Rapid Authoring for VR-Based Simulations of Pervasive Computing Applications

نویسندگان

  • B. J. C. Jackson
  • P. L. Watten
  • P. F. Newbury
  • P. F. Lister
چکیده

A new paradigm in computing has arrived [1]. The pervasive computer provides a new application layer and presents new challenges for application designers. The combination of computing devices provides a unique environmentspecific platform for the development of applications. Applications not only rely on the pervasive computing devices and their interconnections, but also the location of these devices with respect to each other and the application user. This paper presents an overview of a design-flow, tool-chain and runtime environment which enables the rapid authoring of VR-based simulation components to facilitate the development of pervasive computing applications. A home automation example is used to evaluate the systems and to demonstrate the approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

International Symposium on Ubiquitous Virtual Reality 2009

M obile phones are now ubiquitous—recent advances in mobile phone platforms have given them many new user-friendly capabilities, such as taking pictures with a built-in camera, finding locations through GPS, playing audio/video files, rendering hardware-accelerated 3D graphics, and browsing the Internet. These features with augmented reality (AR) technologies also make mobile phones an ideal us...

متن کامل

Sensorized Garment Augmented 3D Pervasive Virtual Reality System

4 Virtual Reality (VR) technology has matured to a point where humans can navigate in virtual scenes, however providing them with a comfortable fully immersive role in VR remains a challenge. Currently available sensing solutions do not provide ease of deployment, particularly in the seated position, due to sensor placement restrictions over the body, and optic-sensing requires a restricted ind...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005