首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Ambient Intelligence is considered as the composition of three emergent technologies: Ubiquitous Computing, Ubiquitous Communication and Intelligent User Interfaces. The aim of integration of aforesaid technologies is to make wider the interaction between human beings and information technology equipment through the usage of an invisible network of ubiquitous computing devices composing dynamic computational-ecosystems capable of satisfy the users requirements. Many works focus the attention on the interaction from users to devices in order to allow an universal and immediate access to available content and services provided by the environment. This paper, vice versa, focuses on the reverse interactions, from devices to users, in order to realize a collection of autonomous control services able to minimize the human effort. In particular, by merging computational intelligence methodologies with standard Web technologies we show how ubiquitous devices will be able to find the suitable set of intelligent services in a transparent way.  相似文献   

2.
Huber  J.F. 《Computer》2002,35(10):100-102
The promise of ubiquitous computing is a future in which highly specialized, embedded computing devices operate seamlessly within the everyday environment and are transparent to users. Realizing this vision will require next-generation networks to support mobile multimedia devices with capabilities well beyond those of today's handsets. These networks will exploit wideband radio access technologies and IP-based protocols to provide IP transparency-all network elements support IP; mobility management for a globally networked environment; unique addressing for every user; personalization of information; positioning to enable location-dependent services; and end-to-end security. Such functionality requires more than providing wireless Internet access and e-mail.  相似文献   

3.
《Computer Networks》2001,35(4):443-456
CoolTown offers a Web model for supporting nomadic users, based on the convergence of Web technology, wireless networks and portable devices. This paper describes how CoolTown ties Web resources to physical objects and places, and how users interact with resources using the information appliances they carry, from laptops to smart watches. Enabling the automatic discovery of URLs from our physical surroundings, and using localized Web servers for directories, we create location-aware but ubiquitous systems. On top of this infrastructure we leverage device connectivity to support communication services.  相似文献   

4.
The aim of this paper is to point out the benefits that can be derived from research advances while implementing concepts such as ambient intelligence and ubiquitous/pervasive computing for promoting universal access in the information society, that is, for contributing to enable everybody, especially people with physical disabilities, to have easy access to all computing resources and information services that the upcoming worldwide information society will soon make available to the general public as well as to expert users. Following definitions of basic concepts relating to multimodal interaction, the significant contribution of multimodality to developing universal access is briefly discussed. Then, a short state of the art in ambient intelligence research is presented, including references to some major research projects either in progress or recently completed. The last section is devoted to bringing out the potential contribution of advances in ambient intelligence research and technology to the improvement of computer access for physically disabled people, hence, to the implementation of universal access. This claim is mainly supported by the following observations: (1) most projects are aiming at implementing ambient intelligence focus research efforts on the design of new interaction modalities and flexible/adaptive multimodal user interfaces; outcomes of these projects may contribute to improving computer access for users with physical disabilities; (2) such projects target applications meant to support users in a wide range of daily activities which will have to be performed simultaneously with the related supporting computing tasks; therefore, users will be placed in situational contexts where they will be confronted with similar difficulties to those encountered by physically disabled users, since they will have to share out their perceptual and motor capabilities between one or several daily activities and the computing tasks meant to support them; (3) ambient intelligence applications being intended for the general public, a wide range of interaction devices supporting a great variety of input and output modalities will be available, making it possible to provide physically disabled users with appropriate human–computer interaction means tailored to their individual needs at a reasonable expense.  相似文献   

5.
The proliferation of smartphones and the recent advancement in ubiquitous wireless access have made mobile Web services more possible than ever before. However, finding relevant Web services that can match requests and fit user context remains a major concern. The challenges facing Web service discovery are further magnified by the stringent constraints of mobile devices and the inherit complexity of wireless heterogeneous networks. Cloud computing, with its flexible design and theoretically unlimited computing resources, is a viable approach to bootstrapping Web service discovery. The cloud can build bridges between mobile devices, as a convenient ubiquitous interface, and a backbone infrastructure with abundant computing resources. This paper introduces “Discovery as a service (Daas)”, a novel cloud-based discovery framework that addresses the core components of mobile Web service discovery. The DaaS framework lays the foundation of efficient mobile Web service discovery that takes into consideration user preferences and context. The experimental validation and performance evaluation demonstrate that DaaS can effectively rank relevant services according to the various user context and preferences, in addition to enhancing the precision of the discovered services. The prototype also shows that Web service clustering for discovery significantly improves the overall response time, while the cloud maintains scalability according to prespecified performance criteria.  相似文献   

