IEEE Consumer Communications & Networking Conference
Related Events


Title:     Communication System Between Deaf-blind People and Non-disabled People using Body-Braille and Infrared Communication
   Satoshi Ohtsuka (Gunma National College of Technology, JP); Nobuyuki Sasaki (Tsukuba University of technology, JP)

     There are several barriers to communicate between deaf-blind people and non-disabled people.
The communication method of deaf-blind people is totally different from the language of non-disabled people, so they can't communicate with each other directly. Most importantly, deaf-blind people can't understand whether a communication partner is nearby or not. We resolved  these issues by developing a system in which deaf-blind people can communicate bidirectionally using an infrared remote control system. In this system, as a result of the establishment of an infrared communication link, deaf-blind people can detect that communication partners are nearby.

Title:   An OpenID Provider based on SSL Smart Cards
    Pascal Urien (Ecole Nationale Supérieure de Télécommunication, FR)

    This innovative demonstration shows strong authentication (without password) for OPENID, according to a plug and play paradigm, based on SSL smart cards. It presents two user experiences, a plug and play strong authentication with real OpenID WEB sites, and remote identity management by an original identity server compatible with SSL smart cards.

Title:    iImage---An iPhone Image Based Information Retrieval Application
 Stephen Bock,  Sherman Newsome and Qia Wang (Univ. of Missouri, US);  Wenjun Zeng (Univ. of Missouri, Columbia, US); Xiaofan Lin and Jian Lu (Vobile Inc., US)

Image processing is a powerful technology that can be used to analyze an image for many useful purposes. However, software like this is often out of the typical user's reach. iImage directly confronts this problem. The iImage application takes the sophisticated technologies of image analysis and identification and makes them readily available on the go. With the use of the iPhone Source Development Kit, iImage has become an application
that is available on the world's most popular mobile device. The user simply takes a photo using the iPhone's built in camera, and in seconds appear similar images with relevant information from within our database.

Title:    A Web-based Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking
     Mitsuo Okada,  Yasuo Okabe and Tetsutaro Uehara (Kyoto University, JP)

A privacy-secure content trading system based on semi-blind fingerprinting is presented. Semi-blind fingerprinting provides privacy-secure content trading as secure as blind fingerprinting at feasible processing cost with sufficient robustness. This system assures a fair trading for both a content provider and a purchaser
which is effective for a market where a number of small or not so reliable content providers deal with purchasers. We have been aiming at providing a useful tool for the market by overcoming the following defects. In the basic models of conventional fingerprinting, the user's security could be guaranteed only under the premise that a content provider was perfectly trustworthy. Such premise makes a system unpractical. To overcome this defect, various scheme of blind fingerprinting have been proposed in which cryptography technique is used in order to protect user's privacy. However, these are not practical due to heavy computation cost and insufficient robustness of watermark against manipulations. The semi-blind fingerprinting fulfills the need for both feasibility and robustness by altering encryption with image decomposition that blinds up an image to be unrecognizable. Image decomposition and a customized embedding algorithm are implemented to a web-based system, whose perceptual condition of decomposed images and robustness of watermark is evaluated.

Title:    MAEMO-based Scalable Platform for Construction of User-driven Social Location Based Services
Authors:   Yevgeni Koucheryavy (Tampere University of Technology, Finland); Sergey I. Balandin (Nokia Research Center, Finland); Kirill Krinkin (LETI, Russia)

Abstract:    The demo presents MAEMO-based scalable platform for easy development of the Social Location Based Services. This platform allows implementation of the new user-driven social services and incorporation of the user-generated content with the publicly available geo maps.

Title:     NAL-SIM: An Interactive Simulator for H.264/AVC Video Coding and Transmission
Authors:      Hadi Hadizadeh and  Ivan Bajic (Simon Fraser University, CA)  

Abstract:     In this paper we present a high-level graphical simulator for video coding and transmission using the H.264/AVC standard.  The main objective of the developed simulator is to build an overall video communication system model including source encoding, channel modeling and decoding in order to interactively investigate the performance of various H.264/AVC coding schemes in the face of bandwidth constraints and channel errors. The developed simulator can be employed as a useful research or educational tool for video communication systems   
based on the H.264/AVC video coding standard.  

Title:    Demonstration of Web Contents Collaborative System for Call Parties
Authors:     Haruno Kataoka, Masashi Toyama, Yoshiko Sueda and Kenji Takahashi (NTT Corporation, Japan);  Osamu Mizuno (Kogakuin University, Japan)  

Abstract:   We demonstrate a mock-up that enables the sharing of existing Web contents between the caller and receiver in a phone call. Two methods for this sharing are described. One is a mash-up method using APIs that existing Web contents provide. The other is a proxy method that uses existing Web contents as is. Both methods   
can be used with basic Web browsers.  

