own-publications.bib

@MISC{htl-maturabericht,
  author = {R. Mayrhofer and A. Stieglecker and K. Pr\"uckl and W. P\"uhringer and F. Reithuber},
  title = {{O}rbit {S}ound {D}esigner},
  month = {March},
  year = {1998},
  note = {Project report, HTBLA Steyr, in German, submitted to ``Jugend Innovativ 1998'' awards},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/osd-1998.pdf}
}
@MISC{project-seminar-snn,
  author = {R. Mayrhofer},
  title = {{S}pikende {N}euronale {N}etze - {T}heorie und {S}imulation},
  month = {February},
  year = {2001},
  note = {Project report, in German},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/Spikende-Neuronale-Netze.pdf}
}
@MASTERSTHESIS{thesis-snn,
  author = {R. Mayrhofer},
  title = {A New Approach to a Fast Simulation of Spiking Neural Networks},
  school = {Johannes Kepler University of Linz, Austria},
  year = {2002},
  month = {July},
  day = {31},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/DiplomaThesis-2002-screen.pdf},
  abstract = {Spiking Neural Networks are considered as a new computation paradigm, representing
the next generation of Artificial Neural Networks by offering more flexibility and degrees of freedom for modeling computational elements. Although this type of Neural
Networks is rather new and there exists only a vague knowledge about its features, it
is clearly more powerful than its predecessor, not only being able to simulate Artificial Neural Networks in real time but also offering new computational elements that
were not available previously. Unfortunately, the simulation of Spiking Neural Networks currently involves the use of continuous simulation techniques which do not
scale easily to large networks with many neurons.

In this diploma thesis, a new model for Spiking Neural Networks is introduced; it
allows the use of fast discrete event simulation techniques and possibly offers enormous advantages in terms of simulation flexibility and scalability without restricting
the qualitative computational power. As a proof of concept, the new model has been
implemented in a prototype simulation framework, written platform-independently in
Java. This simulation framework utilizes solely discrete event simulation and has been
successfully used to emulate typical Artificial Neural Networks and to simulate a biologically inspired filter model. The results of the conducted example simulations are
presented and possible directions for future research are given. Additionally, a few advanced techniques regarding the use of discrete event simulation, which offers some
new opportunities, are shortly discussed.},
  kurzfassung = {Spikende Neuronale Netzwerke werden aufgrund ihrer verbesserten Flexibilit\"at und
erh\"ohten Anzahl von Freiheitsgraden gerne als ein neues Berechnungs-Paradigma angesehen – sie stellen den direkten Nachfolger der K\"unstlichen Neuronalen Netzwerke dar. Obwohl die Eigenschaften dieses neuen Typs Neuronaler Netzwerke derzeit
nur in begrenztem Ma{\ss}e bekannt sind, ist er dennoch eindeutig leistungsf\"ahiger als
sein Vorg\"anger; au{\ss}er der m\"oglichen Simulation K\"unstlicher Neuronaler Netzwerke
in Echtzeit k\"onnen neue, zuvor unbekannte Berechnungselemente in der Modellierung verwendet werden. Allerdings erfordern aktuelle Implementierung zur Simulation Spikender Neuronaler Netzwerke bisher den Einsatz kontinuierlicher Simulationstechniken, durch die Skalierbarkeit auf gro{\ss}e Netzwerke mit vielen Neuronen erschweren.

Diese Diplomarbeit f\"uhrt ein neues Modell f\"ur Spikende Neuronale Netzwerke ein,
welches die Anwendung von schneller, diskreter ereignisbasierter Simulation erlaubt; dadurch entstehen m\"oglicherweise enorme Vorteile in Flexibilit\"at und Skalierbarkeit, ohne die qualitative Berechnungsleistung zu mindern. Das neue Modell
wurde au{\ss}erdem in einem Plattform-unabh\"angigen, in Java geschriebenen Prototyp-Simulationsframework implementiert. Durch die ausschlie{\ss}liche Verwendung diskreter ereignisbasierter Simulation beweist das Framework die Funktionsf\"ahigkeit des
neuen Konzepts – es wurde bereits erfolgreich zur Emulation von Standardtypen
K\"unstlicher Neuronaler Netzwerke sowie zur Simulation eines biologisch inspirierten Filter-Modells eingesetzt. Die Resultate dieser Simulationen werden in folgenden
Kapiteln pr\"asentiert und m\"ogliche Richtungen f\"ur zuk\"unftige Weiterentwicklungen angegeben. Zus\"atzlich werden einige erweiterte Techniken bez\"uglich des Einsatzes diskreter ereignisbasierter Simulation angegeben, um die durch das neue Konzept entstandenen M\"oglichkeiten nutzen zu k\"onnen.}
}
@BOOK{book-contextprediction,
  author = {R. Mayrhofer},
  title = {An Architecture for Context Prediction},
  publisher = {Trauner Verlag},
  series = {Schriften der Johannes-Kepler-Universit\"at Linz},
  volume = {C 45},
  isbn = {3-85487-798-6},
  year = {2005},
  month = {April},
  day = {1},
  note = {revised version of \cite{phd-contextprediction}}
}
@PHDTHESIS{phd-contextprediction,
  author = {R. Mayrhofer},
  title = {An Architecture for Context Prediction},
  school = {Johannes Kepler University of Linz, Austria},
  year = {2004},
  month = {October},
  day = {23},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/PhD-ContextPrediction-2004.pdf},
  abstract = {Pervasive Computing is a new area of research with increasing prominence; it is situated at the intersection between human/computer interaction, embedded and distributed systems and networking technology. Its declared aim is a holistic design of computer systems, which is often described as the disappearance of computer technology into the periphery of daily life. One central aspect of this vision is a partial
replacement of explicit, obtrusive interfaces for human/computer interaction that demand exclusive user
attention with implicit ones embedded into real-world artifacts that allow intuitive and unobtrusive use.
This kind of interaction with computer systems suits human users better, but necessitates an adaption
of such systems to the respective context in which they are used. Context is, in this regard, understood
as any information about the current situation of a person, place or object that is relevant to the user
interaction. Context-based interaction, which is pursued by the design and implementation of context-sensitive systems, is therefore one of the building blocks of Pervasive Computing. Within the last five
years, a number of seminal publications on the recognition of current context from a combination of
different sensors have been written within this field.

