Self-configuring mining for ubiquitous computing
نویسندگان
چکیده
Ubiquitous computing software needs to be autonomous so that essential decisions such as how to configure its particular execution are self-determined. Moreover, data mining serves an important role for ubiquitous computing by providing intelligence to several types of ubiquitous computing applications. Thus, automating ubiquitous data mining is also crucial. We focus on the problem of automatically configuring the execution of a ubiquitous data mining algorithm. In our solution, we generate configuration decisions in a resource-aware and context-aware manner since algorithm executes in an environment in which the context often changes and computing resources are often severely limited. We propose to analyze the execution behavior of the data mining algorithm by mining its past executions. By doing so, we discover the effects of resource and context states as well as parameter settings on the data mining quality. We argue that a classification model is appropriate for predicting the behavior of an algorithm's execution and we concentrate on decision tree classifier. We also define taxonomy on data mining quality so that tradeoff between prediction accuracy and classification specificity of each behavior model that classifies by a different abstraction of quality, is scored for model selection. Behavior model constituents and class label transformations are formally defined and experimental validation of the proposed approach is also performed.
منابع مشابه
A Middleware to Reduce the Complexity of Developing Ubiquitous Computing Systems
Ubiquitous Computing advocates the construction of large mobile and distributed systems that help enhance physical spaces and aid users in performing various kinds of tasks. These systems, however, are incredibly complex. Developers face a number of challenges in developing ubiquitous computing applications and services. These systems are highly dynamic and fault-prone. Different systems have d...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملSelf-configuring, Lightweight Sensor Networks for Ubiquitous Computing
We show that it is possible to extract geometric descriptions of the spaces observed by sensor networks, even if the network consists of sensors that are of very limited ability: such as motion detectors. By using statistical techniques and relying only on the unconstrained patterns generated by the occupants of the building we show how to recover information about sensor geometry. This is impo...
متن کاملUbiquitous Data-Mining with Self-Organizing Maps
Advances in technology are turning our mobile phones or PDAs into powerful computing devices capable of executing data mining algorithms. This paper discusses how the Self Organizing Map (SOM) algorithm can be adapted to a cooperating network of these devices. This approach opens the door to several new applications of data mining, including active data-collecting devices and ondemand knowledge...
متن کاملThe Concepts of an End-user-enabling Architecture for Ubiquitous Computing
This paper describes the set of concepts that underlie the “Plug-Synapse” model, which supports endusers in composing and configuring ubiquitous computing applications. The technology that implements the model is briefly presented; all have been developed in the course of research during the e-Gadgets (IST-FET) project.
متن کامل