Computing Migration Through Context Awareness and Context Transmission

نویسندگان

  • Zhaohui Cheng
  • Kenneth Chin
  • Yuan Luo
چکیده

With the development of wireless communication and portable devices, people can now enjoy the benefits of mobile computing. But due to the nature and design of portable devices, it is unlikely portable devices can provide certain functionalities with the same quality as fixed devices. So during mobile computing, it is not trivial to attain computing within a fixed network environment with high-power workstations. A means of discovering available computing resources and enabling manipulation of them to cooperate with mobile devices to maintain the continuous computing with better quality within an active environment is required. In this paper we present a novel architecture that facilitates the detection and manipulation of resources using context awareness and context migration methods in mobile computing

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A Shadow-Like Task Migration Model Based on Context Semantics for Mobile and Pervasive Environments

Pervasive computing is a user-centric mobile computing paradigm, in which tasks should be migrated over different platforms in a shadow-like way when users move around. In this paper, we propose a context-sensitive task migration model that recovers program states and rebinds resources for task migrations based on context semantics through inserting resource description and state description se...

متن کامل

A Study on Social Context of Drug Dealers’ Deviant Migration in Koohdasht

This paper seeks to investigate a new type of migration in Koohdasht city which is immigration to Tehran to carry out criminal activities. Unknown factors and the way in which these migrations take place made it necessary to use the qualitative approach in order to explore the subject matter. Grounded theory method was used to look at the field of research and achieve an emic and etic view of t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003