This dissertation tackles the next logical step after the recognition of the current context: the prediction
of future contexts. The general concept is the prediction of abstract contexts to allow computer systems
to proactively prepare for future situations. This kind of high-level context prediction allows an integral consideration of all ascertainable aspects of context, in contrast to the autonomous prediction of
individual aspects like the geographical position of the user. It allows to consider patterns and interrelations in the user behavior which are not apparent at the lower levels of raw sensor data. The present
thesis analyzes prerequisites for user-centered prediction of context and presents an architecture for autonomous, background context recognition and prediction, building upon established methods for data
based prediction like the various instances of Markov models. Especial attention is turned to implicit
user interaction to prevent disruptions of users during their normal tasks and to continuous adaption of
the developed systems to changed conditions. Another considered aspect is the economical use of resources to allow an integration of context prediction into embedded systems. The developed architecture
is being implemented in terms of a flexible software framework and evaluated with recorded real-world
data from everyday situations. This examination shows that the prediction of abstract contexts is already possible within certain limits, but that there is still room for future improvements of the prediction
quality.},
  kurzfassung = {Pervasive Computing ist eine neue, zunehmend an Bedeutung gewinnende Forschungsrichtung an der
Ber\"uhrungsstelle zwischen Benutzerinteraktion, eingebetteten und verteilten Systemen und Netzwerktechnologien. Das erkl\"arte Ziel ist eine holistische Gestaltung von Computertechnologie, oft gleichge-
setzt mit dem “Verschwinden” derselben in den Hintergrund des t\"aglichen Lebens. Ein zentraler Aspekt
bei der Verfolgung dieses Ziels ist die Reduktion expliziter, vereinnahmender Schnittstellen zur Mensch-Maschine Interaktion zugunsten impliziter, in Alltagsgegenst\"anden verankerter. W\"ahrend erstere die
Aufmerksamkeit von Benutzern binden, erlauben letzere eine intuitive und unaufdringliche Benutzung.
Diese dem Menschen eher entgegenkommende Form des Umgangs mit Computersystemen erfordert jedoch die Anpassung solcher Systeme an den jeweiligen Kontext, in dem sie betrieben werden. Kontext
wird hierbei, wie in diesem Zusammenhang \"ublich, als die Ansammlung von f\"ur die Benutzerinteraktion
relevanter Information \"uber die aktuelle Situation einer Person, eines Ortes oder eines Objekts verstanden. Die sogenannte kontextbezogene Interaktion, manifestiert durch den Entwurf und die Konstruktion
kontextsensitiver Systeme, ist daher einer der Grundpfeiler von Pervasive Computing. Im Zuge dieser
wissenschaftlichen Sto{\ss}richtung entstanden innerhalb der letzten f\"unf Jahre entscheidende Arbeiten zur
Erkennung des aktuellen Kontext anhand verschiedenartigster Sensoren, die in Kombination miteinander ein m\"oglichst breit gestreutes Modell der realen Welt liefern sollen.

In dieser Dissertation wird der n\"achste logische Schritt einer eingehenderen Betrachtung unterzogen:
die Vorhersage zuk\"unftiger Kontexte. Der generelle Ansatz ist dabei die Vorhersage abstrakter Kontexte
mit dem Ziel, Computersysteme auf zuk\"unftig eintretende Situationen proaktiv vorbereiten zu k\"onnen.
Diese Vorhersage von Kontext auf abstrakter Ebene erlaubt gegen\"uber der unabh\"angigen Vorhersage
einzelner Aspekte — wie exemplarisch der geographischen Position des Benutzers — eine gemeinsame
Betrachtung aller erfassbaren Aspekte. Dadurch wird eine Auswertung von Mustern und Zusammenh\"angen im Benutzerverhalten, die auf niedrigeren Betrachtungsebenen nicht erkennbar sind, erm\"oglicht. Die
vorliegende Arbeit analysiert die Bedingungen f\"ur benutzergerechte Vorhersage von Kontext und entwickelt, aufbauend auf bereits bekannten Methoden zur datenbasierten Vorhersage wie beispielsweise
den verschiedenartigen Auspr\"agungen von Markov Modellen, eine Architektur zur automatischen, im
Hintergrund ablaufenden Kontexterkennung und -vorhersage. Besonderes Augenmerk wird dabei auf
implizite Benutzerinteraktion ohne Unterbrechung der Benutzer w\"ahrend ihrer normalen T\"atigkeiten
und auf best\"andige Adaption der entwickelten Systeme aufgrund sich \"andernder Rahmenbedingungen
gelegt. Ein weiterer Aspekt ist der sparsame Umgang mit Ressourcen zur m\"oglichen Integration von
Kontextvorhersage in eingebettete Systeme. Die entwickelte Architektur wird anschlie{\ss}end in Form
eines flexiblen Software-Frameworks umgesetzt und mit aufgezeichneten Daten aus allt\"aglichen Situationen evaluiert. Diese Betrachtung zeigt, dass die Vorhersage abstrakter Kontexte in Grenzen bereits
m\"oglich ist, jedoch noch Raum f\"ur Verbesserungen der Vorhersagequalit\"at in zuk\"unftigen Arbeiten offen
bleibt.
