The Community for Technology Leaders
Proceedings. The IEEE/ACS International Conference on Pervasive Services (2004)
Beirut, Lebanon
July 23, 2004 to July 23, 2004
ISBN: 0-7803-8577-2
TABLE OF CONTENTS

Autonomic computing: research challenges and opportunities (PDF)

S. Hariri , High Performance Comput. (HPDC) Lab., Arizona Univ., USA
pp. 7

Privacy-preserving location-dependent query processing (PDF)

M.J. Atallah , CERIAS & Comput. Sci. Dept., Purdue Univ., West Lafayette, IN, USA
K.B. Frikken , CERIAS & Comput. Sci. Dept., Purdue Univ., West Lafayette, IN, USA
pp. 9-17

Wireless smart implants dedicated to multichannel monitoring and microstimulation (PDF)

M. Sawan , PolySTIM Neurotechnology Lab., Ecole Polytechnique de Montreal, Que., Canada
pp. 21-26

A programmable structure for pervasive computing (PDF)

I.M. Arntzen , Dept. of Comput. Sci., Tromso Univ., Norway
D. Johansen , Dept. of Comput. Sci., Tromso Univ., Norway
pp. 29-38

Context-aware computing: a guide for the pervasive computing community (PDF)

G.K. Mostefaoui , Software Eng. Group, Fribourg Univ., Switzerland
J. Pasquier-Rocha , Software Eng. Group, Fribourg Univ., Switzerland
pp. 39-48

PALLAS: a querying interface for pervasive computing using handheld devices (PDF)

S. Polyviou , Cyprus Univ., Cyprus
P. Evripidou , Cyprus Univ., Cyprus
G. Samaras , Cyprus Univ., Cyprus
pp. 49-58

An acoustic identification scheme for location systems (PDF)

R. Jurdak , Sch. of Inf. & Comput. Sci., California Univ., Irvine, CA, USA
C.V. Lopes , Sch. of Inf. & Comput. Sci., California Univ., Irvine, CA, USA
P. Baldi , Sch. of Inf. & Comput. Sci., California Univ., Irvine, CA, USA
pp. 61-70

Context aware service provisioning (PDF)

S.K. Mostefaoui , Pervasive & Artificial Intelligence Group, Fribourg Univ., Switzerland
B. Hirsbrunner , Pervasive & Artificial Intelligence Group, Fribourg Univ., Switzerland
pp. 71-80

Next generation vehicle network (NGVN): Internet access utilizing dynamic discovery protocols (PDF)

R. Baroody , Univ. of Detroit Mercy, MI, USA
A. Rashid , Univ. of Detroit Mercy, MI, USA
N. Al-Holou , Univ. of Detroit Mercy, MI, USA
S. Hariri , Univ. of Detroit Mercy, MI, USA
pp. 81-88

A dynamic honeypot design for intrusion detection (PDF)

I. Kuwatly , Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
M. Sraj , Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
Z. Al Masri , Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
H. Artail , Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
pp. 95-104

Abnormality metrics to detect and protect against network attacks (PDF)

Guangzhi Qu , ITL Lab., Arizona Univ., AZ, USA
S. Hariri , ITL Lab., Arizona Univ., AZ, USA
S. Jangiti , ITL Lab., Arizona Univ., AZ, USA
S. Hussain , ITL Lab., Arizona Univ., AZ, USA
Seungchan Oh , ITL Lab., Arizona Univ., AZ, USA
S. Fayssal , ITL Lab., Arizona Univ., AZ, USA
pp. 105-111

TRUMMAR - a trust model for mobile agent systems based on reputation (PDF)

G. Derbas , Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
A. Kayssi , Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
H. Artail , Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
A. Chehab , Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
pp. 113-120

Reconfigurable computing for RC6 cryptography (PDF)

M. Itani , Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
H. Diab , Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
pp. 121-127

Design principles for inducing reactivity in ubiquitous environments (PDF)

F. Al-Bin-Ali , Dept. of Comput. Sci., Arizona Univ., Tucson, AZ, USA
pp. 131-139

The use of a Hopfield neural network in solving the mobility management problem (PDF)

J. Taheri , Sch. of Inf. Technol., Sydney Univ., NSW, Australia
A.Y. Zomaya , Sch. of Inf. Technol., Sydney Univ., NSW, Australia
pp. 141-150

