Abstract
We suggest a simplified application model that could apply the information to the automated processing system after studying user’s behavior patterns using authentication and access control for identity certification of users on ubiquitous computing environments. In addition, we compared captured video images in the fixed range by pixel unit through some time and checked disorder of them. According to experimental results, the proposed method is very reasonable to believe that we could extend various multimedia applications in our daily lives.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
PalmOS Emulator, http://www.palmos.com/dev/tech/
Sun Microsystems, Jini Technology core Platform Specification (June 2003), http://java.sun.com/d-eveloper/products/jini/index.jsp
HAVi Forum, HAVi Specification 1.1 (May 2001), http://www.havi.org
UPnP Forum, UPnP Device Architecture 1.0 (December 2003), http://www.upnp.org
Callaway, E., et al.: Home Networking with IEEE802.15.4. IEEE Comm. Mag. (2002)
Sakamura, K.: Ubiquitous Computing KAKUMEI (2002)
Park, J.H., et al.: Multi-Agent System absed Home Network Management System using Extended Tuple Space Model. In: SAM 2002 SCOPE (2002)
Kindberg, T., Fox, A.: System Software for Ubiquitous Computing. Pervasive Computing (2002)
Feng, Y., Dr. Zhu, J.: Wireless Java programming with J2ME, .Sams (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sung, KS., Lee, D.C., Kim, HC., Oh, HS. (2005). Home Network Observation System Using User’s Activate Pattern and Multimedia Streaming. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_11
Download citation
DOI: https://doi.org/10.1007/11553939_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28896-1
Online ISBN: 978-3-540-31990-0
eBook Packages: Computer ScienceComputer Science (R0)