}
}
@INPROCEEDINGS{paper-emcsr2002,
  author = {R. Mayrhofer and M. Affenzeller and H. Pr\"ahofer and G. H\"ofer and A. Fried},
  title = {{DEVS} Simulation of Spiking Neural Networks},
  booktitle = {Cybernetics and Systems: Proc. {EMCSR} 2002: 16th European Meeting on Cybernetics and Systems Research},
  volume = {2},
  year = {2002},
  month = {April},
  publisher = {Austrian Society for Cybernetic Studies},
  editor = {Robert Trappl},
  pages = {573--578},
  location = {Vienna},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/emcsr2002spike.ps},
  eventurl = {http://www.osgk.ac.at/emcsr/02/},
  abstract = {This paper presents a new model for simulating Spiking Neural
Networks using discrete event simulation which might
possibly offer advantages concerning simulation speed and
scalability. Spiking Neural Networks are considered as a new
computation paradigm, representing an enhancement of Artificial
Neural Networks by offering more flexibility and degree of freedom
for modeling computational elements. Although this type of Neural
Networks is rather new and there is not very much known about its
features, it is clearly more powerful than its predecessor, being
able to simulate Artificial Neural Networks in real time but also
offering new computational elements that were not available
previously. Unfortunately, the simulation of Spiking Neural
Networks currently involves the use of continuous simulation
techniques which do not scale easily to large networks with many
neurons. Within the scope of the present paper, we discuss a new
model for Spiking Neural Networks, which allows the use of
discrete event simulation techniques, possibly offering
enormous advantages in terms of simulation flexibility and
scalability without restricting the qualitative computational
power.}
}
@INPROCEEDINGS{paper-secco2003,
  author = {R. Mayrhofer and F. Ortner and A. Ferscha and M. Hechinger},
  title = {Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks},
  editor = {R. Focardi and G. Zavattaro},
  booktitle = {Electronic Notes in Theoretical Computer Science},
  volume = {85.3},
  year = {2003},
  month = {June},
  publisher = {Elsevier Science},
  howpublished = {Available at http://www1.elsevier.com/gej-ng/31/29/23/138/23/show/Products/notes/index.htt},
  location = {Eindhoven},
  issn = {1571-0661},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/SecCo2003-Securing-Passive-Objects.pdf},
  eventurl = {http://www.cs.unibo.it/secco03/},
  abstract = {Security and privacy in mobile ad-hoc peer-to-peer environments are hard to
attain, especially when working with passive objects without own processing
power. We introduce a method for integrating such objects into a
peer-to-peer environment without infrastructure components while providing
a high level of privacy and security for peers interacting with objects. The
integration is done by equipping passive objects with public keys, which can
be used by peers to validate proxies acting on behalf of the objects. To
overcome the problem of limited storage capacity on small embedded objects,
ECC keys are used.}
}
@INPROCEEDINGS{paper-momm2003,
  author = {R. Mayrhofer and H. Radi and A. Ferscha},
  title = {Recognizing and Predicting Context by Learning from User Behavior},
  booktitle = {Proc. {MoMM 2003}: 1st International Conference On Advances in
               Mobile Multimedia},
  editor = {G. Kotsis, A. Ferscha, W. Schreiner and K. Ibrahim},
  publisher = {Austrian Computer Society ({OCG})},
  volume = {171},
  year = {2003},
  month = {September},
  location = {Jakarta, Indonesia},
  isbn = {3-85403-171-8},
  pages = {25--35},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/MOMM2003-Recognizing-and-Predicting-Context.pdf},
  url = {http://radiomatics.ee.itb.ac.id/issues/vol1/may2004/rene.htm},
  eventurl = {http://www.tk.uni-linz.ac.at/momm/},
  abstract = {Current mobile devices like mobile phones or personal digital assistants
have become more and more powerful; they already offer features that
only few users are able to exploit to their whole extent. With a number
of upcoming mobile multimedia applications,
ease of use
becomes one of the most important aspects. One way to improve usability
is to make devices aware of the user's context, allowing them to adapt
to the user instead of forcing the user to adapt to the device. Our
work is taking this approach one step further by not only reacting
to the current context, but also predicting future context, hence
making the devices proactive. Mobile devices are generally suited
well for this task because they are typically close to the user even
when not actively in use. This allows such devices to monitor the
user context and act accordingly, like automatically muting ring or
signal tones when the user is in a meeting or selecting audio, video
or text communication depending on the user's current occupation.
This paper presents an architecture that allows mobile devices to
continuously recognize current and anticipate future user context.
The major challenges are that context recognition and prediction should
be embedded in mobile devices with limited resources, that learning
and adaption should happen on-line without explicit training phases
and that user intervention should be kept to a minimum with non-obtrusive
user interaction. To accomplish this, the presented architecture consists
of four major parts: feature extraction, classification, labeling
and prediction. The available sensors provide a multi-dimensional,
highly heterogeneous input vector as input to the classification step,
realized by data clustering. Labeling associates recognized context
classes with meaningful names specified by the user, and prediction
allows to forecast future user context for proactive behavior.}
}
@INPROCEEDINGS{paper-mwcn2003,
  author = {R. Mayrhofer and H. Radi and A. Ferscha},
  title = {Feature Extraction in Wireless Personal and Local Area Networks},
  booktitle = {Proc. {MWCN 2003}: 5th International Conference
               on Mobile and Wireless Communications Networks},
  publisher = {World Scientific},
  year = {2003},
  month = {October},
  location = {Singapore},
  isbn = {981-238-686-6},
  pages = {195--198},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/MWCN2003-Heterogeneous-Features.pdf},
  eventurl = {http://www.i2r.a-star.edu.sg/events/call-for-papers/mwcn2003/},
  abstract = {Context awareness is currently being investigated for applications
in different areas, including Mobile Computing. Many mobile devices
are already shipped with support for Bluetooth and Wireless LAN, making
these technologies commonly available. It is thus possible to exploit
the wireless interfaces as sensors for deriving information about
the device/user context. However, extracting features from typical
Bluetooth or Wireless LAN properties is difficult because not only
numerical, but also non-numerical features like the list of MAC addresses
in range are important for context awareness. In this paper, we introduce
a method to automatically classify these highly heterogeneous features
with supervised or un-supervised classification methods. By defining
two operators, a distance metric and an adaption operator, any feature
can be used as input for the classifier and can thus contribute to
context detection.}
}
@INCOLLECTION{paper-pervasive2004-doctoral,
  author = {R. Mayrhofer},
  title = {An Architecture for Context Prediction},
  booktitle = {Advances in Pervasive Computing},
  note = {part of the Second International Conference on Pervasive Computing ({PERVASIVE 2004})},
  publisher = {Austrian Computer Society {(OCG)}},
  editor = {A. Ferscha and H. H\"ortner and G. Kotsis},
  month = {April},
  year = {2004},
  isbn = {3-85403-176-9},
  volume = {176},
  pages = {65--72},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/Pervasive2004-Doctoral-Architecture-Context-Prediction.pdf},
  eventurl = {http://www.pervasive2004.org/program_doctoralcolloquim.php},
  abstract = {Today's information appliances are usually very powerful,
featuring local storage and processing power, communication technology
and supporting many different applications. They are either mobile, like
laptop computers, handheld devices, mobile phones or wearables, or fixed,
like TV set-top boxes, home entertainment centers or even whole rooms
equipped with various interacting devices; but most of them have various
hardware components that can be used as sensors for querying the environment.
