<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Implementation of personalized situation-aware service</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tack-Don Han</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hyung-Min Yoon</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Seong-Hun Jeong</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bum-Seok Kang</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>This research was supported in part by the Korea Science &amp; Engineering Foundation (KOSEF) under the Basic Research program (No. R01-2005-000-10898-0) and Samsung Advanced Institute of Technology (SAIT) and Korea Ministry of Education &amp; Human Resources Development (MEHRD) under Grant BK21 (Brain Korea 21) Project in 2003-2005. Tack-Don Han is now with the Department of Computer Science, Yonsei University</institution>
          ,
          <addr-line>Seoul 120-749</addr-line>
          <country country="KR">Korea</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2005</year>
      </pub-date>
      <fpage>101</fpage>
      <lpage>106</lpage>
      <abstract>
        <p>-New service concepts of sharing contexts with support for communication on wireless networks are beginning to emerge for mobile devices with diverse embedded sensors. In order to promote services based on sharing contexts in mobile devices, this paper introduces the MoCE (Mobile Context Explorer) architecture. MoCE was designed to support context-based services with context sharing on wireless networks in UTOPIA (Ubiquitous computing TOwn Project: Intelligent context Awareness). The major purpose of this research is to provide a situation-aware environment, known as U-Town, by using sensors and mobile devices currently available to the public. The paper next introduces U-Theme Park service, which is one service in the U-Town environment. U-Theme Park uses MoCE to realize a personalized environment from various sensors.</p>
      </abstract>
      <kwd-group>
        <kwd>Context-based service</kwd>
        <kwd>mobile context management</kwd>
        <kwd>mobile application framework</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Fservices that capture and make efficient use of the data
uture computing environments will enable context-based
available through the sensors attached to various mobile and
embedded devices [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ][
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Recently, mobile devices have begun
to incorporate with various sensors, such as camera, GPS, and
RFID, and support communication via wireless networks such
as hot-spots (Wi-Fi, WiBro) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ][
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Such mobile devices use
various context-based services to share information and
computing resources among themselves via discovery
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ][
        <xref ref-type="bibr" rid="ref5">5</xref>
        ][
        <xref ref-type="bibr" rid="ref6">6</xref>
        ][
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>This paper emphasizes on the services that support, so called,
data-sharing particular to the situational data extracted by the
sensors of mobile devices. The data are known as contexts.
Using contexts, new mobile applications have been designed in</p>
      <p>
        our ubiquitous computing project named UTOPIA
(Ubiquitous computing Town Project: Intelligent context
Awareness) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ][
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. As shown in Fig. 1, UTOPIA aims to
provide intuitive interaction in ubiquitous computing
environments and to make new interface and service concepts
for efficient interaction [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. This project has been performed as
a joint research program of Yonsei University with SAIT
(Samsung Advanced Institute of Technology). We describe the
research into situation-aware services and P2P contexts sharing
performed in UTOPIA, 2004.
      </p>
      <p>We particularly classified the characteristics of contexts and
defined context flow. In order to support the context flow, we
developed MoCE (Mobile Context Explorer) to support P2P
context sharing, using a proposed two discovery protocols in a
wireless environment. New concepts of mobile services with
MoCE are proposed in this paper.</p>
    </sec>
    <sec id="sec-2">
      <title>II. CONTEXT FLOW</title>
      <p>
        To support context-based services, mobile devices gather
and recognize situational information called contexts to
provide more convenient services to the user. Contexts are
generated by environmental changes or by various user
activities. Context also includes information generated by a
computing system, a machine or user’s tool [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ][
        <xref ref-type="bibr" rid="ref3">3</xref>
        ][
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Schilit
and Adams defined context as “the constantly changing
execution environment” and they classified context into
computing environment, user environment, and physical
environment [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Dey and Abowd also defined context as “any
information that can be used to characterize the situation of an
entity [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].”