An intelligent interface for the dynamic negotiation of QoS in Arcade (PDF)

Z. Jrad , LIPN Lab., Paris XIII Univ., Villetaneuse, France
F. Krief , LIPN Lab., Paris XIII Univ., Villetaneuse, France
pp. 151-160

Keynote III (PDF)

pp. 161

Reconfigurable supercomputing (PDF)

T. El-Ghazawi , George Washington Univ., Washington, DC, USA
pp. 163

Analysis of wired short cuts in wireless sensor networks (PDF)

R. Chitradurga , Dept. of Electr. Eng., Southern California Univ., Los Angeles, CA, USA
A. Helmy , Dept. of Electr. Eng., Southern California Univ., Los Angeles, CA, USA
pp. 167-177

RUGGED: routing on fingerprint gradients in sensor networks (PDF)

J. Faruque , Dept. of Electr. Eng., Southern California Univ., Los Angeles, CA, USA
A. Helmy , Dept. of Electr. Eng., Southern California Univ., Los Angeles, CA, USA
pp. 179-188

Internet performance modeling using mixture dynamical system models (PDF)

Z. Liu , Moncton Univ., NB, Canada
J. Almhana , Moncton Univ., NB, Canada
V. Choulakian , Moncton Univ., NB, Canada
pp. 189-198

A scalable high-performance router platform supporting dynamic service extensibility on network and host processors (PDF)

L. Ruf , Comput. Eng. & Networks Lab., Swiss Fed. Inst. of Technol. (ETH), Zurich, Switzerland
R. Keller , Comput. Eng. & Networks Lab., Swiss Fed. Inst. of Technol. (ETH), Zurich, Switzerland
B. Planner , Comput. Eng. & Networks Lab., Swiss Fed. Inst. of Technol. (ETH), Zurich, Switzerland
pp. 199-206

Hybrid cache invalidation schemes in mobile environments (PDF)

Yuliang Bao , ADSA Lab & Dept. of Comput. Sci., Calgary Univ., Alta., Canada
R. Alhajj , ADSA Lab & Dept. of Comput. Sci., Calgary Univ., Alta., Canada
K. Barker , ADSA Lab & Dept. of Comput. Sci., Calgary Univ., Alta., Canada
pp. 209-218

Opportunistic application flows in pervasive environments (PDF)

N. Jiang , Rutgers Univ., USA
C. Schmidt , Rutgers Univ., USA
V. Matossian , Rutgers Univ., USA
M. Parashar , Rutgers Univ., USA
pp. 219

A distributed framework for relaying stereo vision for telerobotics (PDF)

M. Al-Mouhamed , Dept. of Comput. Eng., King Fahd Univ. of Pet. & Minerals, Dhahran, Saudi Arabia
pp. 221-225

Towards a unified graph-based framework for dynamic component-based architectures description in Z (PDF)

I. Loulou , Lab. LARIS, Sfax Univ., Tunisia
A.H. Kacem , Lab. LARIS, Sfax Univ., Tunisia
M. Jmaiel , Lab. LARIS, Sfax Univ., Tunisia
pp. 227-234

Popsters (PDF)

pp. 235

Modeling Jini-UPnP Bridge using Rapide ADL (PDF)

A. Sameh , Dept. of Comput. Eng., George Washington Univ., DC, USA
pp. 237

Secure pervasive computing without a trusted third party (PDF)

A.A. Pirzada , Sch. of Comput. Sci. & Software Eng., Western Australia Univ., Australia
C. McDonald , Sch. of Comput. Sci. & Software Eng., Western Australia Univ., Australia
pp. 240

Middies: passive middleware abstractions for pervasive computing environments (PDF)

D. Cutting , Sydney Univ., NSW, Australia
A. Hudson , Sydney Univ., NSW, Australia
A. Quigley , Sydney Univ., NSW, Australia
pp. 241

Self-deployment and self-configuration of pervasive network services (PDF)

Huoping Chen , Dept. of Electr. & Comput. Eng., Arizona Univ., USA
S. Hariri , Dept. of Electr. & Comput. Eng., Arizona Univ., USA
Byoung Kim , Dept. of Electr. & Comput. Eng., Arizona Univ., USA
Yeliang Zhang , Dept. of Electr. & Comput. Eng., Arizona Univ., USA
pp. 242
91 ms
(Ver 3.3 (11022016))