Florian Michahelles - Academia.edu (original) (raw)

Uploads

Papers by Florian Michahelles

Research paper thumbnail of Adaptive interaction for enabling pervasive services

Abstract We describe an architecture that allows mobile users to access a variety of services pro... more Abstract We describe an architecture that allows mobile users to access a variety of services provided by pervasive computing environments. Novel to our approach is that the system selects and executes services taking into account arbitrary contextual information (eg location or preferences). Our architecture is based on an adaptive service interaction scheme; individual service requests are attributed by context constraints, which specify the adaption policy. Context constraints may relate to spatial or temporal concerns. We ...

Research paper thumbnail of Designing an Architecture for Context - Aware Service Selection and Execution

Research paper thumbnail of CAPEUS: An Architecture for Context-Aware Selection and Execution of Services

This paper introduces a comprehensive framework that allows mobile users to access a variety of s... more This paper introduces a comprehensive framework that allows mobile users to access a variety of services provided by their current environment (e.g. print services). Novel to our approach is that selection and execution of services takes into account the user’s current context. Instead of being harassed by useless activities as service browsing or configuration issues, environmental services get seamlessly aligned to the user’s present task. Thus, the challenge is to develop a new service framework that fulfils these demands. The paper proposes a document-based approach; so called Context-Aware Packets (CAPs) contain context constraints and data for describing an entire service request. The core framework, Context-Aware Packets Enabling Ubiquitous Services (CAPEUS), reverts to CAPs for realising context-aware selection and execution of services.

Research paper thumbnail of Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis

IEEE Internet Computing, 2009

RFID technology tracks the flow of physical items and goods in supply chains to help users detect... more RFID technology tracks the flow of physical items and goods in supply chains to help users detect inefficiencies, such as shipment delays, theft, or inventory problems. An inevitable consequence, however, is that it generates huge numbers of events. To exploit these large amounts of data, the supply chain visualizer increases supply-chain visibility by analyzing RFID data, using a mix of automated analysis techniques and human effort. The tool's core concepts include rule-based analysis techniques and a map-based representation interface. With these features, it lets users visualize the supply-chain structure, together with performance metrics, and detect problematic hot spots.

Research paper thumbnail of Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis

IEEE Internet Computing, 2009

RFID technology tracks the flow of physical items and goods in supply chains to help users detect... more RFID technology tracks the flow of physical items and goods in supply chains to help users detect inefficiencies, such as shipment delays, theft, or inventory problems. An inevitable consequence, however, is that it generates huge numbers of events. To exploit these large amounts of data, the supply chain visualizer increases supply-chain visibility by analyzing RFID data, using a mix of automated analysis techniques and human effort. The tool's core concepts include rule-based analysis techniques and a map-based representation interface. With these features, it lets users visualize the supply-chain structure, together with performance metrics, and detect problematic hot spots.

Research paper thumbnail of From Identification to Authentication – A Review of RFID Product Authentication Techniques

Authentication has an important role in many RFID applications for providing security and privacy... more Authentication has an important role in many RFID applications for providing security and privacy. In this paper we focus on investigating how RFID can be used in product authentication in supply chain applications and a review of existing approaches is provided. The different categories of RFID product authentication approaches are analyzed within the context of anticounterfeiting and fields where future research is needed are identified.

Research paper thumbnail of An Overview of EPC Technology

Research paper thumbnail of Applying Wearable Sensors to Avalanche Rescue: First Experiences with a Novel Avalanche Beacon

Research paper thumbnail of Better Rescue Through Sensors

Sensors can provide new and valuable information beyond the human senses: surgeons are provided w... more Sensors can provide new and valuable information beyond the human senses: surgeons are provided with vital sign data without attention shift, firefighters may see through smoke, etc. This paper investigates how wearable sensing technology can be applied to alpine avalanche rescue. Sensors worn by mountaineers reveal information about vital functions of the victims in an emergency case. In particular the rescue of multiple victims might benefit enormously from the use of wearable sensors. As time is the most critical issue in rescue, we belief that ...