      </p>
      <p>From a different point of view, we divided contexts into
low-level contexts and higher-level contexts, and defined
low-level contexts as raw contexts and normal contexts. Raw
contexts are the variations in environments comprised of
informative data to be extracted from sensors or computing
devices. The raw contexts are physical, environmental data
from sensors (temperature, scene, etc.), state information of
electrical systems, including computing system (network
bandwidth, etc.), and meta-information about digital content
(user preference data, digital documents, etc.). Normal contexts
are defined as normalized data having the common data
structure required by services. Examples of low-level contexts
are shown in Fig. 2. Higher-level contexts are generated from
low-level contexts using context fusion, defined by the
requirements of the services providing intelligence, and derived
from through aggregation of lower-level contexts via context
fusion. Context fusion assembles context information from a
combination of related context services and extracts
higher-level understanding from lower-level sensory data.</p>
      <p>In the case of a driving information service, as shown in Fig.
3, contexts from several sensing devices are transferred to the
service according to context flow. The driving information
service supports the user’s driving with a meeting schedule
from PIMS (Personal Information Management System), the
camera and GPS of the car’s navigation system. Meeting
schedule and location, scene in front of the car, and location
and speed of the car are acquired as raw contexts. Among these
contexts, meeting schedule and bitmap image data of the scene
are transformed to normalized contexts. These normalized
contexts are aggregated and transformed to higher-level
contexts. These higher-level contexts are time of arrival at
meeting location and driving information such as road number,
speed limit, traffic status, and so on. The driving information
service gathers those higher-level contexts and displays them to
driver or sends the information to the meeting attendees.</p>
      <p>III. TECHNOLOGIES FOR THE U-TOWN ENVIRONMENT
In the U-Town environment, user interactions can be
performed through image-based sensors, touch screens, etc.
Many components are required to execute the service in the
U-Town environment, which operates in mobile devices. These
mobile devices can communicate with each other or with the
other management systems through a wireless network.
Specifically, the service uses a MoCE (Mobile Context
Explorer) framework designed for providing and using
contexts for intelligent services in a mobile environment.</p>
      <sec id="sec-2-1">
        <title>A. Image-based sensor (Color code)</title>
        <p>
          Color code is a two-dimensional (2D) code that represents
Fig. 3. Context Flow: Driving Information Service
data using either four or more colors, or three or more levels of
gray. A color code can be used effectively to link off-line
objects in the real world and on-line digital data in cyberspace.
TABLE I shows several models for color code according to
color formation [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>Since the color code is printable, it can be attached to various
objects, including the print medium itself. Moreover, the
information associated with the color code can be accessed
anytime and anywhere, via wired and wireless communication
channels. It is possible to retrieve useful information from a
pre-designated database by capturing and recognizing the color
codes present. When a camera in a mobile device detects a
color code, a decoding program interprets the color code ID,
accesses the database, and provides appropriate information,
such as URL, moving picture, or contact address. Fig. 4 shows
this model for processing color codes.</p>
        <p>A new interface using color codes allows any printed
information to be included in the media that can be read
automatically by using a camera. Moreover, this interface can
be adapted to the Internet easily without directly typing on the
keyboard. To summarize, color codes have the following
advantages:</p>
        <p>1) Color: Until now, the existing codes used only a
combination of black and white to present information. This
paper details the design and implementation of new codes using
color as a major characteristic to compare with other codes or
code systems. Since codes using colors are difficult to
recognize, research on this approach has yet to be carried out.</p>
        <p>2) Cost-efficiency: Color codes are more cost-efficient than
electronic tags and barcodes. Color codes, like barcodes, are
printable. Although barcodes consists of only black and white,
they need high quality printing ink and paper. Electronic tags
need expensive memory to store RFID. Color codes, on the
other hand, can be used well, regardless of print medium or ink
quality.</p>
        <p>3) General reader: Color codes can be read using general
input devices such as cameras, as opposed to the expensive
laser or image scanners required to read barcodes and 2D codes.
