<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=bluetooth">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=bluetooth]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for bluetooth]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/422/Masters-Thesis-Research-Update-Amey-and-Nikhil"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/410/Masters-Thesis-Research-Proposal-Amey-Sane-and-Nikhil-Puranik"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/44/agentSpeak"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/23/CentaurusComm"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/11/Dynamic-Negotiation-Agents-in-Mobile-Computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/2/MoGATU-Data-Management-in-Pervasive-Computing-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/40/Presence-Monitoring-System"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/21/Semantic-Service-Discovery-in-Bluetooth"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/22/Simulator-to-evaluate-prototype-Local-Area-and-Personal-Area-Wireless-Network-Protocols"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/781/Context-Dependent-Privacy-and-Security-Management-on-Mobile-Devices"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/652/FaceBlock-Privacy-Aware-Pictures-for-Google-Glass"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/647/A-Location-Based-Mechanism-for-Mobile-Device-Security"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/450/Proximity-Based-Authentication-for-Mobile-Devices"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/186/Service-Discovery-and-Compsition-in-Pervasive-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/31/On-Data-Management-in-Pervasive-Computing-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/159/Service-Discovery-in-Agent-based-in-Pervasive-Computing-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/125/On-Experiments-with-a-Transport-Protocol-for-Pervasive-Computing-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/124/Centaurus-An-Infrastructure-for-Service-Management-in-Ubiquitous-Computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/138/An-Approach-to-Dynamic-Service-Management-in-Pervasive-Computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/2/MoGATU"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/422/Masters-Thesis-Research-Update-Amey-and-Nikhil">
  <title><![CDATA[Masters Thesis Research Update - Amey and Nikhil]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/422/Masters-Thesis-Research-Update-Amey-and-Nikhil</link>
  <description><![CDATA[In this week's lab meeting, Amey Sane and Nikhil Puranik will give an update on how their Masters thesis research is progressing. 


Amey will talk on "Exploring Hidden Markov Model for semantic activity prediction".

Smart devices like mobile phones can effectively be exploited for use, not only as a mode of contact through voice dialing but much more than that, by making use of its features like Bluetooth, Wi-Fi capability and also through its in-built sensor capability. All these can ...]]></description>
  <dc:date>2011-12-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/410/Masters-Thesis-Research-Proposal-Amey-Sane-and-Nikhil-Puranik">
  <title><![CDATA[Masters Thesis Research Proposal: Amey Sane and Nikhil Puranik]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/410/Masters-Thesis-Research-Proposal-Amey-Sane-and-Nikhil-Puranik</link>
  <description><![CDATA[In this week's lab meeting we will have Amey Sane and Nikhil Puranik talk about the research they will be pursuing for their Masters Thesis. 

Amey Sane will talk about "Context-aware Framework for modeling and prediction of User activities". His research work is part of ongoing Platys project. This project spans over the areas like mobile computing, Context-aware computing, security and privacy. My thesis work will be focused in the area of mobile-computing and Context-aware computing. In ...]]></description>
  <dc:date>2011-09-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition">
  <title><![CDATA[Context-Aware Middleware for Activity Recognition]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition</link>
  <description><![CDATA[Smartphones and other mobile devices have a simple notion of context largely restricted to temporal and spatial coordinates. Service providers and enterprise administrators can deploy systems incorporating activity and relations context to enhance the user experience, but this raises considerable collaboration, trust and privacy issues between different service providers. Our work is an initial step toward enabling devices themselves to represent, acquire and use a richer notion of context th...]]></description>
  <dc:date>2011-05-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/44/agentSpeak">
  <title><![CDATA[agentSpeak]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/44/agentSpeak</link>
  <description><![CDATA[Several manufacturers offer Bluetooth enabled wireless headsets, such
as Jabra's FreeSpeak
and products made by Plantronics and others . There
are intended to be used to connect with phones, but could also be used
to send and receive audio to computers.  This project will involve (1)
writing some low level drivers for the desired OS (linux?), (ii)
hooking up the drivers to some interesting applications (listen to
MP3's?  Interface to a speech understanding system) and (iii)
demonstrat...]]></description>
  <dc:date>2003-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery">
  <title><![CDATA[Allia: Alliance-based Service Discovery]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery</link>
  <description><![CDATA[Directory based service discovery mechanisms are unsuitable for ad-hoc m-commerce environments. Working towards finding an
alternate mechanism, we developed Allia: a peer-to-peer caching based and policy-driven agent-service discovery framework that
facilitates cross-platform service discovery in ad-hoc environments. Our approach achieves a high degree of flexibility in
adapting itself to changes in ad-hoc environments and is devoid of common problems associated with structured compound
f...]]></description>
  <dc:date>2002-03-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin">
  <title><![CDATA[An Agent Based Distributed Computing System using XReggie and Ronin]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin</link>
  <description><![CDATA[To realize the dream of truely ubiquitous information superhighway, it is necessary
for information to be available from mobile platforms. But along with that, with the increasing variation in the
capability of the different devices around us, efficient distribution of load is becoming very important to support
ubiquitous computation. This project aims at building an agent-based middleware addressing the different issues of
distributed computing in a mobile environment.