By exploiting these sensors, it is possible to make devices context aware
and thus adaptive to the current user's situation. This paper presents the
basic structure of a framework which eases the implementation of context
aware applications by providing the current and future, predicted context.}
}
@INCOLLECTION{paper-pervasive2004-workshop-dataformat,
  author = {R. Mayrhofer and H. Radi and A. Ferscha},
  title = {A Context Prediction Code and Data Base},
  booktitle = {Proceedings of the Benchmarks and a Database for Context Recognition Workshop},
  note = {part of the Second International Conference on Pervasive Computing ({PERVASIVE 2004})},
  publisher = {ETH Zurich},
  isbn = {3-9522686-2-3},
  editor = {H. Junker and P. Lukowicz and J. M\"antyjarvi},
  month = {April},
  year = {2004},
  pages = {20--26},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/Pervasive2004-Workshop-Context-Database.pdf},
  eventurl = {http://www.pervasive2004.org/program_w5.php},
  abstract = {Many of the currently available sensors do not provide simple, numerical
values but more complex data like a list of other devices in range.
Although these sensors can, in the general case, not be transformed
to numerical values, they nonetheless provide valuable information
about the device or user context. For exploiting all available context
information, it is thus important to also regard ordinal and nominal
sensor values. In this paper, we propose to jointly develop a meta
data format for the evaluation and assessment of context recognition
and prediction methods.}
}
@INCOLLECTION{paper-pervasive2004-workshop-dataset,
  author = {H. Radi and R. Mayrhofer and A. Ferscha},
  title = {A Notebook Sensory Data Set for Context Recognition},
  booktitle = {Proceedings of the Benchmarks and a Database for Context Recognition Workshop},
  note = {part of the Second International Conference on Pervasive Computing ({PERVASIVE 2004})},
  publisher = {ETH Zurich},
  isbn = {3-9522686-2-3},
  editor = {H. Junker and P. Lukowicz and J. M\"antyjarvi},
  month = {April},
  year = {2004},
  pages = {17--19},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/Pervasive2004-Workshop-Context-Dataset.pdf},
  eventurl = {http://www.pervasive2004.org/program_w5.php},
  abstract = {For a qualitative and quantitative assessment of context prediction and recognition methods,
real-world data sets are inevitable.
By collecting sensor data on a single notebook over a period of a few months
we got a rather large log file of homogeneous and heterogeneous features reflecting
the users activities during this time frame.
In this paper we present which devices were exploited as sensors, which information was logged
and how this information was stored for further processing by classification algorithms.}
}
@ARTICLE{art-radiomatics2004,
  author = {R. Mayrhofer and H. Radi and A. Ferscha},
  title = {Recognizing and Predicting Context by Learning from User Behavior},
  journal = {Radiomatics: Journal of Communication Engineering, special issue on Advances in Mobile Multimedia},
  issn = {1693-5152},
  year = {2004},
  month = {May},
  volume = {1},
  number = {1},
  pages = {30--42},
  publisher = {ITB Press},
  note = {extended version of \cite{paper-momm2003}},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/Radiomatics2004.pdf},
  abstract = {Current mobile devices like mobile phones or
personal digital assistants have become more and
more powerful; they already offer features that only
few users are able to exploit to their whole extent.
With a number of upcoming mobile multimedia
applications, ease of use becomes one of the most
important aspects. One way to improve usability is to
make devices aware of the user’s context, allowing
them to adapt to the user instead of forcing the user
to adapt to the device. Our work is taking this
approach one step further by not only reacting to the
current context, but also predicting future context,
hence making the devices proactive. Mobile devices
are generally suited well for this task because they
are typically close to the user even when not actively
in use. This allows such devices to monitor the user
context and act accordingly, like automatically
muting ring or signal tones when the user is in a
meeting or selecting audio, video or text
communication depending on the user’s current
occupation. This article presents an architecture that
allows mobile devices to continuously recognize
current and anticipate future user context. The major
challenges are that context recognition and
prediction should be embedded in mobile devices
with limited resources, that learning and adaptation
should happen on-line without explicit training
phases and that user intervention should be kept to a
minimum with non-obtrusive user interaction. To
accomplish this, the presented architecture consists
of four major parts: feature extraction, classification,
labeling and prediction. The available sensors
provide a multi-dimensional, highly heterogeneous
input vector as input to the classification step,
realized by data clustering. Labeling associates
recognized context classes with meaningful names
specified by the user, and prediction allows
forecasting future user context for proactive
behavior.
}
}
@INPROCEEDINGS{paper-gi-dissprice-2005,
  author = {R. Mayrhofer},
  title = {{E}ine {A}rchitektur zur {K}ontextvorhersage},
  booktitle = {{A}usgezeichnete {I}nformatikdissertationen 2004},
  publisher = {Lecture Notes in Informatics ({LNI})},
  series = {Series of the German Informatics society ({GI})},
  volume = {D-5},
  isbn = {3-88579-409-8},
  month = {May},
  day = {2},
  year = {2005},
  pages = {125--134},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/GI-DissPreis2005-Kurzfassung.pdf},
  abstract = {So genannte ``kontextsensitive Systeme'' haben zum Ziel, die eingesetzten 
Computersysteme automatisch an die aktuellen Situationen anzupassen
und damit bessere Interaktion mit der Umgebung zu erm\"oglichen. Diese
Arbeit befasst sich mit dem n\"achsten logischen Schritt nach der Erkennung
des jeweils aktuellen Kontextes, n\"amlich der Vorhersage zuk\"unftiger
Kontexte. Zu diesem Zweck wurde eine mehrschrittige Software-Architektur
entwickelt, welche aus den Daten mehrerer einfacher Sensoren die aktuellen und
zuk\"unftig erwarteten Kontexte gewinnt.
