive Data Replication Using Semantic Information within Mobility Groups in MANET;139
14.1;Introduction;139
14.2;A Target Application: Wiki over MANETs;140
14.3;State of the Art: Replication Mechanisms for MANETs;141
14.4;Proposal: Stable Neighbourhood and Replication Algorithms;142
14.4.1;Asumptions;142
14.4.2;Stable Neighbourhood Algorithm;143
14.4.3;Replication Algorithms;145
14.4.4;Learning New Interests;147
14.5;Validation;147
14.5.1;Validating the Group Algorithm;148
14.5.2;Validating the Replication Algorithm;150
14.6;Conclusion and Future Work;151
14.7;References;152
15;Scalable Interactive Middleware Components for Ubiquitous Fashionable Computers;154
15.1;Introduction;154
15.2;UbiSpace;156
15.2.1;Tuple Space;156
15.2.2;Limitations of Tuple Space;157
15.2.3;Design and Motivation of UbiSpace;157
15.2.4;Usage Example of UbiSpace;158
15.2.5;Implementation of UbiSpace;158
15.3;Fan Search: Target Selection Algorithm;160
15.3.1;Definition of Fan Search;160
15.3.2;Multiple Interval Query Optimization in B^{+}-tree;161
15.4;Performance Evaluation;162
15.4.1;Tuple Indexing Effect of UbiSpace;162
15.4.2;Fan Search with Space Filling Curves;163
15.5;Related Works;165
15.6;Conclusions;165
15.7;References;166
16;SeDeUse: A Model for Service-Oriented Computing in Dynamic Environments;167
16.1;Introduction;167
16.2;Service-Oriented Computing in Dynamic Environments;168
16.3;Software Mobility in Dynamic Environments;169
16.4;The SeDeUse Model;170
16.4.1;Service Awareness Layer;171
16.4.2;Service Usage Layer;172
16.5;Programming Example;177
16.6;Conclusions and Future Work;178
16.7;References;179
17;The Contextual Map - A Context Model for Detecting Affinity between Contexts;181
17.1;Introduction;181
17.2;Related Work;183
17.3;Background;183
17.3.1;Context-Aware Computing;183
17.3.2;Proximity and Separation Detection in 2-Space;184
17.4;The Contextual Map Model;185
17.4.1;Composition;185
17.4.2;Context Mapping;186
17.5;Application of the Contextual Map;188
17.5.1;Context Boundaries;188
17.5.2;Detecting Affinity of Contexts;189
17.5.3;Update Semantics;190
17.6;Overall Workflow;192
17.7;Conclusion and Outlook;193
17.8;References;194
18;Extending UPnP QoS Standard for Reducing Response Delay in Multimedia Home Networks;195
18.1;Introduction;195
18.2;Quality of Service Extension of the UPnP Standard;197
18.2.1;QoS Architecture Extension;197
18.2.2;Operational Modes;200
18.3;Evaluation Methodology;202
18.3.1;Centralized Topology and Agents;204
18.3.2;Admission Control Functionality;204
18.4;Conclusions and Future Work;205
18.5;References;206
19;Extending an IMS Client with Peer-to-Peer Content Delivery;207
19.1;Introduction;207
19.2;Background;208
19.3;Motivation;210
19.4;Relevant Extensions;211
19.5;Case Study: MONSTER;214
19.6;Conclusions and Future Work;216
19.7;References;216
20;Digital Terrain Model Interpolation for Mobile Devices Using DTED Level 0 Elevation Data;218
20.1;Introduction;218
20.2;Motivation;219
20.3;Digital Terrain Modeling;220
20.4;Locating Maximum and Minimum Points;220
20.4.1;Singular Positioning;221
20.4.2;Circular Positioning;223
20.5;Cell Generation with Interpolation;227
20.6;Results;228
20.7;Conclusion and Future Work;230
20.8;References;230
21;A Mission Management Framework for Unmanned Autonomous Vehicles;232
21.1;Introduction;232
21.2;Security;234
21.3;Failure Management;235
21.3.1;Management Tree;235
21.3.2;Manager UAV’s Algorithm;235
21.3.3;Managed UAV’s Algorithm;236
21.3.4;Failure Detection and Management;237
21.3.5;Intermittent Link Failure;237
21.3.6;Permanent Failures;238
21.4;Communication Management;238