Research paper thumbnail of Smart CAPs for Smart Its - Context Detection for Mobile Users

Personal and Ubiquitous Computing, 2002

Context detection for mobile users plays a major role for enabling novel, human-centric interface... more Context detection for mobile users plays a major role for enabling novel, human-centric interfaces. For this, we introduce a context detection scheme applicable in a self-organized sensor network, which is formed of disseminated, computer empowered sensors, referred to as Smart-Its [1]. Context-detection takes place without requiring any central point of control, and supports push as well as pull modes. Our solution is based on an in-network composition approach relying on so-called smart Context-Aware Packets (sCAPs). These packets act as a uniform interchange format, and allow single sensors to share sensed data and to cooperate to build up a meaningful context model from manifold inputs. sCAPs travel through the sensor network governed by an enclosed retrieving plan, specifying which sensors to visit in order to gain a specific piece of context information. For enhanced flexibility, the retrieving plan itself may be dynamically altered in accordance with past sensor readings.

Research paper thumbnail of Proactive Instructions for Furniture Assembly

Tennenhouse [1] coined the term proactive computing where humans get out of the interaction loop ... more Tennenhouse [1] coined the term proactive computing where humans get out of the interaction loop and may be serviced specifically according to their needs and current situation. In this paper we propose a framework for proactive guidance which aims to overcome limitations of today’s printed instructions. By attaching computing devices and multiple sensors onto different parts of the assembly the system can recognize the actions of the user and determine the current state of the assembly. The system can suggest the next most appropriate action at any point in time. In an experimental case study with the IKEA PAX wardrobe we show the feasibility of the proposed approach. At the end important issues are discussed and future directions are outlined.

Research paper thumbnail of Detecting Context in Distributed Sensor Networks by Using Smart Context-Aware Packets

Context modeling and detection will play a major role for pervasive computing. This paper propose... more Context modeling and detection will play a major role for pervasive computing. This paper proposes an approach to reveal the user’s context in a self-organized sensor network without a central point of control. A uniform communication scheme, referred to as Smart Context- Aware Packet’s (sCAP’s), allows single sensors to share sensed data and to cooperate in order to build a meaningful context model from manifold inputs. In this approach, sCAP’s are injected into the sensor network by the context inquirer. In particular, sCAP’s contain a retrieving plan specifying which types of sensors should be visited to obtain the desired context information. The paper concentrates on the routing concepts which allow to deal with breakdowns of sensor nodes and continuous changes of the network topology.

Research paper thumbnail of Ambient Energy Scavenging for Sensor-Equipped RFID Tags in the Cold Chain

The recent introduction of passive RFID tags into leading retailers’ supply chains has had a trem... more The recent introduction of passive RFID tags into leading retailers’ supply chains has had a tremendous impact on their ability to manage the flow of goods. Tags on cases and pallets increase the supply chain’s visibility and allow for accurate tracking and tracing. Currently, additional efforts are being made to use RFID to actively monitor a product’s shipping condition (e.g. temperature, shock-vibration, etc.). This is of substantial interest for perishable goods and pharmaceuticals, whose shipping conditions are regulated. For continuous tracking of environmental data during the process of the movement of goods through the supply chain, RFID tags need to be equipped with sensors. Such sensors require continuous power, which is usually supplied by a battery on the tag. However, a battery not only significantly increases the cost of the hardware and makes it heavy and bulky, but also limits a tag’s lifetime. We propose ambient energy scavenging as a method to power sensors on battery-free RFID tags for continuous temperature monitoring and we show its applicability to the cold chain. Through detailed analysis of typical transport conditions we have identified ambient power sources which allow us to specify chip requirements and to make informed decisions about tag placement and total cost. We conclude that efficient monitoring ability is available at significantly lower cost than comparable implementations with active tags. Due to reduced costs, we predict high market penetration, which will result in more detailed information about multi-echelon supply chains. The fine-grained measurements will reveal failures and inefficiencies in the cold chain at a level of detail that would be hard to achieve with active tags. The elimination of the short-comings in the cold chain will result in reduced shrinkage, better quality and freshness of goods, and an overall reduction of losses of revenue.

