Pervasive Sensing and Computing

نویسنده

  • Srikanta P. Kumar
چکیده

The talk will cover recent advances in micro-sensor technology including hardware platforms, networking and collaborative computing methods, as well as middleware and PSC applications. Key accomplishments from related DARPA programs will be presented. Challenges in transforming sensor data to knowledge supporting decision making will be covered. Potential approaches to dramatically reduce device costs and form factor through chip-scale integration of processing, communications, and micro and nano-sensors (MEMS and NEMS) will be discussed. Algorithmic and software challenges for building high-functionality context-aware systems that are also robust, reliable, and secure will be presented. Potential directions in application of cognitive information processing techniques including machine reasoning and learning to achieve rapid adaptation (of PSC systems) to changes in contexts and environments will be discussed. The talk will also present applications, near and far-term, along with associated research challenges.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

The use of pervasive sensing for behaviour profiling - a survey

With the maturity of sensing and pervasive computing techniques, extensive research is being carried out in using different sensing techniques for understanding human behaviour. An introduction to key modalities of pervasive sensing is presented. Behaviour modelling is then highlighted with a focus on probabilistic models. The survey discusses discriminative approaches as well as relevant work ...

متن کامل

When sensing goes pervasive

In line with the pervasive vision, pervasive sensing allows the provision of ubiquitous and pervasive monitoring and heterogenous data collection. In the past decade, two dominant pervasive sensing paradigms have emerged: a mostly human-free paradigm centered around wireless sensor networks and a human-centric paradigm fueled by the rise of personal smart devices (smartphones and wearables). In...

متن کامل

Integrating social sensors and pervasive services: approaches and perspectives

Purpose – The key purpose of this paper is to overview the many issues related to the integration of social sensing and pervasive sensing in the support of adaptive context-aware services. Design/methodology/approach – From the analysis of existing proposals and prototypes, the authors found out that the process of integrating social and pervasive sensing can follow a limited number of approach...

متن کامل

Crowd assisted approach for pervasive opportunistic sensing

The advances in the areas of microelectronics and telecommunications are helping to materialize the vision of a pervasive computing model through the incorporation of sensors and communication interfaces into objects of everyday life. In recent years, there has been a growing interest in crowd assisted sensing applications, in which people serve as the building block that can be exploited to of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005