QACA: Quality Assured Context Acquisition in Context-Aware Computing

نویسندگان

  • Yuanping Li
  • Ling Feng
  • Tharam Dillon
چکیده

Previous research work in context quality primarily focuses on identifying and modeling it. However, assuring context quality is no less challenging than modeling it. Difficulties lie in acquiring high-quality context from the context providers whose quality and availability can not be guaranteed. In this paper, we propose a context quality assurance strategy QACA based on the least square error, by leveraging the redundancy of context providers. In this strategy, redundant imprecise and unstable context providers are used to constitute a more precise and stable context provision. Such a strategy provides a theoretical basis to implement a specification based context acquisition middleware.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Resource-Optimized Quality-Assured Ambiguous Context Mediation in Pervasive Environments

Pervasive computing applications envision sensor rich computing and networking environments that can capture various types of contexts of inhabitants of the environment, such as their locations, activities, vital signs, and environmental measures. Such context information is useful in a variety of applications, for example to manage health information to promote independent living in “aging-in-...

متن کامل

Supporting pervasive computing applications with active context fusion and semantic context delivery

Future pervasive computing applications are envisioned to adapt the applications’ behaviors by utilizing various contexts of an environment and its users. Such context information may often be ambiguous and also heterogeneous, which make the delivery of unambiguous context information to real applications extremely challenging. Thus, a significant challenge facing the development of realistic a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011