Pervasive Computing

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 360 Experts worldwide ranked by ideXlab platform

Anupam Joshi - One of the best experts on this subject based on the ideXlab platform.

  • on data management in Pervasive Computing environments
    IEEE Transactions on Knowledge and Data Engineering, 2004
    Co-Authors: Filip Perich, Timothy Finin, Anupam Joshi, Yelena Yesha
    Abstract:

    This paper presents a framework to address new data management challenges introduced by data-intensive, Pervasive Computing environments. These challenges include a spatio-temporal variation of data and data source availability, lack of a global catalog and schema, and no guarantee of reconnection among peers due to the serendipitous nature of the environment. An important aspect of our solution is to treat devices as semiautonomous peers guided in their interactions by profiles and context. The profiles are grounded in a semantically rich language and represent information about users, devices, and data described in terms of "beliefs," "desires," and "intentions." We present a prototype implementation of this framework over combined Bluetooth and Ad Hoc 802.11 networks and present experimental and simulation results that validate our approach and measure system performance.

  • a policy language for a Pervasive Computing environment
    IEEE International Workshop on Policies for Distributed Systems and Networks, 2003
    Co-Authors: Timothy Finin, Anupam Joshi
    Abstract:

    We describe a policy language designed for Pervasive Computing applications that is based on deontic concepts and grounded in a semantic language. The Pervasive Computing environments under consideration are those in which people and devices are mobile and use various wireless networking technologies to discover and access services and devices in their vicinity. Such Pervasive environments lend themselves to policy-based security due to their extremely dynamic nature. Using policies allows the security functionality to be modified without changing the implementation of the entities involved. However, along with being extremely dynamic, these environments also tend to span several domains and be made up of entities of varied capabilities. A policy language for environments of this sort needs to be very expressive but lightweight and easily extensible. We demonstrate the feasibility of our policy language in Pervasive environments through a prototype used as part of a secure Pervasive system.

  • A reactive service composition architecture for Pervasive Computing environments
    IFIP Advances in Information and Communication Technology, 2003
    Co-Authors: Dipanjan Chakraborty, Filip Perich, Timothy Finin, Anupam Joshi, Yelena Yesha
    Abstract:

    Development of customized services by integrating and executing existing ones (refered to as service composition) has received a lot of attention in the last few years with respect to wired, infrastrutcure based web-services. With the advancement in the wireless technology and Pervasive Computing, we envison that in the near future, we will have such information or services embedded in various wireless devices in our vicinity. However, wired infrastructure-based service discovery and composition architectures do not take into consideration factors arising from the possible mobility of the service providers. In this paper, we present Anamika: a distributed, de-centralized and fault-tolerant design architecture for reactive service composition in Pervasive environments.

  • Trust-based security in Pervasive Computing environments
    Computer, 2001
    Co-Authors: Timothy Finin, Anupam Joshi
    Abstract:

    Traditionally, stand-alone computers and small networks rely on user authentication and access control to provide security. These physical methods use system-based controls to verify the identity of a person or process, explicitly enabling or restricting the ability to use, change, or view a computer resource. However, these strategies are inadequate for the increased flexibility that distributed networks such as the Internet and Pervasive Computing environments require because such systems lack central control and their users are not all predetermined. Mobile users expect to access locally hosted resources and services anytime and anywhere, leading to serious security risks and access control problems. We propose a solution based on trust management that involves developing a security policy, assigning credentials to entities, verifying that the credentials fulfill the policy, delegating trust to third parties, and reasoning about users' access rights. This architecture is generally applicable to distributed systems but geared toward Pervasive Computing environments

Timothy Finin - One of the best experts on this subject based on the ideXlab platform.