The project con...]]></description>
  <dc:date>1999-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/23/CentaurusComm">
  <title><![CDATA[CentaurusComm]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/23/CentaurusComm</link>
  <description><![CDATA[It is well-known that TCP performs poorly in wireless a environment. This
project involves an empirical performance analysis of TCP on Cellular
Digital Packet Data (CDPD), Bluetooth and Wireless LAN (WLAN). This
analysis brings out the weaknesses of TCP in realistic conditions. We also
describe the design of CentaurusComm, a message based transport protocol
designed to perform well in low bandwidth networks and resource poor
devices. In particular, CentaurusComm is optimized to ...]]></description>
  <dc:date>1999-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/11/Dynamic-Negotiation-Agents-in-Mobile-Computing">
  <title><![CDATA[Dynamic Negotiation Agents in Mobile Computing]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/11/Dynamic-Negotiation-Agents-in-Mobile-Computing</link>
  <description><![CDATA[A three year project funded by NSF (award number 0070802) directed by PI Anupam Joshi and CO-PIs Tim Finin, and Yelena Yesha and will be carried out 2000-2003 with $170,000 in funding from the NSF
CCR Division of Computer-communication research under program officer Yuan-Chieh Chow.

With the advent of third and fourth generation wireless infrastructure, and the simultaneous emergency of pervasive connectivity for all devices based on bluetooth like systems and ad-hoc networks, a new vista...]]></description>
  <dc:date>2002-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/2/MoGATU-Data-Management-in-Pervasive-Computing-Environments">
  <title><![CDATA[MoGATU: Data Management in Pervasive Computing Environments]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/2/MoGATU-Data-Management-in-Pervasive-Computing-Environments</link>
  <description><![CDATA[The past few years have seen significant work in mobile data management, typically based on the client/proxy/server model. Mobile/wireless devices are treated as clients that are data consumers only, while data sources are on servers that typically reside on the wired network. With the advent of pervasive computing environments, an alternative scenario arises where mobile devices gather and exchange data from not just wired sources, but also from their ethereal environment and one another. Th...]]></description>
  <dc:date>2001-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/40/Presence-Monitoring-System">
  <title><![CDATA[Presence Monitoring System]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/40/Presence-Monitoring-System</link>
  <description><![CDATA[Objective. The objective is to develop a distributed system that is capable of monitoring user presence in an office environment and reporting the updated information to the registered context brokers. This monitoring system will use different sensing techniques to detect user presence, for example, detecting the network connections made by Bluetooth devices, monitoring user logins on the UNIX servers and desktop computers, reading the RFID tags attached to the devices that a user carries, an...]]></description>
  <dc:date>2003-11-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/21/Semantic-Service-Discovery-in-Bluetooth">
  <title><![CDATA[Semantic Service Discovery in Bluetooth]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/21/Semantic-Service-Discovery-in-Bluetooth</link>
  <description><![CDATA[Bluetooth Service Discovery Protocol (SDP) enables a client application on
a device to discover information about services on other Bluetooth
devices. Every service is represented by a profile that is identified by a
128-bit Universally Unique Identifier (UUID). Attributes associated with a
particular service are also identified by UUIDs. Service discovery
requests, sent by the client, must contain one or more UUIDs. A match
occurs on a peer device if and only if at least one UU...]]></description>
  <dc:date>2000-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/22/Simulator-to-evaluate-prototype-Local-Area-and-Personal-Area-Wireless-Network-Protocols">
  <title><![CDATA[Simulator to evaluate/prototype Local Area and Personal Area Wireless Network Protocols]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/22/Simulator-to-evaluate-prototype-Local-Area-and-Personal-Area-Wireless-Network-Protocols</link>
  <description><![CDATA[Rapid advances in wireless networks are making ubiquitous computing a
reality. New standards (such as Bluetooth, HomeRF, etc.), products
and, services are emerging rapidly. In such a dynamic environment, a
comprehensive network simulator with good modeling/emulation
capability would be an immensely useful tool to "prototype/test" new
communication protocols and experiment interaction among existing
protocols. The current efforts to build network simulator for
Bluetooth PANs are...]]></description>
  <dc:date>2001-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus">
  <title><![CDATA[Vigil / Secure Centaurus]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus</link>
  <description><![CDATA[Vigil / Secure Centaurus is an ongoing research project on smart home / smart office scenario.