Die entwickelte Architektur wurde bereits in Form eines flexiblen
Software-Frameworks umgesetzt und mit aufgezeichneten Daten aus allt\"aglichen
Situationen evaluiert. Diese Betrachtung zeigt, dass die Vorhersage
abstrakter Kontexte in Grenzen bereits m\"oglich ist, jedoch noch Raum
f\"ur Verbesserungen der Vorhersagequalit\"at in zuk\"unftigen Arbeiten
offen bleibt.}
}
@INPROCEEDINGS{paper-echise2005,
  author = {R. Mayrhofer},
  title = {Context Prediction based on Context Histories: Expected Benefits, Issues and Current State-of-the-Art},
  booktitle = {Proc. {ECHISE 2005}: 1st International Workshop on Exploiting Context Histories in Smart Environments},
  editor = {T. Prante and B. Meyers and G. Fitzpatrick and L.~D. Harvel},
  month = {May},
  year = {2005},
  note = {part of the Third International Conference on Pervasive Computing ({PERVASIVE 2005})},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/ECHISE2005-Context-Prediction-based-on-Context-Histories.pdf},
  eventurl = {http://www.ipsi.fraunhofer.de/ambiente/echise2005/},
  abstract = {This paper presents the topic of context prediction as one
possibility to exploit context histories. It lists some
expected benefits of context prediction for certain
application areas and discusses the associated issues in
terms of accuracy, fault tolerance, unobtrusive operation,
user acceptance, problem complexity and privacy. After
identifying the challenges in context prediction, a first
approach is summarized briefly. This approach, when
applied to recorded context histories, builds upon three
steps of a previously introduced software architecture:
feature extraction, classification and prediction. Open
issues remain in the areas of prediction accuracy, dealing
with limited resources, sharing of context information and
user studies.
}
}
@PROCEEDINGS{proceedings-adjunct-pervasive2005,
  title = {Advances in Pervasive Computing: Adjunct Proceedings of the 3rd International Conference on Pervasive Computing},
  editor = {A. Ferscha and R. Mayrhofer and T. Strang and B.C. Linnhoff-Popien and A. Dey and A. Butz},
  publisher = {Austrian Computer Society {(OCG)}},
  month = {May},
  year = {2005},
  isbn = {3-85403-191-2},
  volume = {191},
  note = {available online at \url{http://www.pervasive.ifi.lmu.de/}},
  eventurl = {http://www.pervasive.ifi.lmu.de/}
}
@INPROCEEDINGS{paper-symposium-internet-recht,
  title = {Technische {H}intergr\"unde f\"ur das rechtliche {H}andeln im {I}nternet},
  author = {R. Mayrhofer},
  booktitle = {{A}ktuelles zum {I}nternet-{R}echt},
  publisher = {proLibris.at},
  pages = {1--16},
  isbn = {3-902460-20-2},
  location = {Linz, Austria},
  year = {2005},
  month = {December},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/Symposium-Internet-Recht-2005_Grundlagen.pdf},
  eventurl = {http://www.vwrecht.jku.at/Mitarbeiter/mayrhofer/Internet-Recht-Symposium.pdf},
  abstract = {Internet-Recht bewegt sich grunds\"atzlich an der Schnittstelle zwischen Gesetzgebung und Technik. Wie an vielen Schnittstellen gibt es auch hier Schwierigkeiten zu
\"uberwinden, und zwar nicht nur in der Findung gemeinsamer Ziele, Arbeitsgruppen
und schlussendlich L\"osungen, sondern vor allem im gegenseitigen Verst\"andnis der
den jeweils anderen Bereich betreffenden Probleme. Dieser Beitrag soll die technischen Hintergr\"unde einiger aktueller Themen an dieser Schnittstelle allgemein verst\"andlich n\"aher bringen. Die Auswahl an Themen, welche aus technischer Sicht
einer Kl\"arung durch die Gesetzgebung bed\"urfen bzw. derer, die durch neue Gesetze die Entwicklung neuer technischer Systeme erfordern, ist derzeit kaum mehr
\"uberschaubar und w\"achst weiter. Daher erfolgt in diesem Beitrag eine Konzentration auf die technischen Grundlagen f\"ur viele dieser Themen sowie auf eine kleine
Auswahl von Themen, die von allgemeinem, auch \"offentlichem bzw. gesellschaftlichem Interesse sind. Konkret werden die folgenden Themen angesprochen:
Grundlagen der Kryptographie, Sichere Signatur, Digitales Rechte Management (DRM) 
und Peer-to-Peer Systeme.

Diese Themen stellen eine subjektive Auswahl dar, sollten jedoch die derzeit am
st\"arksten – auch durch die Tagespresse – diskutierten Gebiete abdecken. Der Beitrag ist auf Leser ohne technisches Detailwissen ausgerichtet, Erfahrung im Um-
gang mit Computersystemen, also zum Beispiel mit Webbrowsern und Emailprogrammen, wird jedoch angenommen.
}
}
@TECHREPORT{report-ultrasound-protocol,
  author = {R. Mayrhofer and H. Gellersen and M. Hazas},
  title = {An Authentication Protocol using Ultrasonic Ranging},
  institution = {Lancaster University},
  number = {COMP-002-2006},
  month = {October},
  year = {2006},
  url = {http://www.comp.lancs.ac.uk/},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/TR-COMP-002-2006-Spatial-Authentication-Protocol.pdf},
  abstract = {This report presents a method for establishing and securing spontaneous interactions on the basis of spatial references which are obtained by accurate sensing of relative device positions. Utilising the Relate ultrasonic sensing system, we construct an interlocked protocol using radio frequency messages and ultrasonic pulses for verifying that two devices share a secret. This verification is necessary to prevent man-in-the-middle attacks on standard Diffie-Hellman key agreement.}
}
@INPROCEEDINGS{paper-twuc2006,
  author = {R. Mayrhofer},
  title = {A Context Authentication Proxy for {IPSec} using Spatial Reference},
  booktitle = {Proc. {TwUC} 2006: 1st International Workshop on Trustworthy Ubiquitous Computing},
  publisher = {Austrian Computer Society ({OCG})},
  pages = {449--462},
  day = {6},
  month = {December},
  year = {2006},
  isbn = {3-85403-216-1},
  location = {Yogyakarta, Indonesia},
  note = {\textbf{awarded best iiWAS/MoMM 2007 workshop paper}},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/TwUC-IPSec-Context-Authentication-Proxy.pdf},
  eventurl = {http://www.iiwas.org/conferences/twuc2006/},
  abstract = {Spontaneous interaction in ad-hoc networks is often desirable not only between users
or devices in direct contact, but also with devices that are accessible
only via a wireless network. Secure communication with such devices
is difficult because of the required authentication, which is often
either password- or certificate-based. An intuitive alternative is
context-based authentication, where device authenticity is verified
by shared context, and often by direct physical evidence. Devices
that are physically separated can not experience the same context and can thus not
benefit directly from context authentication. We introduce
a \emph{context authentication proxy} that is pre-authenticated with one
of the devices and can authenticate with the other by shared context.