6.
The market for personal computing devices is rapidly expanding from PC, to mobile, home entertainment systems, and even the automotive industry. When developing software targeting such ubiquitous devices, the balance between development costs and market coverage has turned out to be a challenging issue. With the rise of Web technology and the Internet of things, ubiquitous applications have become a reality. Nonetheless, the diversity of presentation and interaction modalities still drastically limit the number of targetable devices and the accessibility toward end users. This paper presents webinos, a multi-device application middleware platform founded on the Future Internet infrastructure. Hereto, the platform’s architectural modifiability considerations are described and evaluated as a generic enabler for supporting applications, which are executed in ubiquitous computing environments.  相似文献   

7.
Ubiquitous recommender systems combine characteristics from ubiquitous systems and recommender systems in order to provide personalized recommendations to users in ubiquitous environments. Although not a new research area, ubiquitous recommender systems research has not yet been reviewed and classified in terms of ubiquitous research and recommender systems research, in order to deeply comprehend its nature, characteristics, relevant issues and challenges. It is our belief that ubiquitous recommenders can nowadays take advantage of the progress mobile phone technology has made in identifying items around, as well as utilize the faster wireless connections and the endless capabilities of modern mobile devices in order to provide users with more personalized and context-aware recommendations on location to aid them with their task at hand. This work focuses on ubiquitous recommender systems, while a brief analysis of the two fundamental areas from which they emerged, ubiquitous computing and recommender systems research is also conducted. Related work is provided, followed by a classification schema and a discussion about the correlation of ubiquitous recommenders with classic ubiquitous systems and recommender systems: similarities inevitably exist, however their fundamental differences are crucial. The paper concludes by proposing UbiCARS: a new class of ubiquitous recommender systems that will combine characteristics from ubiquitous systems and context-aware recommender systems in order to utilize multidimensional context modeling techniques not previously met in ubiquitous recommender systems.  相似文献   

8.
The recent proliferation of heterogeneous computing devices and wireless network technology presents new opportunities for Computer Supported Cooperative Work (CSCW). One emergent paradigm is that of ubiquitous collaboration, which provides widespread access to shared services through a variety of interactive devices, irrespective of whether individuals are mobile or deskbound. However, developing groupware that is interoperable across diverse, often mobile, environments can be difficult and costly. The fundamental issue is that current support infrastructures, which will meet the requirements for multi-user application development, are not operable within emerging ubiquitous settings. This paper explores this problem and presents a generic platform that promotes new forms of collaboration through mobility and ever-present computing services. The developed platform seeks to provide a wide range of collaborative services to a very diverse set of devices by adapting and extending existing middleware technologies.  相似文献   

9.
Cloud computing advocates a promising paradigm that facilitates the access within heterogeneous services, platforms, and end users. However, platforms (or host servers) have confined to devices which require a considerable computing resources. In this case, solutions concerning the efficient use of pervasive devices with constrained resources become an open issue. This study investigates the seamless connection between embedded devices and cloud resources to enhance the capability of computing and furthermore provide context-aware services. A method for wireless program dissemination and boot loading is proposed to transfer necessary information and resources between service and target device(s). The experiment results on time delay and energy cost demonstrate the feasibility and performance.  相似文献   

10.
It's important to consider both primary and secondary users when designing for intermediated interaction scenarios in India and elsewhere in the developing world. However, most of this research has focused on supporting users in the developed world who are voluntarily collaborating on a computing task. Many users in India, especially those from disadvantaged classes, have only partial or no physical access to computing devices. We refer to these users as secondary users to distinguish them from the primary users that the interface design process traditionally considers. Secondary users must interact with information resources via a proxy primary user who has the required access rights and skills. The proxy's filtering and funneling decisions limit the secondary users' information-seeking behavior; the secondary user might also have an unequal power relationship with the proxy. Therefore, secondary users might never know the full scope of actions and knowledge available to them. If we are to realize the egalitarian potential of computing, we must consider secondary users in the design process. We must develop technologies that recognize the needs and aspirations of all classes of users, including those without direct access to the user interface. In fact, by designing user interfaces explicitly supporting intermediated tasks, both primary and secondary users can benefit.  相似文献   