Research paper thumbnail of Sensing and monitoring professional skiers

IEEE Pervasive Computing, 2005

Research paper thumbnail of A Mobile Product Recommendation System Interacting with Tagged Products

Research paper thumbnail of Towards Distributed Awareness -- An Artifact Based Approach

Research paper thumbnail of Probabilistic Approach for Location-Based Authentication

Research paper thumbnail of Technology, Standards, and Real-World Deployments of the EPC Network

IEEE Internet Computing, 2009

Research paper thumbnail of Pervasive RFID and Near Field Communication Technology

IEEE Pervasive Computing, 2007

Today, RFID enjoys enormous interest as the first widely deployed pervasive technology, and Near ... more Today, RFID enjoys enormous interest as the first widely deployed pervasive technology, and Near Field Communication will be the first widely deployed technology enabling humans to communicate with physical objects. This article reports on the Pertec (Pervasive RFID/Near Field Communication Technology and Applications) workshop, which discussed the future evolution of RFID beyond goods identification, including sensor integration, localization, NFC applications, and emerging challenges.

Research paper thumbnail of Strengthening the Security of Machine Readable Documents by Combining RFID and Optical Memory Devices

There is an on-going trend towards turning paper documents that store personal information or oth... more There is an on-going trend towards turning paper documents that store personal information or other valuable data into machine-readable form. An example of this trend is the electronic passport that will become common in the near future. In this paper we show how the security of these machine readable documents could be improved by combining RFID with optical memory devices. We propose integrating an optical memory device into the RFID enabled smart document and present methods how these two storage media can be combined to secure the document against threats like illicit scanning, eavesdropping and forgery. The presented approaches make use of the optical document-to-reader channel which is more secure than the radio-frequency communication interface. To demonstrate the potential of our approaches we show how they could overcome a number of existing security and privacy threats of electronic passports.

Research paper thumbnail of Adaptive interaction for enabling pervasive services

Abstract We describe an architecture that allows mobile users to access a variety of services pro... more Abstract We describe an architecture that allows mobile users to access a variety of services provided by pervasive computing environments. Novel to our approach is that the system selects and executes services taking into account arbitrary contextual information (eg location or preferences). Our architecture is based on an adaptive service interaction scheme; individual service requests are attributed by context constraints, which specify the adaption policy. Context constraints may relate to spatial or temporal concerns. We ...

Research paper thumbnail of Designing an Architecture for Context - Aware Service Selection and Execution

Research paper thumbnail of CAPEUS: An Architecture for Context-Aware Selection and Execution of Services

This paper introduces a comprehensive framework that allows mobile users to access a variety of s... more This paper introduces a comprehensive framework that allows mobile users to access a variety of services provided by their current environment (e.g. print services). Novel to our approach is that selection and execution of services takes into account the user’s current context. Instead of being harassed by useless activities as service browsing or configuration issues, environmental services get seamlessly aligned to the user’s present task. Thus, the challenge is to develop a new service framework that fulfils these demands. The paper proposes a document-based approach; so called Context-Aware Packets (CAPs) contain context constraints and data for describing an entire service request. The core framework, Context-Aware Packets Enabling Ubiquitous Services (CAPEUS), reverts to CAPs for realising context-aware selection and execution of services.

Research paper thumbnail of Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis

IEEE Internet Computing, 2009

RFID technology tracks the flow of physical items and goods in supply chains to help users detect... more RFID technology tracks the flow of physical items and goods in supply chains to help users detect inefficiencies, such as shipment delays, theft, or inventory problems. An inevitable consequence, however, is that it generates huge numbers of events. To exploit these large amounts of data, the supply chain visualizer increases supply-chain visibility by analyzing RFID data, using a mix of automated analysis techniques and human effort. The tool's core concepts include rule-based analysis techniques and a map-based representation interface. With these features, it lets users visualize the supply-chain structure, together with performance metrics, and detect problematic hot spots.

