This tutorial provides a gentle introduction to the important issues in mobile computing, addressing both advantages and challenges of this hot research area.
Abstract:
The widespread use of mobile computing devices has changed the way
people compute and vastly expanded research areas in distributed
computing and networking. In fact, traditional distributed computing is
actually a subset of the broad area of mobile computing. Many topics in
"mature" areas like distributed databases, distributed fault tolerance,
and resource management now require much additional study, because many
traditional assumptions are challenged. Mobile computers operate in
more hostile environments, are resource-constrained (limited power,
frequent disconnection), and are peripheral-poor. This tutorial
provides an introduction to mobile computing, including a survey of
representative technologies, the promises and challenges, and research
areas. It will also briefly cover several interesting mobile computing
topics, including Mobile-IP, data dissemination, and resource
management. The goal is that a participant in the tutorial will leave
with a conversational level of knowledge about mobile computing, be
aware of the important issues, and know where to find further
information about topics of interest. The Mobile Computing II tutorial
will examine two important areas, sensor networks and service discovery,
in greater detail.
Intended Audience:
This tutorial will appeal to anyone interested in a gentle introduction to
mobile computing. No significant background in mobile computing is
assumed. A basic background in computer science, especially distributed
systems and networking, is recommended.
Outline:
Biographies of speakers:
See Tutorial 3.
This tutorial provides an overview of the state of the art in computer security and then examines the specific problems introduced by mobile devices and wireless network access. No experience in computer security is assumed.
Abstract:
The growth in the popularity of laptop and handheld
devices, coupled with the increase in use of wireless technologies, is
driving mobile computing closer to the ubiquitous presence
predicted by early visionaries. The downside to the readily available
technology is that it is equally accessible to adversaries for use
against us. Thus there is a growing need for better security for
mobile computing. This tutorial surveys some of the
general issues in computer security, then focuses on the security
mechanisms available for several popular mobile technologies.
Intended Audience:
This tutorial will appeal to a broad audience, including students,
developers, and researchers interested in mobile security. An
introduction to security issues (applicable to both wire-based and
wireless systems), as well as the wireless technologies and protocols
will be provided, so anyone with a basic computer science background
should find this tutorial approachable.
Broad Overview of the Tutorial
Biography of speaker:
Dr. Frank Adelstein is currently employed by Odyssey Research
Associates (ORA) in Ithaca, NY. Since joining ORA at the beginning of
1999, Dr. Adelstein has been involved in many computer security
projects, including intrusion detection with computational immunology
and computer forensics using automated reasoning. He has participated
in Red Team exercises, as well as the penetration testing of the
security of a Fortune 500 company. He has also conducted research in
wireless security on a project to provide multipolicy information
assurance for microsensor, autonomous wireless local area networks.
His current research in computer security involves increasing the
effectivenes of techniques to correlate reconnaissance probes and
attacks.
Prior to joining ORA, Dr. Adelstein was a postdoctoral associate with the Cornell Computer Science Department, working for the Xerox Design Research Institute (DRI). At DRI, he was the primary contributor for projects involving the integration of heterogeneous database resources and the creation of a web-based metadata repository. His PhD work involved protocols for real-time data, as well as formulating metrics for describing multicast efficiency.
Abstract:
This tutorial is a continuation of Introduction to Mobile Computing I,
and examines two important areas in greater detail: service discovery
technologies (Jini, Bluetooth, Service Location Protocol, Salutation,
and Microsoft's Universal Plug and Play) and sensor networks.
The broad goals of service discovery technologies are to enable device cooperation, reduce configuration hassles, and provide services for peripheral-poor devices. The service discovery portion of the tutorial will survey several competing approaches to service discovery, including Bluetooth SDP, Salutation, Jini, and Microsoft's Universal Plug and Play. You'll emerge with a good understanding of service discovery, without having to read the 1500 page Bluetooth specification!
