HiCHO: Attributes Based Classification of Ubiquitous Devices

  • Shachi Sharma
  • Shalini Kapoor
  • Bharat R. Srinivasan
  • Mayank S. Narula
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 104)


An online and incremental clustering method to classify heterogeneous devices in dynamic ubiquitous computing environment is presented. The proposed classification technique, HiCHO, is based on attributes characterizing devices. These can be logical and physical attributes. Such classification allows to derive class level similarity or dissimilarity between devices and further use it to extract semantic information about relationship among devices. The HiCHO technique is protocol neutral and can be integrated with any device discovery protocol. Detailed simulation analysis and real-world data validates the efficacy of the HiCHO technique and its algorithms.


Cluster Algorithm Similarity Index Logical Attribute Cluster Representative Commonality Index 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Adjie, W.: The design and implementation of an intentional naming system. In: 17th ACM Symposium on Operating Systems Principles, pp. 186–201 (1999)Google Scholar
  2. 2.
    Blueetooth website,
  3. 3.
    CCITT. The Directory Overview of Concepts, Models and Services, X.500 series recommendations (1988)Google Scholar
  4. 4.
    Efficient XML Interchange,
  5. 5.
    Friedman, J.H.: Clustering objects on subsets of attributes. Journal of Royal Statistical Society 66(4), 815–849 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Jaccard, P.: Étude comparative de la distribution florale dans une portion des Alpes et des Jura. Bulletin de la Société Vaudoise des Sciences Naturelles 37, 547–579 (1901)Google Scholar
  7. 7.
    Kangasharju, J., Lindholm, T., Tarkoma, S.: Xml messaging for mobile devices: From requirements to implementation. Computer Networks: The International Journal of Computer and Telecommunications Networking 51(16) (2007)Google Scholar
  8. 8.
    Kangasharju, J.: Efficient Implementation of XML Security for Mobile Devices. In: IEEE International Conference on Web Services, pp. 134–141 (2007)Google Scholar
  9. 9.
    Menten, L.E., Murray, H.: Experiences in the application of xml for device management. IEEE Communications Magazine 72(7), 92–100 (2004)CrossRefGoogle Scholar
  10. 10.
    Shao, F., et al.: A new real-time clustering algorithm. Journal of Information and Computational Science 7(10), 2110–2121 (2010)Google Scholar
  11. 11.
    Li, T., Ma, S., Ogihara, M.: Entropy-based criterion in categorical clustering. In: Proceedings of the 12th International Conference on Machine Learning (2004)Google Scholar
  12. 12.
  13. 13.
    Wang, S., et al.: Entropy based clustering of data streams with mixed numeric and categorical values. In: IEEE/ACIS International Conference on Computer and Information Science, pp. 140–145 (2008)Google Scholar
  14. 14.
    Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94–104 (1991)Google Scholar
  15. 15.
    Zigbee website,

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  • Shachi Sharma
    • 1
  • Shalini Kapoor
    • 1
  • Bharat R. Srinivasan
    • 2
  • Mayank S. Narula
    • 3
  1. 1.IBM Research LaboratoryNew DelhiIndia
  2. 2.Georgia Institute of TechnologyAtlantaUnited States
  3. 3.Indian Institute of TechnologyKharagpurIndia

Personalised recommendations