The goal of the project is to demonstrate a smart office environment where mobile user can use her handheld device to ad-hocly operate over all resources/services embedded in  the environment. These services include doors, lights, music, powerpoint presentations, printers and various information services. A user can access these services through Bluetooth, Wi-Fi and IR enabled handheld devices as...]]></description>
  <dc:date>2000-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/781/Context-Dependent-Privacy-and-Security-Management-on-Mobile-Devices">
  <title><![CDATA[Context-Dependent Privacy and Security Management on Mobile Devices]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/781/Context-Dependent-Privacy-and-Security-Management-on-Mobile-Devices</link>
  <description><![CDATA[There are ongoing security and privacy concerns regarding mobile platforms that are being used by a growing number of citizens. Security and privacy models typically used by mobile platforms use one-time permission acquisition mechanisms. However, modifying access rights after initial authorization in mobile systems is often too tedious and complicated for users. User studies show that a typical user does not understand permissions requested by applications or are too eager to use the applica...]]></description>
  <dc:date>2017-08-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/652/FaceBlock-Privacy-Aware-Pictures-for-Google-Glass">
  <title><![CDATA[FaceBlock: Privacy-Aware Pictures for Google Glass]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/652/FaceBlock-Privacy-Aware-Pictures-for-Google-Glass</link>
  <description><![CDATA[FaceBlock takes regular pictures taken by your smartphone or Google Glass as input and converts them into Privacy-Aware Pictures. These pictures are generated by using a combination of Face Detection and Face Recognition algorithms. By using FaceBlock, a user can take a picture of herself and specify her policy/rule regarding pictures taken by others (in this case ‘obscure my face in pictures from strangers’). FaceBlock would automatically generate a mathematical representation of face id...]]></description>
  <dc:date>2014-06-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/647/A-Location-Based-Mechanism-for-Mobile-Device-Security">
  <title><![CDATA[A Location-Based Mechanism for Mobile Device Security]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/647/A-Location-Based-Mechanism-for-Mobile-Device-Security</link>
  <description><![CDATA[While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a devicepsilas contents is authentication. This paper describes a location-based authentication mechanism that employs trusted servers called policy beacons, which are used to provide location data and control device behavior. Mobile devices determine their proximity to available policy beacons and upon validation assume the des...]]></description>
  <dc:date>2009-03-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/450/Proximity-Based-Authentication-for-Mobile-Devices">
  <title><![CDATA[Proximity-Based Authentication for Mobile Devices]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/450/Proximity-Based-Authentication-for-Mobile-Devices</link>
  <description><![CDATA[While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two location-based user authentication mechanisms designed to take advantage of Bluetooth functionality built into many current handheld devices.]]></description>
  <dc:date>2005-06-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/186/Service-Discovery-and-Compsition-in-Pervasive-Environments">
  <title><![CDATA[Service Discovery and Compsition in Pervasive Environments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/186/Service-Discovery-and-Compsition-in-Pervasive-Environments</link>
  <description><![CDATA[Service discovery and composition has been an active area of research in the domain of wired web-based
environments as well as mobile and pervasive environments. The advent of mobile computing elements
(handhelds) along with the concomitant development of wireless and ad-hoc networking technologies such
as Bluetooth, 802.11, Infrared etc have recently led to the growth of infrastructure-less pervasive environments
- environments that do not assume the existence of the umbilical cord: a st...]]></description>
  <dc:date>2004-06-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/31/On-Data-Management-in-Pervasive-Computing-Environments">
