Combining Theory and Systems Building in Pervasive Computing
نویسندگان
چکیده
Pervasive computing are nowadays in widespread use, deeply penetrating into and increasingly demonstrating its significance in our everyday work and leisure life. In the last decade, cheap and low energy consuming devices made far-reaching impact on the pervasive computing paradigm and fueled up a plethora of new applications. For instance, solar-powered sensors are expansively deployed to monitor fragile environments [1]; smart telephony and wireless Internet access enabled personalised information provision [2]; and RFID and other identification technologies enhanced factory automation making manufacture easier and more cost-effective [3]. In various contexts, Pervasive Computing has been used interchangeably with other terms such as “ubiquitous computing”, “ambient intelligence”, or the most recent and hottest “Internet of Things”. A single definition, therefore, is hard to achieve. Instead, a family of both conventional and emerging disciplines have been considered underpinning or relevant to pervasive computing. These include, but not limited to, contextual-awareness, mobile computing, wireless communication, human-computer interaction, sensor network, distributed artificial intelligence, etc. At the heart of the diverse landscape of enabling technologies, pervasive computing follows one single principle. That is Mark Weiser’s vision of smart devices blending and disappearing into our surroundings so as to provide unobtrusive and continuous support to our everyday activities [4][5]. Indeed, there are so many interesting things to cover in pervasive computing. This special issue of the Computer Journal aims at reporting novel research, new developments, and directions for future investigation and applications in some chosen subfields. In particular, we selected papers from recent international conferences and workshops that have triggered interesting discussion in the audiences. We tried to select papers that jointly covered multiple aspects of pervasive computing. For instance, on the network front, the paper “Ant-based Energy-aware Disjoint Multipath Routing Algorithm for MANETs” by Wu and Song discussed a novel routing algorithm for mobile ad hoc networks. They utilised ant colony-based meta heuristics and confirmed a low routing overhead by way of comparative studies. A few other papers also devoted to improve our network experience through new algorithms and/or architecture. In a pervasive computing environment, it is essential to channel diverse atomic services together so as to achieve a predefined goal. In the meantime, service composition should be flexible to adapt to the ever-changing user requirement and environment conditions. The paper “A Policy-Driven Service Composition Method for Adaptation in Pervasive Computing Environment” by Zhang, Shi and Xiao explored the potentials of a policy-driven service composition method. Leveraging a hierarchical policy model and a policy language, the proposed method triggers services based on the situation and/or location of users and events. A series of optimisation is then applied to fine-tune the composition. Although it has not been mentioned explicitly, context of services and users played an important role in Zhang, Shi and Xiao’s model. Context has been increasingly recognised as an important feature in service provision and is also a main topic in this special issue. We, therefore, would like to draw the reader’s attention to two papers. In “Smart-Context: A Context Ontology for Pervasive Mobile Computing”, Moore, Hu and Wan reported a Web Ontology Language (OWL) [6] based context ontology. Apart from OWL’s native description logic reasoning, they leveraged decision tree and presented some promising and interesting results, as well as more research questions to be further investigated in the field of “smart” context. Interestingly, environmental context was considered not the only factor that we need to respond to in “A Rule-based Method for Improving Adaptability in Pervasive Systems” by Lin, Song and Wang that calls for more investigation on “dynamic requirements” from “[the] application” itself. They proposed a rule-based system that separate changing factors from the actual systems and concluded a better system adaptability through real-life experiments.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملIncremental awareness and compositionality: A design philosophy for context-aware pervasive systems
Context-aware pervasive systems are an important emerging category of software, increasingly pervading into daily life, play and work. These systems are characterized by capabilities for sensing the physical world and taking action, autonomously or in cooperation with users. This paper proposes an incremental approach to building contextaware pervasive systems, with a particular emphasis on sys...
متن کاملCOMBINING FUZZY QUANTIFIERS AND NEAT OPERATORS FOR SOFT COMPUTING
This paper will introduce a new method to obtain the order weightsof the Ordered Weighted Averaging (OWA) operator. We will first show therelation between fuzzy quantifiers and neat OWA operators and then offer anew combination of them. Fuzzy quantifiers are applied for soft computingin modeling the optimism degree of the decision maker. In using neat operators,the ordering of the inputs is not...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملCombining Pervasive Computing With Social Networking for a Student Environment
Whereas social networking has become an essential part of computing today, pervasive computing is seen as a key component for future systems. However, these two paradigms are complementary in many respects – the former responsible for communication and interaction between people, the latter focused on interaction with devices and services in the environment surrounding the user. By combining th...
متن کاملAlgorithms for Computing Limit distributions of Oscillating Systems with Finite Capacity
We address the batch arrival systems with finite capacity under partial batch acceptance strategy where service times or rates oscillate between two forms according to the evolution of the number of customers in the system. Applying the theory of Markov regenerative processes and resorting to Markov chain embedding, we present a new algorithm for computing limit distributions of the number cus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Comput. J.
دوره 53 شماره
صفحات -
تاریخ انتشار 2010