21.4.1;Adapt Movement to Maintain Communication;239
21.4.2;Rendezvous to Restore Communication;239
21.5;Experiments and Results;240
21.5.1;Mission Setup Time;240
21.5.2;Effect of Depth of the Management Tree and Number of Roles;240
21.5.3;Mean Time to Reassign Roles After Failure;241
21.5.4;Evaluation of Communication Management;242
21.6;Related Work;243
21.7;Conclusion;244
21.8;References;244
22;A Quality of Context-Aware Approach to Access Control in Pervasive Environments;246
22.1;Introduction;246
22.2;Proteus QoC-Aware Policy Model;248
22.2.1;Context and Policy Model;249
22.2.2;Quality of Context Model;250
22.2.3;Context and QoC Representation;251
22.3;Policy Management in Proteus;252
22.3.1;Policy, Context and QoC Specification;253
22.3.2;QoC-Based Policy Evaluation;253
22.4;Proteus Middleware Architecture;254
22.4.1;Implementation Details;255
22.5;Evaluating QoC-Aware Access Control in a Pervasive Scenario;257
22.5.1;Performance Evaluation;258
22.6;Related Work;259
22.7;Conclusions and Future Work;260
22.8;References;261
23;A Service-Oriented Framework Supporting Ubiquitous Disaster Response;262
23.1;Introduction;262
23.2;Proposed Technological Framework;264
23.3;Related Work;266
23.3.1;State-of-Art DR Projects;266
23.3.2;Ubiquitous Peer-to-Peer Sharing of Services;267
23.3.3;Web Services on Resource-Constrained Devices;268
23.4;The JXTA-SOAP Component;269
23.4.1;JXTA-SOAP for Java Standard Edition (J2SE);270
23.4.2;JXTA-SOAP for Java Micro Edition (J2ME);271
23.5;Example DR Application;272
23.6;Conclusions and Future Work;273
23.7;References;273
24;An Analysis of Navigation Algorithms for Smartphones Using J2ME;276
24.1;Introduction;276
24.2;Autonomous Navigation;277
24.2.1;Localization - “Where Am I?”;277
24.2.2;Mapping - “Where Am I Going?”;278
24.2.3;Path Planning - “How Do I Get There?”;278
24.3;Prototype and Navigation Algorithms Considered;278
24.3.1;Prototype;279
24.3.2;NXT Middleware;279
24.3.3;Visual Landmark Recognition;280
24.3.4;Particle Filter;281
24.3.5;Potential Fields;282
24.4;Experimental Results;282
24.4.1;Mapping;283
24.4.2;Localization;284
24.4.3;Path Planning;286
24.5;Conclusions;288
24.6;References;288
25;An IMS-Based Middleware Solution for Energy-Efficient and Cost-Effective Mobile Multimedia Services;290
25.1;Introduction;290
25.2;Background and Related Work;291
25.2.1;Background about IMS;292
25.2.2;Related Work;294
25.3;Power Management in Our IHMAS Infrastructure;294
25.4;IHMAS Power Management Facility: Protocol Design and Implementation Insights;296
25.4.1;IHMAS Session Signaling for Power Management;296
25.4.2;Implementation Insights;298
25.5;Experimental Results;300
25.6;Conclusions and Future Work;302
25.7;References;303
26;Announcement/Subscription/Publication: Message Based Communication for Heterogeneous Mobile Environments;305
26.1;Introduction;305
26.2;Application Scenarios;306
26.3;Related Work and Problem Description;307
26.4;Contribution;308
26.4.1;The System Architecture;308
26.4.2;The Announcement Phase;310
26.4.3;The Subscription Phase;311
26.4.4;The Publication Phase;312
26.4.5;Requirements for a Scenario;312
26.5;Evaluation;313
26.5.1;Simulation Scenario and Methodology;313
26.5.2;Completeness;314
26.5.3;Network Load;316
26.6;Conclusion;317
26.6.1;Benefits;317
26.6.2;Shortcomings;317
26.6.3;Future Work;317
26.7;References;318
27;Building a Personal Symbolic Space Model from GSM CellID Positioning Data;319
27.1;From Position to Location, to Space Models, to Context;319
27.2;Positioning Model;321
27.2.1;Movement Tracking;322
27.2.2;Movement Tracking Validation;323
27.3;Personal Symbolic Space Model;324