Likewise, high-precision electronic readers are required to
decode RFID tags.</p>
        <p>Since color code technology offers cost-efficiency and
ease-of-use, information management using color codes would
pave the way for various applications linked physical objects
and digital data in cyberspace.</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. MoCE Architecture</title>
        <p>MoCE was designed to support context-based services with
context sharing on wireless networks. In order to share contexts,
a mediation architecture is needed to interface and control
context requests and offers between devices. With the
mediation architecture, context mediator (CM), which supports
context consumers was designed. In addition, Embedded
Context Provider (ECP), which senses raw contexts from
various sensors and transfers them to CM was designed for
controlling the access to sensors.</p>
        <p>As shown in Fig. 5, the MoCE is composed of a MoCE core
layer, a MoCE communication layer, and a MoCE interface
layer. The descriptions for the three layers follow:
z MoCE Interface Layer: This layer provides interface
between CM and services, and manages the list of
sensor devices attached to ECP.
z MoCE Core Layer: This layer manages the operations
of all the components. The core layer of ECP controls
context gathering and transformation, and remote-event
generation. The core layer of CM controls the
connected sensors, remote event processing, and
context database.
z MoCE Communication Layer: The communication
layer discovers context providers (ECP) by using
Context Discovery Protocol and transfers the contexts
Fig. 4. Color Code System Processing Model
Fig. 5. Layered System Architecture of MoCE
from ECP to CM.</p>
        <p>These layers of MoCE were designed to be structurally
independent of each other. With the independence between
layers, MoCE supports flexibility and extensibility in each
component.</p>
        <p>1) Context Mediator (CM): The CM, positioned inside the
user’s device, scans for the ECP, which provides the needed
context in the vicinity, and forwards the received context to the
service. At this stage, the service communicates with the
API(Application Programming Interface)-based service
interface designated by MoCE.</p>
        <p>2) Embedded Context Provider (ECP): The ECP takes a role
in managing the sensors connected to small embedded devices
or mobile devices. The ECP extracts the context, sending it to
the CM. Sensors acquire context and transmit it to the ECP via
the API-based sensor interface, designated by MoCE.</p>
      </sec>
      <sec id="sec-2-3">
        <title>3) Context Discovery Protocol: The context discovery</title>
        <p>
          protocols of MoCE were designed for discovering context
providers on a hot-spot wireless LAN environment. This
protocol does not use directories or registries, such as Lookup
Service of JINI™ [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] and DA (Directory Agent) of SLP [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ],
for discovering context providers. These directories should be
maintained with the most recent service's list/proxy resulting
from the movements of the mobile devices and the continuous
addition/subtraction of context providers. In context discovery
protocol, however, context providers receive a discovery
request via UDP multicast, and then if a provider may supply
the requested context, it sends a discovery reply via UDP
unicast. Thus, a user can discover context providers by
interpreting variable attributes, such as location, which change
dynamically. However, this protocol has some problems with
communication among many CMs and ECPs in a hot-spot
wireless LAN environment that have low bandwidth and poor
stability. When ECPs receive a discovery request from CMs
sharing an identical access point in a hot-spot wireless LAN
environment, those with matching context attributes will send
out discovery reply almost simultaneously. As a result, the
access point or hub receiving those reply packets will most
likely overflow the transfer buffer; dropouts will then occur,
causing the discovery success rate to be lowered. To solve this
problem, in this paper, we propose two protocols. Upon
accepting a discovery request from the ECP, Fast Discovery
Protocol (FDP) waits for a random time and then transmits a
discovery reply. This protocol blocks ECP from sending
simultaneous discovery replies and minimizes the packet loss
rate caused by overflow in the AP’s transfer buffer overflow. If
the total number of ECPs increases and packet dropouts occur,
then the CM should retransmit the discovery request to
complete the discovery process. Reliable Discovery Protocol
(RDP), our second proposal, is such protocol where the ECP
breaks down the discovery reply into equally-sized packets,
and then each fragmented packet waits for a random time and
transmits it. This protocol reduces the size of simultaneously
sent discovery replies and avoids overflow in the AP, or hub,
with timing differences. It is possible that the CM detects the
existence of all ECPs, as loss of the whole set of packets is
unlikely. If, in fact, there was a packet loss, successful
completion of the discovery could be accomplished through
retransmission via UDP unicast. This method has the advantage
of being able to avoid network traffic increase from UDP
multicasts. On the contrary, this protocol is incapable of
analyzing the data with parts of the lost packet.
