{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:15Z","timestamp":1750306935208,"version":"3.41.0"},"reference-count":33,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002531","name":"Kyungpook National University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002531","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001868","name":"National Science Council Taiwan","doi-asserted-by":"publisher","award":["NSC 101-2221-E-035-038"],"award-info":[{"award-number":["NSC 101-2221-E-035-038"]}],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2013,2]]},"abstract":"<jats:p>The concept of smart homes (SH) has been extensively popularized, and there are a lot of technologies that need to be continuously utilized and integrated in such a concept. In this article, some applied problems of camera array (CA) in the SH are discussed and solved. Determining how to build an effective management method for CA in order to ensure that user privacy is not encroached upon is an important issue. In SH, the applications of CA are very diversified. We suggest that a satisfactory management method of CA should be based on the open service gateway initiative (OSGi) that includes resource management and monitoring (RMM) and UPnP security for the problems of resources and privacy, respectively. Finally, an applied example of CA is addressed in an elder-care center (EC). Simulation results show that the management strategy and application of CA based on an OSGi is satisfactory.<\/jats:p>","DOI":"10.1145\/2423636.2423647","type":"journal-article","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T20:28:36Z","timestamp":1362515316000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Dependable management system for ubiquitous camera array service in an elder-care center"],"prefix":"10.1145","volume":"12","author":[{"given":"K.","family":"Bharanitharan","sequence":"first","affiliation":[{"name":"Feng Chia University, Taichung, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiun-Ren","family":"Ding","sequence":"additional","affiliation":[{"name":"Industrial Technology Research Institute, Chutung, Hsinchu, Taiwan, R.O.C."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anand","family":"Paul","sequence":"additional","affiliation":[{"name":"Kyungpook National University, Daegu, South Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kuen-Ming","family":"Lee","sequence":"additional","affiliation":[{"name":"National Cheng Kung University, Tainan, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ting-Wei","family":"Hou","sequence":"additional","affiliation":[{"name":"National Cheng Kung University, Tainan, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2013,2,22]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Asus http:\/\/www.asus.com\/.  Asus http:\/\/www.asus.com\/."},{"key":"e_1_2_1_2_1","unstructured":"Bouncy Castle http:\/\/www.bouncycastle.org\/.  Bouncy Castle http:\/\/www.bouncycastle.org\/."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20060646"},{"key":"e_1_2_1_4_1","unstructured":"CyberLink Development Package for UPnP Devices. http:\/\/www.cybergarage.org\/net\/upnp\/java\/index.html.  CyberLink Development Package for UPnP Devices. http:\/\/www.cybergarage.org\/net\/upnp\/java\/index.html."},{"key":"e_1_2_1_5_1","unstructured":"Design Pattern--Mediator Pattern http:\/\/en.wikipedia.org\/wiki\/Mediator_pattern.  Design Pattern--Mediator Pattern http:\/\/en.wikipedia.org\/wiki\/Mediator_pattern."},{"volume-title":"Proceedings of the IEEE Region 10 Conference (TENCON'07)","year":"2007","author":"Ding J. R.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2008.4746071"},{"volume-title":"Proceedings of the 33rd IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'08)","year":"2008","author":"Ding J. R.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2008.4637575"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.908640"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.903780"},{"volume-title":"Proceedings of the IEEE International Workshop on Medical Measurements and Applications (MeMeA'08)","year":"2008","author":"Gaddam A.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1299359"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.107"},{"key":"e_1_2_1_15_1","unstructured":"Intel UPnP Technology. http:\/\/www.intel.com\/cd\/ids\/developer\/asmo-na\/eng\/downloads\/upnp\/index.htm.  Intel UPnP Technology. http:\/\/www.intel.com\/cd\/ids\/developer\/asmo-na\/eng\/downloads\/upnp\/index.htm."},{"key":"e_1_2_1_16_1","unstructured":"Java Management Extensions (JMX). http:\/\/java.sun.com\/javase\/technologies\/core\/mntr-mgmt\/javamanagement\/.  Java Management Extensions (JMX). http:\/\/java.sun.com\/javase\/technologies\/core\/mntr-mgmt\/javamanagement\/."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2004.1401221"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1362504"},{"key":"e_1_2_1_19_1","unstructured":"Levell http:\/\/www.level1.com\/.  Levell http:\/\/www.level1.com\/."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2007.906571"},{"key":"e_1_2_1_21_1","unstructured":"OSGi OSGi Service Platform Core Specification Release 4 Version 4.0.1 July 2006. http:\/\/www.osgi.org\/Release4\/Download.  OSGi OSGi Service Platform Core Specification Release 4 Version 4.0.1 July 2006. http:\/\/www.osgi.org\/Release4\/Download."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2005.849093"},{"volume-title":"Proceedings of the IEEE International Conference on Robotics and Biomimetics (ROBIO'04)","year":"2004","author":"Seo K. H.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2008.4711221"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2006.1605044"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2004.838480"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.845002"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2006.889201"},{"key":"e_1_2_1_29_1","unstructured":"UPnPTM Security Ceremonies v1.0 2003. http:\/\/www.upnp.org\/.  UPnP TM Security Ceremonies v1.0 2003. http:\/\/www.upnp.org\/."},{"key":"e_1_2_1_30_1","unstructured":"UPnP Technology. Available from: http:\/\/www.upnp.org\/.  UPnP Technology. Available from: http:\/\/www.upnp.org\/."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073204.1073259"},{"volume-title":"Proceedings of the International Conference on Information Technology and Application in Biomedicine (ITAB'08)","year":"2008","author":"Wu K. F.","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","unstructured":"Xerces http:\/\/xerces.apache.org\/xerces-j\/.  Xerces http:\/\/xerces.apache.org\/xerces-j\/."}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2423636.2423647","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2423636.2423647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:43Z","timestamp":1750235743000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2423636.2423647"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["10.1145\/2423636.2423647"],"URL":"https:\/\/doi.org\/10.1145\/2423636.2423647","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2013,2]]},"assertion":[{"value":"2010-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}