This concept is applicable to a wide range of application scenarios,
context sensing technologies, and trust models. We show its practicality
in an implementation for setting up IPSec connections based on spatial
reference. Our specific scenario is ad-hoc access of mobile devices
to secure 802.11 WLANs using a PDA as authentication proxy.}
}
@INPROCEEDINGS{paper-persec2007,
  author = {R. Mayrhofer},
  title = {Towards an Open Source Toolkit for Ubiquitous Device Authentication},
  booktitle = {Workshops Proc. {PerCom 2007}: 5th {IEEE} International Conference on Pervasive Computing and Communications},
  day = {19--23},
  month = {March},
  year = {2007},
  publisher = {IEEE CS Press},
  pages = {247--252},
  isbn = {0-7695-2788-4},
  location = {White Plains, New York, USA},
  note = {Track {PerSec 2007}: 4th {IEEE} International Workshop on Pervasive Computing and Communication Security},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/PerSec2007-Towards-OpenUAT.pdf},
  eventurl = {http://www.cl.cam.ac.uk/~fms27/persec-2007/},
  abstract = {Most authentication protocols designed for ubiquitous computing environments
try to solve the problem of intuitive, scalable, secure authentication of
wireless communication. Due to the diversity of requirements, protocols 
tend to be implemented within specific research prototypes and can not be 
used easily in other applications. We propose to develop a common toolkit for
ubiquitous device authentication to foster wide usability of research results. 
This paper outlines design goals and presents a first, freely available 
implementation.}
}
@INPROCEEDINGS{paper-ssn2007,
  author = {R. Mayrhofer and H. Gellersen},
  title = {On the Security of Ultrasound as Out-of-band Channel},
  booktitle = {Proc. {IPDPS 2007}: 21st {IEEE} International Parallel and Distributed Processing Symposium},
  day = {26--30},
  month = {March},
  year = {2007},
  publisher = {IEEE CS Press},
  pages = {321},
  isbn = {1-4244-0909-8},
  location = {Long Beach, California, USA},
  note = {Track {SSN 2007}: 3rd International Workshop on Security in Systems and Networks},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/SSN2007-Ultrasound-Security-Analysis.pdf},
  eventurl = {http://www.cse.msu.edu/~lxiao/ssn07},
  abstract = {Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless ad hoc networks. Ultrasound can implicitly contribute to secure communication based on inherent limitations in signal propagation, and can additionally be used explicitly by peers to measure and verify their relative positions. In this paper we analyse potential attacks on an ultrasonic communication channel and peer-to-peer ultrasonic sensing, and investigate how potential attacks translate to application-level threats for peers seeking to establish a secure wireless link. Based on our analysis we propose a novel method for authentic communication of short messages over an ultrasonic channel.}
}
@INPROCEEDINGS{paper-wais2007,
  author = {R. Mayrhofer and M. Welch},
  title = {A Human-Verifiable Authentication Protocol Using Visible Laser Light},
  booktitle = {Proc. {ARES 2007}: 2nd International Conference on Availability, Reliability and Security},
  day = {10--13},
  month = {April},
  year = {2007},
  publisher = {IEEE CS Press},
  pages = {1143--1147},
  isbn = {0-7695-2775-2},
  location = {Vienna, Austria},
  note = {Track {WAIS 2007}: 1st International Workshop on Advances in Information Security},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/WAIS2007-Laser-Authentication.pdf},
  eventurl = {http://www.csc.lsu.edu/~durresi/wais2007/index.html},
  abstract = {Securing wireless channels necessitates authenticating communication
partners. For spontaneous interaction, authentication must be efficient
and intuitive. One approach to create interaction and authentication
methods that scale to using hundreds of services throughout the day
is to rely on personal, trusted, mobile devices to interact with
the environment. Authenticating the resulting device-to-device interactions
requires an out-of-band channel that is verifiable by the user. We
present a protocol for creating such an out-of-band channel with visible
laser light that is secure against man-in-the-middle attacks even
when the laser transmission is not confidential. A prototype implementation
shows that an appropriate laser channel can be constructed with simple
off-the-shelf components.}
}
@INPROCEEDINGS{paper-pervasive2007,
  author = {R. Mayrhofer and H. Gellersen},
  title = {Shake well before use: Authentication based on Accelerometer Data},
  booktitle = {Proc. {Pervasive 2007}: 5th International Conference on Pervasive Computing},
  day = {13--16},
  month = {May},
  year = {2007},
  publisher = {Springer-Verlag},
  series = {LNCS},
  volume = {4480},
  pages = {144--161},
  isbn = {978-3-540-72036-2},
  location = {Toronto, Canada},
  note = {\textbf{awarded best Pervasive 2007 paper}},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/Pervasive2007-Shake-Well-Before-Use.pdf},
  eventurl = {http://www.dgp.toronto.edu/conferences/pervasive2007/},
  abstract = {Small, mobile devices without user interfaces, such as Bluetooth headsets,
often need to communicate securely over wireless networks. Active attacks can
only be prevented by authenticating wireless communication, which is 
problematic when devices do not have any a priori information about each 
other. We introduce a new method for device-to-device authentication by
shaking devices together. This paper describes two protocols for combining
cryptographic authentication techniques with known methods of accelerometer 
data analysis to the effect of generating authenticated, secret keys. The 
protocols differ in their design, one being more conservative from a security
point of view, while the other allows more dynamic interactions. Three 
experiments are used to optimize and validate our proposed authentication
method.}
}
@INPROCEEDINGS{paper-esas2007,
  author = {R. Mayrhofer},
  title = {The Candidate Key Protocol for Generating Secret Shared Keys From Similar Sensor Data Streams},
  booktitle = {Proc. {ESAS 2007}: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks},
  day = {2--3},
  month = {July},
  year = {2007},
  publisher = {Springer-Verlag},
  series = {LNCS},
  volume = {4572},
  pages = {1--15},
  location = {Cambridge, UK},
  note = {\emph{to appear}},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/ESAS2007-Candidate-Key-Protocol.pdf},
  eventurl = {http://www.cl.cam.ac.uk/~twm29/esas/},
  abstract = {Secure communication over wireless channels necessitates authentication
of communication partners to prevent man-in-the-middle attacks. For
spontaneous interaction between independent, mobile devices, no a
priori information is available for authentication purposes. However,
traditional approaches based on manual password input or verification
of key fingerprints do not scale to tens to hundreds of interactions
a day, as envisioned by future ubiquitous computing environments.