        </p>
        <p>4) Context Transfer: Context transfer is required to acquire
contexts after appropriate ECPs are discovered. This stage
performs the negotiation for connection establishment between
CM and ECP with a password-based security authority. The
transmission of context is provided by two mechanisms: (1)
transmission after the CM’s request (pull method); (2)
transmission after a specific event in the ECP, such as change of
context (push method).</p>
        <p>IV. IMPLEMENTATION OF U-THEME PARK SERVICE</p>
      </sec>
      <sec id="sec-2-4">
        <title>A. Concept and Scenario</title>
        <p>The U-Theme Park service prototype is one of the U-Town
services in the UTOPIA project. U-Theme Park provides
various services based on a user-centric context. A user's
mobile device gathers context, which it acquires from various
sensors or computing devices, using the MoCE framework.
Currently, U-Theme Park is composed of four detailed services,
as shown in TABLE II. A scenario for each service in U-Theme
Park is detailed below.</p>
        <p>◆ Location Information Service
1. A user's mobile device automatically recognizes a current
location using GPS.</p>
        <p>2. The current user's location is highlighted on the theme
park map in the mobile device.</p>
        <p>3. The user can recognize his or her location and attractions
in the surrounding area.</p>
        <p>◆ Buddy Finder Service
1. All members of a group appoint their secure password.
2. If a user hopes to find a buddy's location, the user inputs
the buddy’s name and secure password.</p>
        <p>3. The user can find the buddy's location on the theme park's
map.</p>
        <p>4. The mobile device periodically traces the buddy's location
on the map for the user's needs.</p>
        <p>◆ Attraction Information Service
1. A user selects an attraction on the theme park map or
recognizes a color code attached in front of an attraction.</p>
        <p>2. The service provides the user with detailed information
about the selected attraction.</p>
        <p>3. The user clicks the 'Current Status' button to learn the
current wait time or showtime of the attraction, and a live
snapshot of the attraction is transferred to the mobile device,
which displays it to the user.</p>
        <p>◆ Tour Path Recommendation Service
1. A user selects his or her tour preference for amusement
rides among some menus on the screen, for example, thrill,
romance, and youths.</p>
        <p>2. The mobile device gathers all of the attraction's wait times
and showtimes.</p>
        <p>3. The mobile device calculates an optimized tour path by
user's preference.</p>
        <p>All these services operate on the user's mobile device.
Moreover, these services gather and use locations, waiting
times, showtimes, tag recognition, and snapshots using the
MoCE framework. Fig. 6 shows screenshots of each detailed
service on the mobile device.</p>
      </sec>
      <sec id="sec-2-5">
        <title>B. System Architecture</title>
        <p>The prototype of U-Theme Park service uses previously
stored map information for the theme park, GPS and camera
sensor in the user’s mobile device. The service also has a form
where a user’s mobile device is in communication with the
server system of the theme park and other users’ mobile devices
via 802.11g wireless network.</p>
        <p>TABLE II
U-THEME PARK: SUMMARY OF DETAILED SERVICES</p>
        <p>Service Name</p>
        <sec id="sec-2-5-1">
          <title>Location Information Service</title>
        </sec>
        <sec id="sec-2-5-2">
          <title>Buddy Finder Service</title>
          <p>Description
tracing current location of the user
using GPS
tracing location of family members or
friends</p>
        </sec>
        <sec id="sec-2-5-3">
          <title>Attraction Information Service retrieving information of various rides and events</title>
        </sec>
        <sec id="sec-2-5-4">
          <title>Tour Path Recommendation Service recommending a optimized tour path according to user's preference</title>
          <p>Fig. 7. System Architecture of U-Theme Park</p>
          <p>U-Theme Park is implemented using the MoCE framework
and gathers context using CM. CM not only provides context in
user devices, but also provides context in other computing
devices to a service. Fig. 7 shows the currently developed
system architecture.</p>
          <p>As shown in Fig. 7, location from GPS and tag information
that has been recognized by camera sensor in the user’s device,
are provided to the service via ECP. Location, one of the
contexts generated by the user device, is periodically sent to the
