Minimizing the Side Effect of Context Inconsistency Resolution for Ubiquitous Computing
نویسندگان
چکیده
Applications in ubiquitous computing adapt their behavior based on contexts. The adaptation can be faulty if the contexts are subject to inconsistency. Various techniques have been proposed to identify key contexts from inconsistencies. By removing these contexts, an application is expected to run with inconsistencies resolved. However, existing practice largely overlooks an application’s internal requirements on using these contexts for adaptation. It may lead to unexpected side effect from inconsistency resolution. This paper studies a novel way of resolving context inconsistency with the aim of minimizing such side effect for an application. We model and analyze the side effect for rulebased ubiquitous applications, and experimentally measure and compare it for various inconsistency resolution strategies. We confirm the significance of such side effect if not controlled, and present an efficient framework to minimize it during context inconsistency resolution.
منابع مشابه
Asynchronous event detection for context inconsistency in pervasive computing
Event detection for context inconsistency is challenging in pervasive computing environments, where contexts are often noisy owing to fragile connectivity, node frequent movement and resource constraints. As a recent scheme, CEDA — Concurrent Event Detection for Asynchronous inconsistency checking (CEDA) — concurrently detects context inconsistency by exploring the happened-before relation amon...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملSECA: Snapshot-based Event Detection for Checking Asynchronous Context Consistency in Ubiquitous Computing
Context-consistency checking is challenging in the dynamic and uncertain ubiquitous computing environments. This is because contexts are often noisy owing to unreliable sensing data streams, inaccurate data measurement, fragile connectivity and resource constraints. One of the state-of-the-art efforts is CEDA, which concurrently detects context consistency by exploring the happened-before relat...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملClassification of Ultra-high Resolution Images using Soft Computing
The main objective of this paper is to use a computational intelligence algorithm for preparing a mapping map that categorizes different patterns of identification of infected areas and changes in radiation pollution. In this paper, the use of the fuzzy inference system has been proposed to determine the degree of radiation contamination in the regions. The study uses ultra-high resolution spec...
متن کامل