Ubiquitous Object Categorization and Identity

The advances in computing technologies have resulted in an explosive growth in computing systems called Ubiquitous Computing Systems [Ubicomp] and also the applications that impact all aspects of our life. Everyday objects communicate with each other and also with the Internet objects available today. People have an increasing desire for such ubiquitous access to information, anywhere, anyplace, and anytime. As ubicomp occurs everywhere, there may be a very large number of objects interacting with each other simultaneously in future. This necessitates the question of how to uniquely provide identity to infinitely growing objects and standard towards the uniformity of the data being exchanged by the various objects. In this paper, author proposes the way of providing uniqueness in scalable object identity, object categorization and standard format for the data being exchanged by various ubicomp compliant objects..

[1]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[2]  Huaglory Tianfield,et al.  A concise introduction to autonomic computing , 2005, Adv. Eng. Informatics.

[3]  Craig W. Thompson Everything is alive , 2004, IEEE Internet Computing.

[4]  Masayoshi Ohashi Ubiquitous service - using RFID tag reader on a mobile terminal , 2005, ISADS.

[5]  Chae-Woo Lee,et al.  An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[6]  Michael Goshey,et al.  Radio Frequency Identification (RFID) , 2008, ACM SIGSPATIAL International Workshop on Advances in Geographic Information Systems.

[7]  Petr Jan Horn,et al.  Autonomic Computing: IBM's Perspective on the State of Information Technology , 2001 .

[8]  Vincent M. Stanford,et al.  IEEE Pervasive Computing: Applications - Pervasive Computing Goes the Last Hundred Feet with RFID Systems , 2003, IEEE Distributed Syst. Online.

[9]  Jean Scholtz,et al.  Towards a Discipline for Evaluating Ubiquitous Computing Applications [Technical Report] , 2004 .

[10]  Michael J. Franklin,et al.  Challenges in Ubiquitous Data Management , 2001, Informatics.

[11]  Reijo Savola,et al.  Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[12]  Craig W. Thompson,et al.  Agents, Grids, and Middleware , 2004, IEEE Internet Comput..

[13]  Friedemann Mattern,et al.  From Distributed Systems to Ubiquitous Computing , 2003 .