  • on data management in Pervasive Computing environments
    IEEE Transactions on Knowledge and Data Engineering, 2004
    Co-Authors: Filip Perich, Timothy Finin, Anupam Joshi, Yelena Yesha
    Abstract:

    This paper presents a framework to address new data management challenges introduced by data-intensive, Pervasive Computing environments. These challenges include a spatio-temporal variation of data and data source availability, lack of a global catalog and schema, and no guarantee of reconnection among peers due to the serendipitous nature of the environment. An important aspect of our solution is to treat devices as semiautonomous peers guided in their interactions by profiles and context. The profiles are grounded in a semantically rich language and represent information about users, devices, and data described in terms of "beliefs," "desires," and "intentions." We present a prototype implementation of this framework over combined Bluetooth and Ad Hoc 802.11 networks and present experimental and simulation results that validate our approach and measure system performance.

  • a policy language for a Pervasive Computing environment
    IEEE International Workshop on Policies for Distributed Systems and Networks, 2003
    Co-Authors: Timothy Finin, Anupam Joshi
    Abstract:

    We describe a policy language designed for Pervasive Computing applications that is based on deontic concepts and grounded in a semantic language. The Pervasive Computing environments under consideration are those in which people and devices are mobile and use various wireless networking technologies to discover and access services and devices in their vicinity. Such Pervasive environments lend themselves to policy-based security due to their extremely dynamic nature. Using policies allows the security functionality to be modified without changing the implementation of the entities involved. However, along with being extremely dynamic, these environments also tend to span several domains and be made up of entities of varied capabilities. A policy language for environments of this sort needs to be very expressive but lightweight and easily extensible. We demonstrate the feasibility of our policy language in Pervasive environments through a prototype used as part of a secure Pervasive system.

  • A reactive service composition architecture for Pervasive Computing environments
    IFIP Advances in Information and Communication Technology, 2003
    Co-Authors: Dipanjan Chakraborty, Filip Perich, Timothy Finin, Anupam Joshi, Yelena Yesha
    Abstract:

    Development of customized services by integrating and executing existing ones (refered to as service composition) has received a lot of attention in the last few years with respect to wired, infrastrutcure based web-services. With the advancement in the wireless technology and Pervasive Computing, we envison that in the near future, we will have such information or services embedded in various wireless devices in our vicinity. However, wired infrastructure-based service discovery and composition architectures do not take into consideration factors arising from the possible mobility of the service providers. In this paper, we present Anamika: a distributed, de-centralized and fault-tolerant design architecture for reactive service composition in Pervasive environments.

  • Trust-based security in Pervasive Computing environments
    Computer, 2001
    Co-Authors: Timothy Finin, Anupam Joshi
    Abstract:

    Traditionally, stand-alone computers and small networks rely on user authentication and access control to provide security. These physical methods use system-based controls to verify the identity of a person or process, explicitly enabling or restricting the ability to use, change, or view a computer resource. However, these strategies are inadequate for the increased flexibility that distributed networks such as the Internet and Pervasive Computing environments require because such systems lack central control and their users are not all predetermined. Mobile users expect to access locally hosted resources and services anytime and anywhere, leading to serious security risks and access control problems. We propose a solution based on trust management that involves developing a security policy, assigning credentials to entities, verifying that the credentials fulfill the policy, delegating trust to third parties, and reasoning about users' access rights. This architecture is generally applicable to distributed systems but geared toward Pervasive Computing environments

Jadwiga Indulska - One of the best experts on this subject based on the ideXlab platform.

  • developing context aware Pervasive Computing applications models and approach
    Pervasive and Mobile Computing, 2006
    Co-Authors: Karen Henricksen, Jadwiga Indulska
    Abstract:

    There is growing interest in the use of context-awareness as a technique for developing Pervasive Computing applications that are flexible, adaptable, and capable of acting autonomously on behalf of users. However, context-awareness introduces a variety of software engineering challenges. In this paper, we address these challenges by proposing a set of conceptual models designed to support the software engineering process, including context modelling techniques, a preference model for representing context-dependent requirements, and two programming models. We also present a software infrastructure and software engineering process that can be used in conjunction with our models. Finally, we discuss a case study that demonstrates the strengths of our models and software engineering approach with respect to a set of software quality metrics.