Research paper thumbnail of Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis

IEEE Internet Computing, 2009

RFID technology tracks the flow of physical items and goods in supply chains to help users detect... more RFID technology tracks the flow of physical items and goods in supply chains to help users detect inefficiencies, such as shipment delays, theft, or inventory problems. An inevitable consequence, however, is that it generates huge numbers of events. To exploit these large amounts of data, the supply chain visualizer increases supply-chain visibility by analyzing RFID data, using a mix of automated analysis techniques and human effort. The tool's core concepts include rule-based analysis techniques and a map-based representation interface. With these features, it lets users visualize the supply-chain structure, together with performance metrics, and detect problematic hot spots.

Research paper thumbnail of From Identification to Authentication – A Review of RFID Product Authentication Techniques

Authentication has an important role in many RFID applications for providing security and privacy... more Authentication has an important role in many RFID applications for providing security and privacy. In this paper we focus on investigating how RFID can be used in product authentication in supply chain applications and a review of existing approaches is provided. The different categories of RFID product authentication approaches are analyzed within the context of anticounterfeiting and fields where future research is needed are identified.

Research paper thumbnail of An Overview of EPC Technology

Research paper thumbnail of Applying Wearable Sensors to Avalanche Rescue: First Experiences with a Novel Avalanche Beacon

Research paper thumbnail of Better Rescue Through Sensors

Sensors can provide new and valuable information beyond the human senses: surgeons are provided w... more Sensors can provide new and valuable information beyond the human senses: surgeons are provided with vital sign data without attention shift, firefighters may see through smoke, etc. This paper investigates how wearable sensing technology can be applied to alpine avalanche rescue. Sensors worn by mountaineers reveal information about vital functions of the victims in an emergency case. In particular the rescue of multiple victims might benefit enormously from the use of wearable sensors. As time is the most critical issue in rescue, we belief that ...

Research paper thumbnail of Smart CAPs for Smart Its - Context Detection for Mobile Users

Personal and Ubiquitous Computing, 2002

Context detection for mobile users plays a major role for enabling novel, human-centric interface... more Context detection for mobile users plays a major role for enabling novel, human-centric interfaces. For this, we introduce a context detection scheme applicable in a self-organized sensor network, which is formed of disseminated, computer empowered sensors, referred to as Smart-Its [1]. Context-detection takes place without requiring any central point of control, and supports push as well as pull modes. Our solution is based on an in-network composition approach relying on so-called smart Context-Aware Packets (sCAPs). These packets act as a uniform interchange format, and allow single sensors to share sensed data and to cooperate to build up a meaningful context model from manifold inputs. sCAPs travel through the sensor network governed by an enclosed retrieving plan, specifying which sensors to visit in order to gain a specific piece of context information. For enhanced flexibility, the retrieving plan itself may be dynamically altered in accordance with past sensor readings.

Research paper thumbnail of Proactive Instructions for Furniture Assembly

Tennenhouse [1] coined the term proactive computing where humans get out of the interaction loop ... more Tennenhouse [1] coined the term proactive computing where humans get out of the interaction loop and may be serviced specifically according to their needs and current situation. In this paper we propose a framework for proactive guidance which aims to overcome limitations of today’s printed instructions. By attaching computing devices and multiple sensors onto different parts of the assembly the system can recognize the actions of the user and determine the current state of the assembly. The system can suggest the next most appropriate action at any point in time. In an experimental case study with the IKEA PAX wardrobe we show the feasibility of the proposed approach. At the end important issues are discussed and future directions are outlined.