Title:    The ?-ARK Device Family for The Emergency Situations  
    Atsuo Inomata (NARA Institute of Science and Technology, JP); Hironobu Suzuki (Hironobu SUZUKI Office, Inc., JP); Hiroyuki Ohno (Kanazawa University, JP)  
Abstract:  Telecommunication devices are very important for our daily life. However we think it is difficult for everybody to use the communication devices effectively in an emergency unless they are normally being used. Therefore, in our research, we have defined the emergency situations first of all. Then we have started developing information communication systems on smart phones and PDAs for the emergency situations. Note that according to our definition, huge natural disasters (e.g. great earthquakes such as Hanshin-Awaji (1995) and Noto (2007) in Japan, Sichuan(2008) in China), pandemic of new infective disease (e.g. swine and bird flu in 2009), unexpected terrorist attacks in many metropolis are part of the emergency situations.  Since we have to consider an effective measure taking advantage of these experiences especially from the perspective of the information and communication technologies, we have started discussing about framework that should have usefulness on information communications in an emergency just after the great Hanshin-Awaji earthquake hit Japan in 1995. We have already developed 'Internet-based victim information registration and retrieval system (IAA System)' and 'Emergency Information communication Service Research and Development System (EIS-RDS)'. Some of the problems in an emergency were able to be solved by these systems. However, they are not enough.  Various kinds of new information services and state-of-the-art electronic devices have been implemented on many scenes in our current society. Most of them are based on new information communication technologies such as Wi-Fi (wireless LAN), high-speed data service on 3G/GSM network, identity authentication, and so on. However, there is an afraid of the malfunctions of the telecommunication services in case of the emergency. Congestion of the cellular phone and delay of the mail delivery are well-known problems.  Meanwhile, how to notify a present condition or status from inside of the stricken and damaged area to the outside? How to confirm and provide the latest information of them to another people? Unfortunately there is no useful method yet in case of the emergency. Of course, since recent smart cellular phones are high-performance information communication devices, they perform like small personal computers (e.g. Apple iPhone 3G series or Google Android Devices). However we think this is very unworthy if this high performance is of no avail for the emergency situations.  We defined a basic concept and implemented a small database system on a high performance Linux PDA to manage victims' information. This system consists of a web server, web proxy, an IP router and a gateway function for information publishing to a public and government. When coping with various emergencies with this device, we need to refer to useful information on the Internet. At this time, we took into consideration the possibility of the malfunctions of the Internet access. We tried to develop an electronic implementation of the 'Swiss ARmy Knife' style device called 'e-ARK'. It provides the following functions. We have developed a prototype of Zark (e-ARK implementation on Zaurus PDA) which is our first son of thee-ARK family. The e-ARK device is able to form a powerful information communication network. Generally it is necessary to form and construct a small network such as the mobile ad-hoc type communication with limited delay for the emergency. Even if a victim is left alone in the disaster area in the very early stage ('Self-Help term') of the emergency, the victim is able be acquire and provide important information over the net using the e-ARK, device. Then the victim can wait for 'Mutual-Help' without anxiety. We have already carried out an interview to an officer of a local government (Noto-earthquake in Ishikawa prefecture Japan). Therefore we have an advantage for the e-ARK device on the emergency information communication system in Japan.    We have also discussed next generation of Zark in the age of cloud computing. We mentioned about Apple's iPhone and Google's Android that could behave a terminal of cloud computer but a terminal is hard to work in narrow-band or network disconnect situation. Therefore, the next generation of Zark should work not only network bridge and router but also proxy server for local network.  In this demonstration, we introduce the latest version of '?-ARK' (Electronic/Emergency ARmy Knife) device family that we have been developing since 2006.  
Title:    Delivering Internet Media Services to Consumer Electronics Devices in Personal Networks
Authors:      Johan Hjelm, Kenta Yasukawa, Ryoji Kato, Shinta Sugimoto and Takeshi Matsumura (Ericsson Research, Japan);  Andreas Fasbender and Martin Gerdes (Ericsson Research, Germany);  Mikael Woxblom (Ericsson Research, Sweden)  

Abstract:     DLNA devices do, by definition, not support remote connectivity. Even if attached to a LAN that is connected to the Internet, they can generally not be used to consume streamed or downloadable media. By providing a gateway in a mobile phone that exposes a 'remote Digital Media Server' on the LAN, content from different online sources can be made available on locally connected media renderers. Adding to this, the capabilities of the mobile phone can be used to publish presence information of the devices, for example to enable remote control of home appliances for energy management. This paper describes a demonstration of how Internet media services are delivered to devices in a personal network, using the mobile phone as a service control point.  

Title:   Mobile and Interactive Social Television
Authors:      Sujeet Mate and Igor Curcio (Nokia Research Center, Finland) 
Abstract:   The Mobile and Interactive Social Television (MIST) demo introduces the concept of watching TV/Video content with people of interest via the mobile in a virtual shared space. In this shared space, the participants can interact and watch content together with others. The participants can talk to each other, see each other and also send text messages while watching the content. The coupling of content consumption and interaction allows users to have a common shared context of the viewing experience which creates a social experience that is both participative and interactive. The user feedback reveals that there is a clear and positive benefit and added value to the viewing experience.  