  <title><![CDATA[On Data Management in Pervasive Computing Environments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/31/On-Data-Management-in-Pervasive-Computing-Environments</link>
  <description><![CDATA[This paper presents a framework to address new data management challenges introduced by data-intensive, pervasive
computing environments. These challenges include a spatio-temporal variation of data and data source availability,
lack of a global catalog and schema, and no guarantee of reconnection among peers due to the serendipitous nature
of the environment. An important aspect of our solution is to treat devices as semi-autonomous peers guided in their
interactions by profiles and cont...]]></description>
  <dc:date>2004-05-31</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/159/Service-Discovery-in-Agent-based-in-Pervasive-Computing-Environments">
  <title><![CDATA[Service Discovery in Agent-based in Pervasive Computing Environments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/159/Service-Discovery-in-Agent-based-in-Pervasive-Computing-Environments</link>
  <description><![CDATA[Directory based service discovery mechanisms are unsuitable
for ad-hoc m-commerce environments. Working towards finding an alternate mechanism, we developed
Allia: a peer-to-peer caching based and policy-driven agent-service discovery framework that
facilitates cross-platform service discovery in ad-hoc environments. Our approach achieves a high
degree of flexibility in adapting itself to changes in ad-hoc environments and is devoid of common
problems associated with structured compound ...]]></description>
  <dc:date>2003-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/125/On-Experiments-with-a-Transport-Protocol-for-Pervasive-Computing-Environments">
  <title><![CDATA[On Experiments with a Transport Protocol for Pervasive Computing Environments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/125/On-Experiments-with-a-Transport-Protocol-for-Pervasive-Computing-Environments</link>
  <description><![CDATA[It is well-known that TCP performs poorly in a wireless environment. This paper presents an empirical performance analysis of TCP on cellular digital packet data, Bluetooth and wireless LAN. We also present CentaurusComm, a message based transport protocol designed to perform well in low bandwidth networks and resource poor devices. In particular, CentaurusComm is optimized to handle data exchanges consisting of short message sizes. The application used to perform all the experiments is typic...]]></description>
  <dc:date>2002-11-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/124/Centaurus-An-Infrastructure-for-Service-Management-in-Ubiquitous-Computing">
  <title><![CDATA[Centaurus : An Infrastructure for Service Management in Ubiquitous Computing]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/124/Centaurus-An-Infrastructure-for-Service-Management-in-Ubiquitous-Computing</link>
  <description><![CDATA[In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become computationally enabled. Micro/nano sensors will be widely embedded in most engineered artifacts, from the clothes we wear to the roads we drive on. All of these devices will be (wirelessly) networked using Bluetooth, IEEE 802.15, or IEEE 802.11 for short-range connectivity, creating pervasive environments. In this a...]]></description>
  <dc:date>2002-11-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/138/An-Approach-to-Dynamic-Service-Management-in-Pervasive-Computing">
  <title><![CDATA[An Approach to Dynamic Service Management in Pervasive Computing]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/138/An-Approach-to-Dynamic-Service-Management-in-Pervasive-Computing</link>
  <description><![CDATA[In the near future, we will see dramatic changes in computing
and networking hardware. A large number of devices
(e.g., phones, PDAs, even small household appliances) will
become computationally enabled. Micro/nano sensors will
be widely embedded in most engineered artifacts, from the
clothes we wear to the roads we drive on. All of these devices
will be (wirelessly) networked using Bluetooth, IEEE
802.15 or IEEE 802.11 for short range connectivity creating
pervasive environments. In ...]]></description>
  <dc:date>2002-10-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/2/MoGATU">
  <title><![CDATA[MoGATU]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/2/MoGATU</link>
  <description><![CDATA[MoGATU's web site]]></description>
  <dc:date>2003-10-16</dc:date>
 </item>
</rdf:RDF>