Research paper thumbnail of Detecting Context in Distributed Sensor Networks by Using Smart Context-Aware Packets

Context modeling and detection will play a major role for pervasive computing. This paper propose... more Context modeling and detection will play a major role for pervasive computing. This paper proposes an approach to reveal the user’s context in a self-organized sensor network without a central point of control. A uniform communication scheme, referred to as Smart Context- Aware Packet’s (sCAP’s), allows single sensors to share sensed data and to cooperate in order to build a meaningful context model from manifold inputs. In this approach, sCAP’s are injected into the sensor network by the context inquirer. In particular, sCAP’s contain a retrieving plan specifying which types of sensors should be visited to obtain the desired context information. The paper concentrates on the routing concepts which allow to deal with breakdowns of sensor nodes and continuous changes of the network topology.

Research paper thumbnail of Ambient Energy Scavenging for Sensor-Equipped RFID Tags in the Cold Chain

The recent introduction of passive RFID tags into leading retailers’ supply chains has had a trem... more The recent introduction of passive RFID tags into leading retailers’ supply chains has had a tremendous impact on their ability to manage the flow of goods. Tags on cases and pallets increase the supply chain’s visibility and allow for accurate tracking and tracing. Currently, additional efforts are being made to use RFID to actively monitor a product’s shipping condition (e.g. temperature, shock-vibration, etc.). This is of substantial interest for perishable goods and pharmaceuticals, whose shipping conditions are regulated. For continuous tracking of environmental data during the process of the movement of goods through the supply chain, RFID tags need to be equipped with sensors. Such sensors require continuous power, which is usually supplied by a battery on the tag. However, a battery not only significantly increases the cost of the hardware and makes it heavy and bulky, but also limits a tag’s lifetime. We propose ambient energy scavenging as a method to power sensors on battery-free RFID tags for continuous temperature monitoring and we show its applicability to the cold chain. Through detailed analysis of typical transport conditions we have identified ambient power sources which allow us to specify chip requirements and to make informed decisions about tag placement and total cost. We conclude that efficient monitoring ability is available at significantly lower cost than comparable implementations with active tags. Due to reduced costs, we predict high market penetration, which will result in more detailed information about multi-echelon supply chains. The fine-grained measurements will reveal failures and inefficiencies in the cold chain at a level of detail that would be hard to achieve with active tags. The elimination of the short-comings in the cold chain will result in reduced shrinkage, better quality and freshness of goods, and an overall reduction of losses of revenue.

Research paper thumbnail of Sensing and monitoring professional skiers

IEEE Pervasive Computing, 2005

Research paper thumbnail of A Mobile Product Recommendation System Interacting with Tagged Products

Research paper thumbnail of Towards Distributed Awareness -- An Artifact Based Approach

Research paper thumbnail of Probabilistic Approach for Location-Based Authentication

Research paper thumbnail of Technology, Standards, and Real-World Deployments of the EPC Network

IEEE Internet Computing, 2009

Research paper thumbnail of Pervasive RFID and Near Field Communication Technology

IEEE Pervasive Computing, 2007

Today, RFID enjoys enormous interest as the first widely deployed pervasive technology, and Near ... more Today, RFID enjoys enormous interest as the first widely deployed pervasive technology, and Near Field Communication will be the first widely deployed technology enabling humans to communicate with physical objects. This article reports on the Pertec (Pervasive RFID/Near Field Communication Technology and Applications) workshop, which discussed the future evolution of RFID beyond goods identification, including sensor integration, localization, NFC applications, and emerging challenges.

Research paper thumbnail of Strengthening the Security of Machine Readable Documents by Combining RFID and Optical Memory Devices

There is an on-going trend towards turning paper documents that store personal information or oth... more There is an on-going trend towards turning paper documents that store personal information or other valuable data into machine-readable form. An example of this trend is the electronic passport that will become common in the near future. In this paper we show how the security of these machine readable documents could be improved by combining RFID with optical memory devices. We propose integrating an optical memory device into the RFID enabled smart document and present methods how these two storage media can be combined to secure the document against threats like illicit scanning, eavesdropping and forgery. The presented approaches make use of the optical document-to-reader channel which is more secure than the radio-frequency communication interface. To demonstrate the potential of our approaches we show how they could overcome a number of existing security and privacy threats of electronic passports.