  • A software engineering framework for context-aware Pervasive Computing
    Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the, 2004
    Co-Authors: Karen Henricksen, Jadwiga Indulska
    Abstract:

    There is growing interest in the use of context-awareness as a technique for developing Pervasive Computing applications that are flexible, adaptable, and capable of acting autonomously on behalf of users. However, context-awareness introduces various software engineering challenges, as well as privacy and usability concerns. In this paper, we present a conceptual framework and software infrastructure that together address known software engineering challenges, and enable further practical exploration of social and usability issues by facilitating the prototyping and fine-tuning of context-aware applications.

  • modeling context information in Pervasive Computing systems
    Centre for Accident Research & Road Safety - Qld (CARRS-Q); Faculty of Health; Institute of Health and Biomedical Innovation, 2002
    Co-Authors: Karen Henricksen, Jadwiga Indulska, Andry Rakotonirainy
    Abstract:

    As Computing becomes more Pervasive, the nature of applications must change accordingly. In particular, applications must become more flexible in order to respond to highly dynamic Computing environments, and more autonomous, to reflect the growing ratio of applications to users and the corresponding decline in the attention a user can devote to each. That is, applications must become more context-aware. To facilitate the programming of such applications, infrastructure is required to gather, manage, and disseminate context information to applications. This paper is concerned with the development of appropriate context modeling concepts for Pervasive Computing, which can form the basis for such a context management infrastructure. This model overcomes prob- lems associated with previous context models, including their lack of formality and generality, and also tackles issues such as wide variations in information quality, the existence of complex relationships amongst context information and temporal aspects of context.

Karen Henricksen - One of the best experts on this subject based on the ideXlab platform.

  • developing context aware Pervasive Computing applications models and approach
    Pervasive and Mobile Computing, 2006
    Co-Authors: Karen Henricksen, Jadwiga Indulska
    Abstract:

    There is growing interest in the use of context-awareness as a technique for developing Pervasive Computing applications that are flexible, adaptable, and capable of acting autonomously on behalf of users. However, context-awareness introduces a variety of software engineering challenges. In this paper, we address these challenges by proposing a set of conceptual models designed to support the software engineering process, including context modelling techniques, a preference model for representing context-dependent requirements, and two programming models. We also present a software infrastructure and software engineering process that can be used in conjunction with our models. Finally, we discuss a case study that demonstrates the strengths of our models and software engineering approach with respect to a set of software quality metrics.

  • A software engineering framework for context-aware Pervasive Computing
    Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the, 2004
    Co-Authors: Karen Henricksen, Jadwiga Indulska
    Abstract:

    There is growing interest in the use of context-awareness as a technique for developing Pervasive Computing applications that are flexible, adaptable, and capable of acting autonomously on behalf of users. However, context-awareness introduces various software engineering challenges, as well as privacy and usability concerns. In this paper, we present a conceptual framework and software infrastructure that together address known software engineering challenges, and enable further practical exploration of social and usability issues by facilitating the prototyping and fine-tuning of context-aware applications.

  • a framework for context aware Pervasive Computing applications
    2003
    Co-Authors: Karen Henricksen
    Abstract:

    The emergence of new types of mobile and embedded Computing devices and developments in wireless networking are broadening the domain of Computing from the workplace and home office to other facets of everyday life. This trend is expected to lead to a proliferation of Pervasive Computing environments, in which inexpensive, interconnected Computing devices are ubiquitous and capable of supporting users in a range of tasks. It is widely accepted that the success of Pervasive Computing technologies will require a radical design shift, and that it is not sufficient to simply extrapolate from existing desktop Computing technologies. In particular, Pervasive Computing demands applications that are capable of operating in highly dynamic environments and of placing fewer demands on user attention. In order to meet these requirements, Pervasive Computing applications need to be sensitive to the context of use, including the location, time and activities of the user. Currently, the programming of context-aware applications represents a complex and error-prone task, while modification to support changing user requirements or a changing set of context information is usually prohibitively difficult. Consequently, context-aware applications are explored largely in laboratory settings, and remain some distance from widespread ac ceptance and use. In order to remedy this situation, there is a need for better understanding of the design process associated with context-aware applications, improved programming models that lead to highly flexible and customisable applications, and infrastructural support for tasks such as gathering and management of context information. This thesis presents a framework that addresses these issues. The framework integrates a set of original conceptual foundations, including context and preference modelling techniques, with a software architecture that implements context and preference management functions and provides programming support in the form of a toolkit. The thesis makes several important research contributions. First, it presents a novel characterisation of context information in Pervasive Computing systems, covering (among other features) temporal aspects and various types and sources of uncertainty. Second, it proposes two complementary approaches to context modelling. The first modelling approach, CML, provides a graphical notation that supports the exploration and specification of an application's context requirements by the designer. CML represents context information in terms of facts, and has a strong formal basis that enables a straightforward mapping to a context management system built around a relational database. The second approach, termed the situation abstraction, allows contexts to be described in selective, high-level terms as constraints upon a fact-based CML model. Situations are well suited for use in context querying and as programming abstractions. Third, the thesis presents a pair of programming models that can be used in conjunction with the situation abstraction. The first model, which enables the triggering of actions in response to context changes, has been widely used previously in the development of adaptive and context-aware software, but is reformulated here to accommodate uncertain context information. The second model, which supports choice amongst alternative actions based on the context and preferences of the user (termed branching), is unique to this thesis, and is developed in conjunction with a novel preference modelling approach that allows users to easily express and combine context-dependent requirements. Fourth, the thesis proposes a software architecture for context-aware systems, which combines toolkit support for the two programming models with software components that perform gathering and processing of context information from a variety of sources, and management of both context and preference information. Finally, the thesis presents a case study that evaluates a partial implementation of the architecture and its underlying conceptual foundations. This involves the development of a context-aware communication platform that supports choice of communication channels for interactions between users based on the contexts and preferences of the participants. The case study validates the architecture, the context and preference modelling approaches and the branching model, and illustrates the process and issues involved in the design of context-aware software.

  • modeling context information in Pervasive Computing systems
    Centre for Accident Research & Road Safety - Qld (CARRS-Q); Faculty of Health; Institute of Health and Biomedical Innovation, 2002
    Co-Authors: Karen Henricksen, Jadwiga Indulska, Andry Rakotonirainy
    Abstract:

    As Computing becomes more Pervasive, the nature of applications must change accordingly. In particular, applications must become more flexible in order to respond to highly dynamic Computing environments, and more autonomous, to reflect the growing ratio of applications to users and the corresponding decline in the attention a user can devote to each. That is, applications must become more context-aware. To facilitate the programming of such applications, infrastructure is required to gather, manage, and disseminate context information to applications. This paper is concerned with the development of appropriate context modeling concepts for Pervasive Computing, which can form the basis for such a context management infrastructure. This model overcomes prob- lems associated with previous context models, including their lack of formality and generality, and also tackles issues such as wide variations in information quality, the existence of complex relationships amongst context information and temporal aspects of context.

David Kotz - One of the best experts on this subject based on the ideXlab platform.

  • data centric middleware for context aware Pervasive Computing
    Pervasive and Mobile Computing, 2008
    Co-Authors: Guanling Chen, David Kotz
    Abstract:

    The complexity of developing and deploying context-aware Pervasive-Computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this paper, we motivate a data-centric design for such an infrastructure to support context-aware applications. Our middleware system, Solar, treats contextual data sources as stream publishers. The core of Solar is a scalable and self-organizing peer-to-peer overlay to support data-driven services. We describe how different services can be systematically integrated on top of the Solar overlay and evaluate the resource discovery and data-dissemination services. We also discuss our experience and lessons learned when using Solar to support several implemented scenarios. We conclude that a data-centric infrastructure is necessary to facilitate both the development and deployment of context-aware Pervasive-Computing applications.