Rodriguez-Carrion, Alicia; García-Rubio, Carlos; Campo-Vázquez, Celeste; Cortés, Alberto; García-Lozano, Estrella Study of LZ-Based Location Prediction and Its Application to Transportation Recommender Systems Journal Article In: Sensors , vol. 12, iss. 6, pp. 7496-7517, 2012, ISSN: 1424-8220. Abstract | Links | BibTeX | Tags: active lezi, Ambient intelligence, españavirtual, gsm-based location, lezi update, lz, prediction, recommender system, Ubiquitous computing Yndurain-Gil, Elena; Bernhardt, D; Campo-Vázquez, Celeste Augmenting Mobile Search Engines to Leverage Context Awareness Journal Article In: IEEE Internet Computing, vol. 16, iss. 2, pp. 17-25, 2012, ISSN: 1089-7801. Abstract | Links | BibTeX | Tags: Mobile communication, search process, Ubiquitous computing Forné, Jordi; Hinarejos, Francisca; Marín, Andrés; Almenárez, Florina; Lopez, Javier; Montenegro, Jose A.; Lacoste, Marc; Díaz, Daniel Pervasive authentication and authorization infrastructures for mobile users Journal Article In: COMPUTERS & SECURITY, vol. 29, iss. 4, pp. 501-514, 2009, ISSN: 0167-4048. Abstract | Links | BibTeX | Tags: authentication, Authorization, ITACA, security architecture, trust, Ubiquitous computing, Ubisec2012
@article{campo009b,
title = {Study of LZ-Based Location Prediction and Its Application to Transportation Recommender Systems},
author = {Alicia Rodriguez-Carrion and Carlos García-Rubio and Celeste Campo-Vázquez and Alberto Cortés and Estrella García-Lozano },
url = {http://hdl.handle.net/10016/27902},
doi = {https://doi.org/10.3390/s120607496},
issn = {1424-8220},
year = {2012},
date = {2012-06-04},
urldate = {2012-06-04},
journal = {Sensors },
volume = {12},
issue = {6},
pages = {7496-7517},
abstract = {Predicting users' next location allows to anticipate their future context, thus providing additional time to be ready for that context and react consequently. This work is focused on a set of LZ-based algorithms (LZ, LeZi Update and Active LeZi) capable of learning mobility patterns and estimating the next location with low resource needs, which makes it possible to execute them on mobile devices. The original algorithms have been divided into two phases, thus being possible to mix them and check which combination is the best one to obtain better prediction accuracy or lower resource consumption. To make such comparisons, a set of GSM-based mobility traces of 95 different users is considered. Finally, a prototype for mobile devices that integrates the predictors in a public transportation recommender system is described in order to show an example of how to take advantage of location prediction in an ubiquitous computing environment.},
keywords = {active lezi, Ambient intelligence, españavirtual, gsm-based location, lezi update, lz, prediction, recommender system, Ubiquitous computing},
pubstate = {published},
tppubtype = {article}
}
@article{campo010,
title = {Augmenting Mobile Search Engines to Leverage Context Awareness },
author = {Elena Yndurain-Gil and D Bernhardt and Celeste Campo-Vázquez},
url = {https://ieeexplore.ieee.org/document/6133261},
doi = {https://doi.org/10.1109/mic.2012.17},
issn = {1089-7801},
year = {2012},
date = {2012-01-17},
urldate = {2012-01-17},
journal = {IEEE Internet Computing},
volume = {16},
issue = {2},
pages = {17-25},
abstract = {Mobile phones are becoming the chosen platforms for web access, with a forecast that over the coming decade more users will connect to the internet through mobile than conventional desktop computers. Internet search is likely going to remain one of the major ways to find information and services on the web. In order to provide satisfactory usability, mobile searches will have to take into consideration the nature of handsets. Being both pervasive and person-centric they continuously capture information about users and their context. Context awareness can enhance the mobile search experience by augmenting user queries with context information captured through the handset's sensors. In this paper we propose a unified architecture supporting context-awareness in mobility and show how it can be applied to mobile searches. Based on real life contextual data captured from handsets we discuss design approaches and end-user benefits of making mobile searches more context-aware.Mobile phones are becoming the chosen platforms for web access, with a forecast that over the coming decade more users will connect to the internet through mobile than conventional desktop computers. Internet search is likely going to remain one of the major ways to find information and services on the web. In order to provide satisfactory usability, mobile searches will have to take into consideration the nature of handsets. Being both pervasive and person-centric they continuously capture information about users and their context. Context awareness can enhance the mobile search experience by augmenting user queries with context information captured through the handset's sensors. In this paper we propose a unified architecture supporting context-awareness in mobility and show how it can be applied to mobile searches. Based on real life contextual data captured from handsets we discuss design approaches and end-user benefits of making mobile searches more context-aware.},
keywords = {Mobile communication, search process, Ubiquitous computing},
pubstate = {published},
tppubtype = {article}
}
2009
@article{marin001,
title = {Pervasive authentication and authorization infrastructures for mobile users},
author = {Jordi Forné and Francisca Hinarejos and Andrés Marín and Florina Almenárez and Javier Lopez and Jose A. Montenegro and Marc Lacoste and Daniel Díaz},
url = {https://www.sciencedirect.com/science/article/pii/S0167404809000911?via%3Dihub},
doi = {https://doi.org/10.1016/j.cose.2009.09.001},
issn = {0167-4048},
year = {2009},
date = {2009-09-25},
urldate = {2009-09-25},
journal = {COMPUTERS & SECURITY},
volume = {29},
issue = {4},
pages = {501-514},
abstract = {Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and testbed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like: (i) dynamic and collaborative trust model, (ii) use of attribute certificates for privilege management, and (iii) modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities.},
keywords = {authentication, Authorization, ITACA, security architecture, trust, Ubiquitous computing, Ubisec},
pubstate = {published},
tppubtype = {article}
}
Publications
Study of LZ-Based Location Prediction and Its Application to Transportation Recommender Systems Journal Article In: Sensors , vol. 12, iss. 6, pp. 7496-7517, 2012, ISSN: 1424-8220. Augmenting Mobile Search Engines to Leverage Context Awareness Journal Article In: IEEE Internet Computing, vol. 16, iss. 2, pp. 17-25, 2012, ISSN: 1089-7801. Pervasive authentication and authorization infrastructures for mobile users Journal Article In: COMPUTERS & SECURITY, vol. 29, iss. 4, pp. 501-514, 2009, ISSN: 0167-4048.2012
2009