11.
Over the last two decades, we have seen a dramatic shift in computing systems, away from the monolithic mainframe and toward increasingly distributed, client-server systems. One of the key elements enabling the success of the distributed computing environment was the interconnecting network technology. High-speed, reliable network hardware and protocols evolved to support client-server applications. Network technology has now progressed to the point that applications are being written to specifically exploit the capabilities of the network. The explosion of World Wide Web applications is the latest example of the fact that the network is now the focus of the distributed computing environment. In a concurrent development, personal computing platforms placed increasingly powerful systems in ever smaller form factors. Users have embraced these advances: Mobile computers, in the form of laptops, palmtops, and personal digital assistants (PDAs), are a significant element of the current computing environment. However, to be fully productive, the mobile computer user requires access to the network. Further, access to a network is not sufficient. Mobile users need access to the same network-the same resources and services and communications capabilities-that they would if they were at their desktops. We refer to this concept of providing home network access to the mobile user as network extension. Addressing many requirements for practical wireless access, this Internet technology aids the development of advanced data services for wireless networks, including the integrated dispatch enhanced network  相似文献   

12.
ABSTRACT

Many libraries recognize the need to create Web sites accessible to users with disabilities, as legislated in U.S. Code Section 508, but Section 508 compliance defines a minimum legal level of accessibility. The same technology that can make a Web site available to users with disabilities can also make the site available to users with wireless devices, such as PDAs and cell phones, with Internet access. To bring about “maximum accessibility,” library Web designers need to implement Web standards. This article argues the place to begin implementing these standards is with an accessibility statement which serves as both a contract and a navigational aid.  相似文献   

13.
We present a framework for Web services provisioning in a hybrid environment of fixed and mobile computing resources. Several obstacles still hinder the seamless provisioning of Web services in mobile environments. Examples of such obstacles are: throughput and connectivity of wireless networks, limited computing resources of mobile devices, and risks of communication channel disconnections. In the proposed framework, software agents represent users, providers of services, and providers of resources. The business logic of composite services is expressed as a process model using statecharts formalism. Among other things, the use of agents provides an infrastructure that has the ability to handle disconnections during service preparation for execution. The framework also integrates a service execution planning approach to optimally select computing resources (fixed or mobile) on top of which services will be executed.  相似文献   

14.
Mobile cloud computing (MCC) is an emerging paradigm for transparent elastic augmentation of mobile devices capabilities, exploiting ubiquitous wireless access to cloud storage and computing resources. MCC aims at increasing the range of resource-intensive tasks supported by mobile devices, while preserving and extending their resources. Its main concerns regard the augmentation of energy efficiency, storage capabilities, processing power and data safety, to improve the experience of mobile users. The design of MCC systems is a challenging task, because both the mobile device and the Cloud have to find energy-time tradeoffs and the choices on one side affect the performance of the other side. The analysis of the MCC literature points out that all existing models focus on mobile devices, considering the Cloud as a system with unlimited resources. Also, to the best of our knowledge, no MCC-specific simulation tool exists. To fill this gap, in this paper, we propose a modeling and simulation framework for the design and analysis of MCC systems, encompassing all their components. The main pillar of the proposed framework is the autonomic strategy consisting of adaptive loops between every mobile devices and the Cloud. The proposed model of the mobile device takes into account online estimations of the actual Cloud performance – not only the nominal values of the performance indicators. At the same time, the model of the Cloud takes into consideration the characteristics of the workload, to adapt its configuration in terms of active virtual machines and task management strategies. Moreover, the developed discrete event simulator is an effective tool for the evaluation of an MCC system as a whole, or single components, considering different classes of parallel jobs.  相似文献   