27.3.1;Place Definition;324
27.3.2;Familiarity Index;327
27.4;Results;327
27.4.1;Data Collection;327
27.4.2;Clustering Process Parameters;328
27.4.3;Trial Users’ Results;328
27.4.4;Using the Personal Symbolic Space Model (PSSM);331
27.5;Related Work;332
27.6;Conclusions;333
27.7;References;333
28;Chapar: A Cross-Layer Overlay Event System for MANETs;335
28.1;Introduction;335
28.2;Requirements and Definitions;336
28.3;Related Work;337
28.4;Chapar Data Structures and Algorithms;338
28.4.1;Tables and Data Structures;338
28.4.2;Chapar Functions and Algorithms;339
28.5;Chapar Evaluation and Performance Analysis;344
28.5.1;Functionality Analysis;344
28.5.2;Resource Awareness;345
28.6;Conclusion;348
28.7;References;348
29;Context Aware Multiparty Session Support for Adaptive Multicasting in Heterogeneous Mobile Networks;350
29.1;Introduction$^{1}$;350
29.2;Motivation;351
29.2.1;Context in Networking;351
29.2.2;Adaptive Multicasting Service Scenario;352
29.2.3;Related Work;353
29.2.4;Generic System Model and Open Issues;354
29.3;Defining an Adaptive Multiparty Session Management;355
29.3.1;Context-Aware Session Management Overview;355
29.3.2;Technical Requirements;356
29.3.3;Adaptivity in Session Manager: Forming Subgroups;356
29.4;Conclusions;360
29.5;References;361
30;Context Inference for Mobile Applications in the UPCASE Project;362
30.1;Introduction;362
30.2;Background and Related Work;363
30.3;The UPCASE Project;364
30.3.1;System Sensors and Prototype;365
30.3.2;System Sensors and Prototype;366
30.3.3;Sensor Data Acquisition;367
30.3.4;Preprocessing;367
30.4;Context Inference in the UPCASE Project;368
30.4.1;Context Inference with Decision Trees;369
30.4.2;Application Layer;370
30.4.3;Learning Mode;370
30.4.4;Context Server;371
30.5;Case-Study Scenarios;372
30.5.1;Elderly Care;372
30.5.2;Emergency Management;373
30.6;Conclusion;373
30.7;References;374
31;Design, Implementation and Case Study of WISEMAN: WIreless Sensors Employing Mobile AgeNts;376
31.1;Introduction;376
31.2;System Foundations;378
31.3;The Wiseman System Architecture;378
31.4;Language Constructs;380
31.4.1;Variables;380
31.4.2;Operators;381
31.4.3;Rules;381
31.4.4;Delimiters;382
31.5;Practical Implementation Aspects;382
31.6;An Example Application: Early Detection of Forest Fires;384
31.6.1;Rationale;384
31.6.2;Experimental Setup;385
31.7;Experiment Results;388
31.8;Conclusions;389
31.9;References;389
32;Developing and Benchmarking Native Linux Applications on Android;391
32.1;Introduction;391
32.2;Android;392
32.3;Software Engineering Aspects of Android;393
32.3.1;Android Java Application Development;393
32.3.2;Android Linux Application Development;394
32.3.3;Important Facts for Native Development;395
32.3.4;Bridging between Java and Linux;396
32.4;Software Performance on Android;397
32.4.1;Performance Evaluation;398
32.5;Conclusion and Future Work;401
32.6;References;401
33;Towards an Opportunistic and Location-Aware Service Provision in Disconnected Mobile Ad Hoc Networks;403
33.1;Introduction;403
33.2;Location Framework;404
33.2.1;Location Requirements for Opportunistic Service Provision;404
33.2.2;Location Modelling;406
33.2.3;Location Determination Method;407
33.2.4;Maps Projection and Environment Modelling;408
33.3;Middleware Support for Location-Aware Application Services;409
33.3.1;Location Information and Service Message Structure;409
33.3.2;LocationManagement in the Service Management Middleware Layer;410
33.3.3;Exploitation of Location InformationWhile Routing;412
33.4;Evaluations;412
33.5;Related Work;414
33.6;Conclusion and Future Work;415
33.7;References;415
34;Author Index;417