One possibility to solve this problem is authentication based on similar
sensor data: when two (or multiple) devices are in the same situation, and thus
experience the same sensor readings, this constitutes shared, (weakly)
secret information. This paper introduces the \emph{Candidate Key
Protocol} (CKP) to interactively generate secret shared keys from
similar sensor data streams. It is suitable for two-party and multi-party
authentication, and supports opportunistic authentication.}
}
@INPROCEEDINGS{paper-eurocast2007,
  author = {R. Mayrhofer},
  title = {Extending the Growing Neural Gas Classifier for Context Recognition},
  note = {accepted for publication at the Workshop for Heuristic Problem Solving at EUROCAST 2007},
  day = {12--16},
  month = {February},
  year = {2007},
  publisher = {Springer-Verlag},
  series = {LNCS},
  location = {Las Palmas, Gran Canaria, ES},
  note = {\emph{to appear}},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/Eurocast2007-Extending-GNG.pdf},
  eventurl = {http://www.cl.cam.ac.uk/~twm29/esas/},
  abstract = {Context awareness is one of the building blocks of many applications in
pervasive computing. Recognizing the current context of a user or
device, that is, the situation in which some action happens, often
requires dealing with data from different sensors, and thus different 
domains.
The Growing Neural Gas algorithm is a classification algorithm
especially designed for un-supervised learning of unknown input distributions;
a variation, the Lifelong Growing Neural Gas (LLGNG), is well suited
for arbitrary long periods of learning, as its internal parameters
are self-adaptive. These features are ideal for automatically classifying
sensor data to recognize user or device context. 
However, as most
classification algorithms, in its standard form it is only suitable
for numerical input data. Many sensors which are available on current
information appliances are nominal or ordinal in type, making their
use difficult. Additionally, the automatically created clusters are
usually too fine-grained to distinguish user-context on an application
level. 
This paper presents general and heuristic extensions to the LLGNG classifier which allow its direct application for context recognition.
On a real-world data set with two months of heterogeneous data from
different sensors, the
extended LLGNG classifier compares favorably to k-means and SOM classifiers.}
}
@ARTICLE{art-mobile-multimedia2007,
  author = {R. Mayrhofer and R. Gostner},
  title = {Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections},
  journal = {Journal of Mobile Multimedia},
  year = {2007},
  volume = {3},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/MobileMultimedia-Spatial-Context-Auth-Proxy.pdf},
  note = {\emph{to appear}},
  abstract = {Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users
or devices in direct contact, but also with devices that are accessible
only via a wireless network. Secure communication with such devices
is difficult because of the required authentication, which is often
either password- or certificate-based. An intuitive alternative is
context-based authentication, where device authenticity is verified
by shared context, and often by direct physical evidence. Devices
that are physically separated cannot experience the same context and thus cannot
benefit directly from context authentication. We introduce
a \emph{context authentication proxy} that is pre-authenticated with one
of the devices and can authenticate with the other by shared context.
This concept is applicable to a wide range of application scenarios,
context sensing technologies, and trust models. We show its practicality
in an implementation for setting up IPSec connections based on spatial
reference. Our specific scenario is ad-hoc access of mobile devices
to secure 802.11 WLANs using a mobile device as authentication proxy.
A user study shows that our method and implementation are intuitive to use
and compare favourably to a standard, password-based approach.}
}
@INPROCEEDINGS{paper-ubicomp2007,
  author = {R. Mayrhofer and H. Gellersen and M. Hazas},
  title = {Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction},
  booktitle = {Proc. {Ubicomp 2007}: 9th International Conference on Ubiquitous Computing},
  day = {16--19},
  month = {September},
  year = {2007},
  publisher = {Springer-Verlag},
  series = {LNCS},
  location = {Innsbruck, AT},
  note = {\emph{to appear}},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/Ubicomp2007-Security-by-Spatial-Reference.pdf},
  eventurl = {http://www.ubicomp2007.org/}
}
@INPROCEEDINGS{paper-koi2002,
  author = {M. Affenzeller and R. Mayrhofer},
  title = {Generic Heuristics for Combinatorial Optimization Problems},
  booktitle = {Proceedings of the 9th International Conference on Operational Research ({KOI2002})},
  pages = {83--92},
  year = {2002},
  isbn = {953-6931-08-7},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/koi2002.ps}
}
@INPROCEEDINGS{paper-mdc2004,
  author = {A. Ferscha and M. Hechinger and R. Mayrhofer and R. Oberhauser},
  title = {A Light-Weight Component Model for Peer-to-Peer Applications},
  booktitle = {Proceedings of the 2nd International Workshop on Mobile Distributed Computing {(MDC04)}},
  publisher = {IEEE Computer Society Press},
  month = {March},
  year = {2004},
  location = {Tokio},
  pages = {520--527},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/MDC2004-P2P-components.pdf},
  eventurl = {http://www4.comp.polyu.edu.hk/~mdc04/},
  abstract = {Mobile Peer-to-Peer (P2P) computing applications
involve collections of heterogeneous and resource-limited
devices (such as PDAs or embedded sensor-actuator
systems), typically operated in ad-hoc completely
decentralized networks and without requiring dedicated
infrastructure support. Short-range wireless
communication technologies together with P2P
networking capabilities on mobile devices are responsible
for a proliferation of such applications, yet these
applications are often complex and monolithic in nature
due to the lack of lightweight component/container
support in these resource-constrained devices.