service. Tag recognition information is also transmitted to the
service according to change of context. The location
information service shows the user’s location on the map
according to gathered location context, and the Attraction
Information Service shows amusement ride and event
information according to inputted tag IDs.</p>
          <p>Buddy Finder Service can receive location context by
communicating with ECP which is installed on other user
devices via wireless network. First of all, the service locates a
friend via discovery protocol. And then if the user wants to
track the location of the buddy, the service periodically receives
location from the buddy’s ECP.</p>
          <p>Finally, the Tour Path Recommendation Service gathers
current state information, waiting time, and riding time of
amusement rides from ECP, which may be installed at control
system of all attractions. Based on gathered information and
inputted user’s preferences, the service selects attractions
suitable for the user, and the mobile device shows an optimized
path to user, based on moving time, waiting time, and using
time of a selected attractions.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>V. CONCLUSION AND FUTURE WORK</title>
      <p>This paper designs and implements a prototype of U-Theme
Park service for user-centric, situation-aware service. U-Theme
Park service is a part of U-Town of the UTOPIA project, and
uses various sensors and mobile devices in a ubiquitous
computing environment. U-Theme Park service uses managing
information of a theme park, such as wait time for an
amusement ride, and event information, as well as GPS and
camera sensors for acquiring location and tag information.
Currently, U-Theme Park consists of a Location Information
Service, a Buddy Finder Service, an Attraction Information
Service, and a Tour Path Recommendation Service. Each
service provides useful information to the user by using the
various contexts around the user.</p>
      <p>The MoCE framework is used to implement the U-Theme
Park service. The MoCE framework supports context-based
services with context sharing on wireless network. The
framework gathers context, which is generated by various
sensors and computing devices, and transfers context to the
service to develop situation-aware service.</p>
      <p>In the future, we will improve our service to make it more
convenient for users by communicating between several
computing devices and sensors that can exchange context
mutually in a wider range of areas. For example, we can
comment on a U-Government plan and we are on schedule to
provide this kind of service at Shinchon, Seoul, in 2006; our
UTOPIA team will participate in this plan.</p>
    </sec>
    <sec id="sec-4">
      <title>ACKNOWLEDGMENT</title>
      <p>We would like to thank Samsung Electronics Co. Ltd. and
KTF for providing the smart phones (MITS 400) and the
mobile phones (KTF cellular phone). We also acknowledge the
CDMA network support of SKT (SK Telecom) and KTF.
Many thanks to the Office of Information Systems, the
Informatization Promotion Committee and the Office of
External Affairs &amp; Development at Yonsei University for
providing administrative support for the UTOPIA project.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Brézillon</surname>
          </string-name>
          , “
          <article-title>Focusing on context in human-centered computing</article-title>
          ,
          <source>” IEEE Intell. Syst.</source>
          , Vol.
          <volume>18</volume>
          , pp.
          <fpage>62</fpage>
          -
          <lpage>66</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Daftari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Mehta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bakre</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X. H.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <article-title>"On design framework of context aware embedded systems,"</article-title>
          <source>in Proc. Monterey Workshop</source>
          , Chicago, USA, Sept.
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Mantyjarvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Himberg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Huuskonen</surname>
          </string-name>
          ,
          <article-title>"Collaborative Context Recognition for Handheld Devices,"</article-title>
          <source>in Proc. 1st IEEE International Conference on Pervasive Computing and Communications (PerCom'03)</source>
          , Fort Worth, USA,
          <year>2003</year>
          , pp.