The other half of the tutorial will examine sensor networks. The recent development of high-performance microprocessors, novel sensing materials, and low-power communications has stimulated great interest in the development of smart sensors -- physical, chemical, or biological sensors combined with integrated circuits. These smart sensors can be relatively inexpensive to build, allowing for the large-scale deployment of networks of smart sensors. The applications of smart sensors are extensive. Sensor networks have been proposed for application areas including industrial, biomedical, environmental, and military, to name just a few. Many applications can benefit from a wireless interface to sensor networks. Interaction between sensor nodes and conventional computing devices will allow users of mobile computing devices to interact with their environment as they travel.
Intended Audience:
This tutorial will appeal to anyone interested in a deeper study of
several important topics in mobile computing.
Biographies of speakers:
Loren Schwiebert received the B.S. degree in Computer Science and
Mathematics from Heidelberg College, Tiffin, OH, and the M.S. and
Ph.D. degrees in Computer and Information Science from The Ohio State
University, Columbus, OH. Since 1995 he has been a faculty member at Wayne State
University, Detroit, MI, where he is currently a Assistant Professor in
the
Computer Science Department. His research interests include
interconnection networks, computer networking, and wireless
communication.
He is a member of the ACM, IEEE, and IEEE Computer Society.
Golden G. Richard III has been a faculty member in the Department of Computer Science at the University of New Orleans in Louisiana since 1994. His research interests include mobile computing, wireless networking, operating systems, and fault tolerance. Golden is on the Executive Committee of the IEEE Technical Committee on the Internet, is a member of the ACM and IEEE, and serves as USENIX's Educational Outreach Liaison for the University of New Orleans. He lectures frequently on networking and mobile computing issues, concentrating on service discovery technologies. When he's not hacking, he can be found consuming New Orleans jazz.
Abstract:
The need for "information anywhere anytime" has been a driving force
for the increasing growth in Web and Internet technology, wireless
communication, and portable computing devices. The field of mobile
computing is the merger of these advances in computing and
communication with the aim of providing seamless and ubiquitous
computing environment for mobile users. These environments are
enriched by new applications which are context-aware and
location-dependent. Such applications require support from underlying
system to provide them information about the location and context of
the mobile users.
In this tutorial we will cover how location information can be provided to applications and how it can be efficiently managed by a mobile system. An application of location information service is location-based querying. The tutorial will demonstrate how applications can benefit from location based services by using the example of location-based querying.
Intended audience:
Engineers, scientists, software developers, system analysts, network
users and designers, project managers, faculty members, graduate and
undergraduate students, who are interested in knowing the fundamentals
of location information management and the recent advances and
practices in the field.
Outline:
Biography of speaker:
Sandeep Kumar S. Gupta received the B.Tech degree in computer science
and engineering from Institute of Technology, Banaras Hindu
University, Varanasi, India, the M.Tech. degree in computer science
and engineering from Indian Institute of Technology, Kanpur, and the
M.S. and Ph.D. degree in computer and information science from The
Ohio State University, Columbus, Ohio. He is currently an Associate
Professor in Department of Computer Science and Engineering at Arizona
State University, Tempe, AZ. He has previously served as faculty at
Duke University, Ohio University, and Colorado State University. His
research interests include mobile and pervasive computing, compilers,
wireless and embedded sensor networks.
Dr. Gupta has given tutorials on Mobile IP (IPCCC'99 and MASCOTS'99), Mobile ATM (IPCCC'99), and Mobile Databases (MobiCom'00). He was program chair for Int'l workshop on Group Communication and program co-chair for Int'l Workshop on Wireless Networks and Mobile Computing, and Int'l Workshop on Pervasive Computing. He was a program committee member for Mobile Data Access (MDA'99) and 1999 Int'l Conference on Parallel Processing (ICPP'99). He is a co-guest editor for special issue of IEEE Personal Communication Magazine (on Pervasive Computing), IEEE Transactions on Computer (Mobile Computing and Databases) and ACM/Baltzer Monet (on Pervasive Computing). Dr. Gupta is a member of the Association of Computing Machinery and a senior member of the IEEE.
Tutorial Chair Golden G. Richard III, Ph.D. Asst. Professor of Computer Science Dept. of Computer Science Lakefront Campus Univ. of New Orleans New Orleans, LA 70148 golden@cs.uno.edu |
For questions/suggestions/problems with the IPCCC website please
mail the webmaster: ipccc2001@yahoo.com