In this paper we describe our lightweight software
component model P2Pcomp that addresses the
development needs for mobile P2P applications. An
abstract, flexible, and high-level communication
mechanism among components is developed via a ports
concept, supporting protocol independence, location
independence,      and     (a)synchronous    invocations;
dependencies are not hard-coded in the components, but
can be defined at deployment or runtime, providing late-binding and dynamic rerouteability capabilities. Peers
can elect to provide services as well as consume them,
services can migrate between containers, and services are
ranked to support Quality-of-Service choices. Our
lightweight container realization leverages the OSGi
platform and can utilize various P2P communication
mechanisms such as JXTA. A “smart space” application
scenario demonstrates how P2Pcomp supports flexible
and highly tailorable mobile P2P applications.}
}
@INPROCEEDINGS{paper-pervasive2004-digitalaura,
  author = {A. Ferscha and M. Hechinger and R. Mayrhofer and M. dos~Santos~Rocha and M. Franz and R. Oberhauser},
  title = {{D}igital {A}ura},
  booktitle = {Advances in Pervasive Computing},
  note = {part of the Second International Conference on Pervasive Computing ({Pervasive 2004})},
  publisher = {Austrian Computer Society {(OCG)}},
  editor = {A. Ferscha and H. H\"ortner and G. Kotsis},
  month = {April},
  year = {2004},
  isbn = {3-85403-176-9},
  volume = {176},
  pages = {405--410},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/Pervasive2004-Video-DigitalAura.pdf},
  videourl = {http://www.mayrhofer.eu.org/downloads/publications/Pervasive2004-Video-DigitalAura.mpg},
  eventurl = {http://www.pervasive2004.org/program_videonight.php},
  abstract = {Smart space and smart appliances, i.e. wirelessly ad-hoc networked, mobile, autonomous
special purpose computing devices, providing largely invisible support and context-aware services have started to populate the real world and our daily lives. In such a
world, where literally everything is connected to everything with invisible, wireless data
links, we need new styles on how humans and things can interact. We have proposed a
``spontaneous interaction'' thought model, in which things start to interact once they
reach physical proximity to each other: Explained using the metaphor of an ``aura'',
which like a subtle invisible emanation or exhalation radiates from the center of an
object into its surrounding, a ``digital aura'' is built on technologies like Bluetooth radio,
RFID or IrDA together with an XML based profile description, such that if an object
detects the proximity (e.g. radio signal strength) of another object, it starts exchanging
and comparing profile data, and, upon sufficient ``similarity'' of the two profiles, starts to
interact with that object. A ``digital aura'' depending on the implementation technology,
is dense in the center of the object, and thins out towards its surrounding until it is no
longer sensible by others. Profiles described as semi-structured data and attached to the
object, can be matched by a structural and semantic analysis. Peer-to-peer concepts can
then be used to implement applications on top of the digital aura model for spontaneous
interaction.}
}
@ARTICLE{art-ijwmc,
  author = {A. Ferscha and M. Hechinger and R. Mayrhofer and R. Oberhauser},
  title = {A Peer-to-Peer Light-Weight Component Model for Context-Aware Smart Space Applications},
  journal = {International Journal of Wireless and Mobile Computing ({IJWMC}), special issue on Mobile Distributed Computing},
  year = {2004},
  issue = {4},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/ijwmc2004-4-P2P-Component-Model.pdf},
  note = {extended version of \cite{paper-mdc2004}},
  abstract = {Abstract—Mobile Peer-to-Peer (P2P) computing applications
involve collections of heterogeneous and resource-limited devices
(such as PDAs or embedded sensor-actuator systems), typically
operated in ad-hoc completely decentralized networks and
without requiring dedicated infrastructure support. Short-range
wireless communication technologies together with P2P
networking capabilities on mobile devices are responsible for a
proliferation of such applications, yet these applications are often
complex and monolithic in nature due to the lack of lightweight
component/container support in these resource-constrained
devices. A threatening field of application is ``smart space''
control, i.e. software architectures to control various home
appliances and embedded home facilities in a personalized,
spontaneous and intuitive way. Future home environments are
expected to be highly populated by ubiquitous computing
technology, allowing to integrate various aspects of home
activities seamlessly into walls, floors, furniture, appliances, and
even clothing – thus raising the need for lightweight, versatile
and component based software architectures to harness such
technology rich environments.

In this paper we describe our lightweight software component
model P2Pcomp that addresses the development needs for mobile
P2P applications. An abstract, flexible, and high-level
communication mechanism among components is developed via a
ports concept, supporting protocol independence, location
independence, and (a)synchronous invocations; dependencies are
not hard-coded in the components, but can be defined at
deployment or runtime, providing late-binding and dynamic
rerouteability capabilities. Peers can elect to provide services as
well as consume them, services can migrate between containers,
and services are ranked to support Quality-of-Service choices.
Our lightweight container realization leverages the OSGi
platform and can utilize various P2P communication mechanisms
such as JXTA. A ``smart space'' application scenario
demonstrates how P2Pcomp supports flexible and highly
tailorable mobile P2P applications.}
}
@TECHREPORT{report-p2p-framework,
  author = {A. Ferscha and M. Hechinger and R. Mayrhofer},
  title = {The Peer-to-Peer Coordination Framework --- Architecture Reference},
  institution = {Johannes Kepler Universit\"at Linz, Institut f\"ur Pervasive Computing},
  year = {2004}
}
@INPROCEEDINGS{paper-sobs05,
  author = {A. Ferscha and M. Hechinger and R. Mayrhofer and E. Chtcherbina and M. Franz and M. dos Santos Rocha and A. Zeidler},
  title = {Bridging the Gap with {P2P} Patterns},
  booktitle = {Proceedings of the Workshop on Smart Object Systems},
  year = {2005},
  month = {September},
  day = {11},
  note = {in conjunction with the Seventh International Conference on Ubiquitous Computing ({UbiComp} 2005),
          available at \url{http://ubicomp.lancs.ac.uk/workshops/sobs05/papers/04 - Ferscha, Alois.pdf}},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/SOBS2005-P2P-Patterns.pdf},
  eventurl = {http://ubicomp.lancs.ac.uk/workshops/sobs05/},
  abstract = {Abstract The design principles of pervasive computing software architectures are widely driven by the need for opportunistic interaction
among distributed, mobile and heterogeneous entities in the absence of
global knowledge and naming conventions. Peer-to-Peer (P2P) frameworks have evolved, abstracting the access to shared, while distributed
information. To bridge the architectural gap between P2P applications
and P2P frameworks we propose patterns as an organizational schema
for P2P based software systems. Our Peer-it hardware platform is used
to demonstrate an application in the domain of flexible manufacturing
systems.}
}
@ARTICLE{art-eurasip-embedded-systems,
  author = {A. Ferscha and M. Hechinger and M. dos~Santos~Rocha and R. Mayrhofer and A. Zeidler and A. Riener and M. Franz},
  title = {Building Flexible Manufacturing Systems Based on Peer-its},
  journal = {{EURASIP} Journal on Embedded Systems},
  year = {2007},
  note = {\emph{to appear}}
}

This file has been generated by bibtex2html 1.85.