Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit
IEEE/ACM Transactions on Networking (TON)
The Challenges of Wearable Computing: Part 1
IEEE Micro
The wearable remembrance agent: a system for augmented memory
ISWC '97 Proceedings of the 1st IEEE International Symposium on Wearable Computers
The Conference Assistant: Combining Context-Awareness with Wearable Computing
ISWC '99 Proceedings of the 3rd IEEE International Symposium on Wearable Computers
A Collaborative Wearable System with Remote Sensing
ISWC '98 Proceedings of the 2nd IEEE International Symposium on Wearable Computers
MIThril 2003: Applications and Architecture
ISWC '03 Proceedings of the 7th IEEE International Symposium on Wearable Computers
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
An integrated architecture for surveillance and monitoring in an archaeological site
Proceedings of the third ACM international workshop on Video surveillance & sensor networks
IEEE Journal on Selected Areas in Communications
Interaction Wearable Computer with Networked Virtual Environment
Proceedings of the 13th International Conference on Human-Computer Interaction. Part III: Ubiquitous and Intelligent Interaction
Hi-index | 0.00 |
This paper studies the issue of using the wearable computer as a remote sensing device of a large-scale factory. The infrastructure of ubiquitous security environment to realize the remote sensing capability for the security guard is presented in this paper. This paper also scheme out a wearable computing scenario for the security guard under such a ubiquitous security environment. That is, through the help of the wearable computer, the security guard can remotely sensing the security status of each building when he is patrolling a large-scale factory. To achieve a seamless remote sensing environment, we use the wireless AP (Access Point) as the relay between static sensor networks installed inside each building and the mobile sensing device worn on the security guard. The AP enable the wearable computer to seamless receive security status of each building and upload the wearer status to the security control center at the same time. Furthermore, this research adopts the technology of embedded Linux to design a middleware for the wearable computer. The proposed architecture of the wearable computer is scalable, flexible and modular for the mobile computing system. Finally, this paper elaborates a seamless connection approach for the wearable computer within a ubiquitous security environment.