Asynchronous event detection for context inconsistency in pervasive computing

نویسندگان

  • Daqiang Zhang
  • Zhangbing Zhou
  • Qin Zou
  • Tianyi Zhan
  • Minho Jo
چکیده

Event detection for context inconsistency is challenging in pervasive computing environments, where contexts are often noisy owing to fragile connectivity, node frequent movement and resource constraints. As a recent scheme, CEDA — Concurrent Event Detection for Asynchronous inconsistency checking (CEDA) — concurrently detects context inconsistency by exploring the happened-before relation among events. Nevertheless, CEDA suffers from several problems — unscalable from partial centralized detection manner, heavy computation complexity and false negative. To address these challenges, we propose in this paper the SECA scheme — asynchronous event detection for context inconsistency in pervasive computing. It puts forward a new type logical clock — snapshot timestamp — to check event relations, which enables it to be efficient in the scenarios where CEDA fails to. Meanwhile, SECA comes up with a lightweight update mechanism for the snapshot clock, which considerably reduces time and space complexity. Extensive experiments have been conducted and results show that SECA surmounts CEDA with respect to detection accuracy and scalability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

File of “ Formal Specification and Runtime Detection of Dynamic Properties in Asynchronous Pervasive Computing Environments ”

In our paper “Formal Specification and Runtime Detection of Dynamic Properties in Asynchronous Pervasive Computing Environments”, we propose the Property Detection for Asynchronous Context (PDAC) framework to support formal specification and runtime detection of dynamic properties in asynchronous pervasive computing environments. Three essential parts of the framework are discussed: modeling of...

متن کامل

Checking Behavioral Consistency Constraints for Pervasive Context in Asynchronous Environments

Context consistency checking, the checking of specified constraint on properties of contexts, is essential to contextaware applications. In order to delineate and adapt to dynamic changes in the pervasive computing environment, context-aware applications often need to specify and check behavioral consistency constraints over the contexts. This problem is challenging mainly due to the distribute...

متن کامل

Enabling Context-awareness by Predicate Detection in Asynchronous Pervasive Computing Environments

Pervasive applications are involving more and more autonomous computing and communicating devices, augmented with the abilities of sensing and controlling the logical / physical environment. To enable context-awareness for such applications, we are challenged by the intrinsic asynchrony among the context collecting devices. To this end, we introduce the predicate detection theory and propose th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJAHUC

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2012