The Community for Technology Leaders
Pervasive Services, IEEE/ACS International Conference on (2004)
American University of Beirut (AUB), Lebanon
July 19, 2004 to July 23, 2004
ISBN: 0-7803-8577-2
TABLE OF CONTENTS
Session 1: Invited Papers
Keynote I
Session 1: Invited Papers

Privacy-Preserving Location-Dependent Query Processing (Abstract)

Mikhail J. Atallah , West Lafayette, IN
Keith B. Frikken , West Lafayette, IN
pp. 9-17
Session 2: Pervasive Services

A Programmable Structure for Pervasive Computing (Abstract)

Ingar Maehlum Arntzen , University of Troms?, Norway
Dag Johansen , University of Troms?, Norway
pp. 29-38

Context-Aware Computing: A Guide for the Pervasive Computing Community (Abstract)

Ghita Kouadri Most?faoui , University of Fribourg, Switzerland
Jacques Pasquier-Rocha , University of Fribourg, Switzerland
Patrick Br?zillon , University of Paris VI, France
pp. 39-48

PALLAS: A Querying Interface for Pervasive Computing using Handheld Devices (Abstract)

Paraskevas Evripidou , University of Cyprus
George Samaras , University of Cyprus
Stavros Polyviou , University of Cyprus
pp. 49-58
Session 3: Discovery

An Acoustic Identification Scheme for Location Systems (Abstract)

Pierre Baldi , California Institute for Telecomm. and Information Technology Cal-(IT)
Cristina Videira Lopes , UCI/School of Information and Computer Science
Raja Jurdak , UCI/School of Information and Computer Science
pp. 61-70

Context Aware Service Provisioning (Abstract)

Soraya Kouadri Most?faoui , University of Fribourg, Switzerland
B?at Hirsbrunner , University of Fribourg, Switzerland
pp. 71-80

Next Generation Vehicle Network (NGVN): Internet Access Utilizing Dynamic Discovery Protocols (Abstract)

Asif Rashid , University of Detroit Mercy
Rami Baroody , University of Detroit Mercy
Salim Hariri , University of Detroit Mercy
Nizar Al-Holou , University of Detroit Mercy
pp. 81-88
Keynote II
Session 4: Security

A Dynamic Honeypot Design for Intrusion Detection (Abstract)

Zaid Al Masri , American University of Beirut, Lebanon
Malek Sraj , American University of Beirut, Lebanon
Iyad Kuwatly , American University of Beirut, Lebanon
Hassan Artail , American University of Beirut, Lebanon
pp. 95-104

Abnormality Metrics to Detect and Protect against Network Attacks (Abstract)

Seungchan Oh , ITL Lab, the University of Arizona
Salim Hariri , ITL Lab, the University of Arizona
Santosh Jangiti , ITL Lab, the University of Arizona
Suhail Hussain , ITL Lab, the University of Arizona
Guangzhi Qu , ITL Lab, the University of Arizona
Samer Fayssal , ITL Lab, the University of Arizona
Mazin Yousif , Intel Corporation, USA
pp. 105-111

TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation (Abstract)

Ali Chehab , American University of Beirut, Lebanon
Hassan Artail , American University of Beirut, Lebanon
Ghada Derbas , American University of Beirut, Lebanon
Ayman Kayssi , American University of Beirut, Lebanon
pp. 113-120

Reconfigurable Computing for RC6 Cryptography (Abstract)

Hassan Diab , American University of Beirut, Lebanon
May Itani , American University of Beirut, Lebanon
pp. 121-127
Session 5: Management

Design Principles for Inducing Reactivity in Ubiquitous Environments (Abstract)

Fahd Al-Bin-Ali , The University of Arizona, Tucson
pp. 131-139

The Use of a Hopfield Neural Network in Solving the Mobility Management Problem (Abstract)

Javid Taheri , The University of Sydney, Australia
Albert Y. Zomaya , The University of Sydney, Australia
pp. 141-150

An Intelligent Interface for the Dynamic Negotiation of QoS in ARCADE (Abstract)