15.
ABSTRACT

In the world of information technology, a security model is only as secure as its weakest link. There are several layers of security and different measures that can currently be implemented. However, they lack coordination, and therefore potential security breaches might compromise the network. With wireless access becoming the norm, and users requiring “on the move communication” even within a campus, networks are expanding past the traditional wired networks by adding wireless access points. This gives customers the flexibility they require but leaves a net threat vector to the network. There have been various encryption and security steps taken to validate the communication and authentication of the devices and end users connecting. This project addresses the critical problem of secure authentication using the 802.1x standard, which will be implemented using Microsoft's Radius server elements. It will involve the enrollment of secure certificates on Windows mobile devices, thus securing mobile devices from physical attacks. To ensure that all steps are adhered to, that all necessary applications have been installed, and to handle Web service communication, an application will be created that will provide an automated solution.  相似文献   

16.
Access control management for ubiquitous computing   总被引:1,自引:0,他引:1  
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. This ubiquitous computing poses new security challenges while the information can be accessed at anywhere and anytime because it may be applied by criminal users. Additionally, the information may contain private information that cannot be shared by all user communities. Several approaches are developed to protect information for pervasive environments against malicious users. However, ad hoc mechanisms or protocols are typically added in the approaches by compromising disorganized policies or additional components to protect from unauthorized access.In this paper, we present a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents. The model not only supports complex constraints for pervasive computing, such as services, devices and data types but also provides a mechanism to build rich reuse relationships between models and objects. Finally, comparisons with related works are analysed.  相似文献   

17.
Future multimedia user interfaces   总被引:2,自引:0,他引:2  
No matter how powerful or elegant the technologies underlying multimedia computing, it is the user interface that ultimately determines how these systems will be used. We provide an overview of two emerging areas of user-interface research that will play major roles in future multimedia systems: virtual environments and ubiquitous computing. We discuss what they are and why they are important, and describe their relationship to current multimedia systems. While mouse and window-based user interfaces provide access to 2D graphics, video, and sound, virtual environments not only involve interactive 3D graphics, but further address all our senses through the use of spatial audio, haptics, and other modalities. While it is still a research goal to provide high-throughput video on demand, ubiquitous computing will require that multimedia network infrastructure also support extremely low-latency interaction among large numbers of mobile wireless users. To arrive at an understanding of the needs, capabilities, and potential of these new paradigms, we introduce their terminology and technology, and explain the basic system architectures being explored, leading up to a discussion of key current research issues and future directions.  相似文献   

18.
Grid computing promises access to large amounts of computing power, but so far adoption of Grid computing has been limited to highly specialized experts for three reasons. First, users are used to batch systems, and interfaces to Grid software are often complex and different to those in batch systems. Second, users are used to having transparent file access, which Grid software does not conveniently provide. Third, efforts to achieve wide‐spread coordination of computers while solving the first two problems is hampered when clusters are on private networks. Here we bring together a variety of software that allows users to almost transparently use Grid resources as if they were local resources while providing transparent access to files, even when private networks intervene. As a motivating example, the BaBar Monte Carlo production system is deployed on a truly distributed environment, the European DataGrid, without any modification to the application itself. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

19.
Multimedia content,user mobility and heterogeneous client devices require novel systems that are able to support ubiquitous access to the Web resources.In this scenario,solutions that combine flexibility,efficiency and scalability in offering edge services for ubiquitous access are needed.We propose an original intermediary framework,namely Scalable Intermediary Software Infrastructure (SISI),which is able to dynamically compose edge services on the basis of user preferences and device characteristics.The SISI framework exploits a per-user profiling mechanism,where each user can initially set his/her personal preferences through a simple Web interface,and the system is then able to compose at run-time the necessary components.The basic framework can be enriched through new edge services that can be easily implemented through a programming model based on APIs and internal functions.Our experiments demonstrate that flexibility and edge service composition do not affect the system performance.We show that this framework is able to chain multiple edge services and to guarantee stable performance.  相似文献   

20.
Until very recently, the typical home computer user accessed the machine's software and processing capabilities solely through the physical interfaces of a mouse, keyboard, and monitor. Everyone, from software designers to industrial designers to Web site designers, relied on these elements to be the physical-interaction method that users employed to access their product. Today, interface designers can no longer assume that the interaction between a user and a digital interface occurs only, or most effectively, through traditional devices such as keyboards, mice, and number pads. Tangible interfaces and ubiquitous-computing technologies are changing the human relationship to computing technology, and designers must take this into account when creating products and services. In this article the authors describe some of the tools available for this purpose, including proprietary, open-source, and custom solutions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号