Title:   Automated document conversion system for simple multimedia platforms
Authors:    Francisco Castano, Rafael Martínez-Ãlvarez and Felipe Gil-Castiñeira  (Universidad de Vigo, ES);  Sergio Costas-Rodríguez (Universidade de Vigo, ES)

Abstract: Sharing documents across different platforms is highly necessary nowadays. However, many devices, as embedded ones, cannot deal with formats like PDF or PowerPoint, despite their widespread use.  In this paper we propose an automated format conversion system to allow the visualization of formats that are not supported in simple multimedia embedded devices.  

Title:   Evidence Collecting System from Car Black Boxes  
      Souhwan Jung, Kangsuk Chae, Daihoon Kim, Seohyun Jung and Jaeduck Choi (Soongsil University, KR)  

Abstract:  This demonstration shows how to collect evidence from car black boxes in a VANET environment. In recent years, CCTV has become a popular crime prevention tool. However, CCTV is costly to install and maintain.   
Furthermore, although a car black box CCTV provides high-quality information, their collection rate has been very low. In this paper, we will show how to effectively collect and manage the information obtained from car black boxes.  

Title:   Collaborative Service Enhancement in Intelligent Environments: Service Delivery from User Terminals to Infrastructure Devices
Authors:     Francisco Castano and Felipe Gil-Castiñeira (Universidad de Vigo, ES); Enrique Costa-Montenegro (University of Vigo, ES) 

Abstract:   We present a service model that allows terminals to extend their capabilities by delivering services to intelligent infrastructures. For example, a terminal may deliver a pack containing a visualization application and a file to an infrastructure screen.   We also present a variant where a user can invite other users to access a shared service on the infrastructure from other terminals.  

Title:    Know User Continuous Authentication System
Authors:    Ines Brosso (USP, BR); Graça Bressan (Escola Politécnica - Universidade de São Paulo, BR); Fernando Henrique Ferreira (Mackenzie University, BR); Wilson Ruggiero (University of Sao Paulo, BR)  

Abstract:  This work presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous authentication mechanism of users in software application. The KUCAS system makes use of environmental context information, users behavior analysis, the behavior theories of Skinner and the Mathematical Confidence of Dempster-Shafer Evidences Theory, that establishes trust levels to authenticate the user by his behavior analysis, during an application software, in a specific domain of the computer networks, in a period of time. The dynamics of enclosed management in this system compares the current behavior with the user's previous behaviors description and with the trust restrictions. In case of indications of changes in the user's behavior, the system provides the behavior analysis of the user using database restrictions information. If there are   
uncertainties and divergences, mechanisms of security and alert signals are triggered.  

Title:   Cross-Site Request Forgery: Attack and Defense
Authors:      Tatiana Alexenko, Wenjun Zeng and Suman Deb Roy (University of Missouri - Columbia, USA); Mark Jenne (Rose Hulman Institute of Technology, USA)  

Abstract:  Cross Site Request Forgery (CSRF) has emerged as a potent threat to Web 2.0 applications. Because of the stateless nature of the HTTP protocol, a malicious website can force the user's browser to send unauthorized requests to a trusted site. This demo provides hands on exposure of the various ways in which some popular web applications are exploited using CSRF, in addition to demonstrating techniques by which CSRF signatures can be detected and attacks effectively resisted even before initiation. The user needs only to install a browser extension to get notified about potential CSRF vulnerabilities. Because validating the Referer Header is a common CSRF prevention method, a novel solution to the Referer privacy issue will also be demonstrated.  

Title:   A Service-Oriented Platform for iTV applications deployment
Authors:    Didier Donsez, Stéphane Chomat, Kiev Gama, Walter Rudametkin and Lionel Touseau (Université Joseph Fourier, France)  
Abstract:   Interactive television is a new field for applications developers. However, the applications deployment has to take into account broadcast network constraints. This demonstration shows the design of service-oriented platform   
for the deployment of modular and dynamic iTV applications. Our proposition named OSGiTV is validated by a prototype of iTV platform using the OSGi platform and DVB MHP standards.  

Title:     Enabling Elastic Mobile Devices via Cloud Computing
Authors:          Simon Gibbs, Anugeetha Kunjithapatham, Sangoh Jeong, and Xinwen Zhang (Samsung, USA)

Abstract:         Cloud computing has the potential to radically increase the power of applications running on constrained consumer electronic (CE) devices. By making use of resources on the cloud, CE devices can potentially expand, or reduce, their processing capability in order to meet application demands. We look at how CE devices can dynamically leverage the cloud to perform heavy data processing or compute-intensive tasks. We build a web-friendly Elastic Application Framework and facilitate developers in creating applications that are able to run partially on a device and partially on a cloud platform (such as Amazon’s EC2 and Microsoft’s Azure). Our framework supports elastic application development on mobile device platforms including Windows Mobile and Android, and for Windows XP. In this demo we show two applications that are developed with our framework including elastic image processing and augmented reality. Our prototypes and experimental results indicate that our approach efficiently augments device capabilities and enables rich applications on constrained CE platforms.