Francine Krief , University of Paris XIII, France
Zeina Jrad , University of Paris XIII, France
pp. 151-160
Panel Session
Keynote III

Reconfigurable Supercomputing (PDF)

Tarek El-Ghazawi , The George Washington University
pp. 163
Session 6: Network Sensors and Performance

Analysis of Wired Short Cuts in Wireless Sensor Networks (Abstract)

Rohan Chitradurga , University of Southern California, Los Angeles
Ahmed Helmy , University of Southern California, Los Angeles
pp. 167-176

RUGGED: RoUting on finGerprint Gradients in sEnsor Networks (Abstract)

Jabed Faruque , University of Southern California, Los Angeles
Ahmed Helmy , University of Southern California, Los Angeles
pp. 179-188

Internet Performance Modeling Using Mixture Dynamical System Models (Abstract)

R. McGorman , Nortel Networks, North Carolina
Z. Liu , University of Moncton, Canada
J. Almhana , University of Moncton, Canada
V. Choulakian , University of Moncton, Canada
pp. 189-198

A Scalable High-performance Router Platform Supporting Dynamic Service Extensibility On Network and Host Processors (Abstract)

Lukas Ruf , Swiss Federal Institute of Technology (ETH), Switzerland
Ralph Keller , Swiss Federal Institute of Technology (ETH), Switzerland
Bernhard Plattner , Swiss Federal Institute of Technology (ETH), Switzerland
pp. 199-206
Session 7: Miscellaneous

Hybrid Cache Invalidation Schemes in Mobile Environments (Abstract)

Yuliang Bao , University of Calgary, Canada
Reda Alhajj , University of Calgary, Canada
Ken Barker , University of Calgary, Canada
pp. 209-218

Opportunistic Application Flows in Pervasive Environments (PDF)

V. Matossian , Rutgers University, USA
M. Parashar , Rutgers University, USA
C. Schmidt , Rutgers University, USA
N. Jiang , Rutgers University, USA
pp. 219

A Distributed Framework for Relaying Stereo Vision for Telerobotics (Abstract)

O. Toker , King Fahd University of petroleum & Minerals, Kingdom of Saudi Arabia
A. Iqbal , King Fahd University of petroleum & Minerals, Kingdom of Saudi Arabia
M. Nazeeruddin , King Fahd University of petroleum & Minerals, Kingdom of Saudi Arabia
M. Al-Mouhamed , King Fahd University of petroleum & Minerals, Kingdom of Saudi Arabia
pp. 221-225

Towards a Unified Graph-Based Framework for Dynamic Component-Based Architectures Description in Z (Abstract)

Ahmed Hadj Kacem , University of Sfax, Tunisia
Imen Loulou , University of Sfax, Tunisia
Khalil Drira , LAAS-CNRS, France
Mohamed Jmaiel , University of Sfax, Tunisia
pp. 227-234
Poster Session

Modeling Jini-UPnP Bridge using Rapide ADL (PDF)

Rehab El-Kharboutly , The American University in Cairo, Egypt
Ahmed Sameh , The George Washington University, Washington, DC
pp. 237

A Method of Capturing System Stableness Degree in Resource Discovery and Interaction (PDF)

Hou Yibin , Beijing University of Technology, China
Tang Shancheng , Xi?an Jiaotong University, Xi'an, China
pp. 239

Secure Pervasive Computing without a Trusted Third Party (PDF)

Asad Amir Pirzada , The University of Western Australia
Chris McDonald , The University of Western Australia
pp. 240

Middies: Passive Middleware Abstractions for Pervasive Computing Environments (PDF)

Daniel Cutting , University of Sydney, Australia
Adam Hudson , University of Sydney, Australia
Aaron Quigley , University of Sydney, Australia
pp. 241

Self-Deployment and Self-Configuration of Pervasive Network Services (PDF)

Yeliang Zhang , University of Arizona
Byoung Kim , University of Arizona
Huoping Chen , University of Arizona
Salim Hariri , University of Arizona
Mazin Yousif , Intel Corporation, USA
pp. 242

Author Index (PDF)

pp. 243
112 ms
(Ver )