Pervasive computing support for market trading

Dr Ian Wakeman is a senior lecturer in the Department of Informatics at the University of Sussex and formerly a research fellow at UCL. His current research interests are focused on support for user policies within pervasive environments, and how to make trust relationships explicit in the technological foundations of pervasive computing systems. His previous work has been in the area of programmable networks and congestion control of video over packet networks. He has been the Principal Investigator on three successful EPSRC projects and the BT funded Alpine programme. The EPSRC projects included: investigating support for adaptive applications; understanding mental models of networked applications, in collaboration with UCL; and an investigation on the design and implementation of programming languages for active networks. He is currently a Co-Investigator on two ongoing EPSRC projects, looking at natural language policy management, and on support for third party computation within the network. He has over forty publications in refereed journals and conferences.

[1]  Charles E. Perkins,et al.  Service Location Protocol, Version 2 , 1999, RFC.

[2]  Tim Owen,et al.  Middleware for user controlled environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[3]  Andrew T. Campbell,et al.  Mobiware: QoS-aware middleware for mobile multimedia communications , 1997, HPN.

[4]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[5]  Christine Julien,et al.  Active Coordination in Ad Hoc Networks , 2004, COORDINATION.

[6]  Cecilia Mascolo,et al.  Adaptive routing for intermittently connected mobile ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[7]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[8]  Claudia Linnhoff-Popien,et al.  A Context Modeling Survey , 2004 .

[9]  P. Venkat Rangan,et al.  An axiomatic basis of trust in distributed systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[10]  R. Swedberg New Economic Sociology: What Has Been Accomplished, What Is Ahead? , 1997 .

[11]  Cecilia Mascolo,et al.  XMIDDLE: A Data-Sharing Middleware for Mobile Computing , 2002, Wirel. Pers. Commun..

[12]  Nicholas R. Jennings,et al.  Sequential auctions for objects with common and private values , 2005, AAMAS '05.

[13]  David S. Rosenblum,et al.  Design and evaluation of a wide-area event notification service , 2001, TOCS.

[14]  Peter Ørbæk,et al.  "Physical hypermedia": organising collections of mixed physical and digital material , 2003, HYPERTEXT '03.

[15]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[16]  L. Suchman Plans and situated actions , 1987 .

[17]  Cecilia Mascolo,et al.  Q-CAD: QoS and context aware discovery framework for mobile systems , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[18]  Gregory D. Abowd,et al.  Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.

[19]  Amy L. Murphy,et al.  LIME: a middleware for physical and logical mobility , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[20]  Joan Feigenbaum,et al.  KeyNote : Trust management for public-key infrastructures. Discussion , 1999 .

[21]  Levente Buttyán,et al.  On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.

[22]  Daniele Quercia,et al.  STRUDEL: supporting trust in the dynamic establishment of peering coalitions , 2006, SAC '06.

[23]  Yvonne Rogers,et al.  From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors , 2004, AUIC.

[24]  Timothy Sohn,et al.  Supporting End User Programming of Context-Aware Applications , 2003 .

[25]  Meredith Ringel Morris,et al.  iStuff: a physical user interface toolkit for ubiquitous computing environments , 2003, CHI '03.

[26]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[27]  Lionel M. Ni,et al.  Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[28]  Steven R. Waterhouse Jxta search:distributed search for distributed networks , 2001 .

[29]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[30]  Valérie Issarny,et al.  QoS-aware service location in mobile ad hoc networks , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[31]  Urs Bruegger,et al.  Global Microstructures: The Virtual Societies of Financial Markets1 , 2002, American Journal of Sociology.

[32]  Stephen Weeks,et al.  Understanding trust management systems , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[33]  Michael Nidd,et al.  Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..

[34]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[35]  Jun-Hong Cui,et al.  Websigns: Hyperlinking Physical Locations to the Web , 2001, Computer.

[36]  L. Capra,et al.  Reasoning about trust groups to coordinate mobile ad-hoc systems , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[37]  Patrick Horster,et al.  A New Approach for Delegation Using Hierarchical Delegation Tokens , 1997, Communications and Multimedia Security.

[38]  G.S. Blair,et al.  Middleware awareness in mobile computing , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[39]  Cecilia Mascolo,et al.  CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications , 2003, IEEE Trans. Software Eng..

[40]  Tim Owen,et al.  Managing the policies of non-technical users in a dynamic world , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).

[41]  Andrew W. Appel,et al.  Proof-carrying authentication , 1999, CCS '99.

[42]  P. Drew,et al.  Managing prospect affiliation and rapport in real-life sales encounters , 2003 .

[43]  Jeff Magee,et al.  Multi-sensor location tracking , 1998, MobiCom '98.

[44]  Vladimiro Sassone,et al.  A Formal Framework for Concrete Reputation Systems , 2005 .

[45]  Nicholas R. Jennings,et al.  Bargaining with incomplete information , 2005, Annals of Mathematics and Artificial Intelligence.

[46]  Morris Sloman,et al.  A framework for contextual mediation in mobile and ubiquitous computing applied to the context-aware adaptation of maps , 2004, Personal and Ubiquitous Computing.

[47]  Jens Riegelsberger,et al.  The mechanics of trust: A framework for research and design , 2005, Int. J. Hum. Comput. Stud..

[48]  Lionel M. Ni,et al.  PrudentExposure: a private and user-centric service discovery protocol , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[49]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[50]  Cecilia Mascolo,et al.  Satin: A Component Model for Mobile Self Organisation , 2004, CoopIS/DOA/ODBASE.

[51]  Marketing ideas , 2004 .

[52]  H. White,et al.  Where do markets come from , 1981 .

[53]  B. Carruthers,et al.  Making Markets: Opportunism and Restraint on Wall Street , 1999 .

[54]  Yvonne Rogers,et al.  Ambient wood: designing new forms of digital augmentation for learning outdoors , 2004, IDC '04.

[55]  Blair MacIntyre,et al.  Integrating virtual and physical context to support knowledge workers , 2002, IEEE Pervasive Computing.

[56]  Jadwiga Indulska,et al.  Modeling Context Information in Pervasive Computing Systems , 2002, Pervasive.

[57]  H. Geismar What’s in a Price? , 2001 .