          <fpage>161</fpage>
          -
          <lpage>168</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Benford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Magerkurth</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Ljungstrand</surname>
          </string-name>
          ,
          <article-title>"Bridging the PHYSICAL AND DIGITAL in Pervasive Gaming," COMMUNICATIONS OF THE ACM</article-title>
          , vol.
          <volume>48</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>54</fpage>
          -
          <lpage>57</lpage>
          , Mar.
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>T.</given-names>
            <surname>Hofer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Schwinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pichler</surname>
          </string-name>
          , G. Leonhartsberger,
          <string-name>
            <given-names>J.</given-names>
            <surname>Altmann</surname>
          </string-name>
          , and
          <string-name>
            <given-names>W.</given-names>
            <surname>Retschitzegger</surname>
          </string-name>
          ,
          <article-title>"Context-awareness on mobile devices - the hydrogen approach,"</article-title>
          <source>in Proc. International Hawaiian Conference on System Science (HICSS'03)</source>
          , Hawaii, USA, Jan.
          <year>2003</year>
          , pp.
          <fpage>292</fpage>
          -
          <lpage>301</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Talwar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D. P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          , “
          <article-title>Jini home networking: A step toward pervasive computing</article-title>
          ,
          <source>” IEEE Computer</source>
          , Vol.
          <volume>35</volume>
          , pp.
          <fpage>34</fpage>
          -
          <lpage>40</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Dey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Salber</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. D.</given-names>
            <surname>Abowd</surname>
          </string-name>
          ,
          <article-title>"A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications," Human-Computer Interaction (HCI) Journal</article-title>
          , vol.
          <volume>16</volume>
          , pp.
          <fpage>97</fpage>
          -
          <lpage>166</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Han</surname>
          </string-name>
          and et al.,
          <article-title>"Implementation of New Services to Support Ubiquitous Computing for Campus Life,"</article-title>
          <source>in Proc. 2nd IEEE Workshop on Software Technologies for Embedded and Ubiquitous Computing Systems (WSTFEUS</source>
          <year>2004</year>
          ), Vienna, Austria, May
          <year>2004</year>
          , pp.
          <fpage>8</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Han</surname>
          </string-name>
          and et al.,
          <article-title>"Implementation of New Services to Support Ubiquitous Computing for Town Life,"</article-title>
          <source>in Proc. Workshop on Software Technologies for Future Embedded &amp; Ubiquitous Systems (SEUS</source>
          <year>2005</year>
          ), Seattle, USA, May
          <year>2005</year>
          , pp.
          <fpage>45</fpage>
          -
          <lpage>49</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>B.</given-names>
            <surname>Schilit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Adams</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Want</surname>
          </string-name>
          ,
          <article-title>"Context-aware computing applications,"</article-title>
          <source>in Proc. IEEE Workshop on Mobile Computing Systems and Applications</source>
          , Santa Cruz, USA,
          <year>1994</year>
          , pp.
          <fpage>85</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Han</surname>
          </string-name>
          and et. al., “
          <article-title>Machine readable code and method and device of encoding and decoding the same</article-title>
          ,
          <source>” Japan Patent</source>
          <volume>3336311</volume>
          ,
          <string-name>
            <surname>Aug</surname>
          </string-name>
          .
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Guttman</surname>
          </string-name>
          ,
          <article-title>"Service Location Protocol: Automatic Discovery of IP Network Services,"</article-title>
          <source>IEEE Internet Computing</source>
          , vol.
          <volume>3</volume>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>80</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <article-title>Tack-Don Han received the B.S. degree in electronic engineering</article-title>
          from Yonsei University, Seoul, Korea, in
          <year>1978</year>
          , and the M.S. degree in computer engineering from Wayne State University in
          <year>1983</year>
          .
          <article-title>In 1987, he received the Ph.D. degree in computer engineering</article-title>
          from the University of Massachusetts at Amherst.
          <article-title>He is a professor in the Department of Computer Science at</article-title>
          the Yonsei University, Korea.
          <article-title>His research interests include high performance computer architecture, media system architecture, and HCI(Human Computer Interface)</article-title>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>