首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper presents a model for building context-based systems in pervasive computing environments from high level specifications. A pervasive computing environment is viewed as a collaboration space consisting of mobile users, system services, and sensors and resources embedded in the physical environment. The approach presented here is developed for building collaborative activities in which users and environment services cooperate towards some shared objectives and tasks. The specification model allows expression of policies related to context-based discovery and secure access of resources, and role-based interactions among users and environmental services. Using several examples we illustrate the capabilities of our specification model for expressing various kinds of context-based requirements for resource access and user interactions.  相似文献   

2.
Social network has extended its popularity from the Internet to mobile domain. Personal mobile devices can be self-organized and communicate with each other for instant social activities at any time and in any places to achieve pervasive social networking (PSN). In such a network, various content information flows. To which extent should mobile users trust it, whilst user privacy can also be preserved? Existing work has not yet seriously considered trust and reputation management, although trust plays an important role in PSN. In this paper, we propose PerContRep, a practical reputation system for pervasive content services that can assist trustworthy content selection and consumption in a pervasive manner. We develop a hybrid trust and reputation management model to evaluate node recommendation trust and content reputation in the context of frequent change of node pseudonyms. Simulations show the advantages of PerContRep in assisting user decisions and its effectiveness with regard to unfair rating attack, collaborative unfair rating attack, on-off attack and conflict behavior attack. A prototype system achieves positive user feedback on its usability and social acceptance.  相似文献   

3.
Applications and services for pervasive computing have been dramatically grown and have contributed extensively to our daily experiences in recent years. Smart systems, devices, and spaces are proactive for ubiquitous and pervasive computing. Smart information technology (IT) is also an outcome of the state of the art and novel mobile and ubiquitous computing technologies that include highly capable handheld device, pervasive and personal device, etc. This special issue will be a trigger for further related research and technology improvements in pervasive and ubiquitous computing using smart devices and services. This special issue called for original papers describing the latest developments, trends, and solutions of smart devices and spaces for pervasive computing including real-time operating systems (OS), tiny OS and middleware supports, mobile system performance, trustworthy Internet and communications, agents and mobile and pervasive services, among others. In particular, this special issue focuses on a remote control and media-sharing system, flash storage-based smart system, heterogeneous mobile OS, and prediction and auto-execution system for pervasive computing.  相似文献   

4.
Mobile context-aware applications execute in the background of hosts mobile devices. The applications source process and aggregate hosts’ contextual and personal information. This information is disclosed to ubiquitously pervasive services that adapt their offerings to individual preferences. Unfortunately, many developers continue to ignore the user perspective in context-aware application designs as they complicate their overall task and generate exponential requirements. The additional incorporation of privacy mechanisms in context-aware applications to safeguard context and personal information disclosures also complicates users’ tasks resulting to misconfigured or completely abandoned applications. Misconfigured applications give end-users a false assurance of privacy exposing them to comprising services. We present a usability study on Mobile Electronic Personality Version 2 a privacy enhanced context-aware mobile application for personalising ubiquitous services and adapting pervasive smart-spaces. We draw conclusions on key issues related to user needs, based on user interviews, surveys, prototypes and field evaluations. Users’ needs are evaluated against five themes, learn-ability, efficiency, memorability, errors, satisfaction and privacy contention. In addition, design layout preferences, privacy manageability and consensus design comprehension are also evaluated. Clarity of priorities in context-aware mobile applications shaped by usability studies effectively increases the acceptance of levels of potential users.  相似文献   

5.
Existing context-aware applications are limited in their support of user personalisation. Nevertheless, the increase in the use of context-aware technologies has sparked the growth in assistive applications resulting in a need to enable adaptation to reflect the changes in user behaviours. This paper introduces a systematic approach to service personalisation for mobile users in pervasive environments and presents a service-oriented distributed system architecture. The developed approach makes use of semantic technologies for user modelling and personalisation reasoning. In the paper we characterise user behaviours and needs in pervasive environments upon which ontological user models are created with special emphasis being placed on ontological modelling of dynamic and adaptive user profiles. We develop a rule-based personalisation mechanism that exploits semantic web rule mark-up language for rule design and a combination of semantic and rule-based reasoning for personalisation. We use two case studies focusing on providing personalised travel assistance for people using Help-on-Demand services deployed on a smart-phone to contextualise the discussions within the paper. The proposed approach is implemented in a prototype system, which includes Help-on-Demand services, content management services, user models and personalisation mechanisms in addition to application specific rules. Experiments have been designed and conducted to test and evaluate the approach with initial results demonstrating the functionality of the approach.  相似文献   

6.
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.  相似文献   

7.
With the combination of mobile devices and readers in recent years, mobile Radio Frequency Identification (RFID) systems have been widely deployed in mobile identification. E-commerce, for instance, has applied many of mobile RFID’s deriving services, one of which is the transfer of a tagged item’s ownership in supply chains. However, current tag ownership transfer protocols can only transfer one tag at a time. For example, Yang et al.’s Secure Ownership Transfer Protocol is designed for low-cost lightweight RFID tags but it can only do one tag a time. For this reason, we propose a secure RFID protocol for group ownership transfer. We can transfer group(s) of tags’ ownership in one attempt. Since the two supplicants involved in ownership transfer are usually under different servers’ authorities, our protocol is designed to allow authority-crossing ownership transfer in a mobile RFID environment. Besides, it is able to assign its transfer targets and to secure against most RFID attacks.  相似文献   

8.
Secure mobile communication is essential for the pervasive accessibility of critical information infrastructure. Connecting control systems with the business enterprise, wireless telemetry and mobile user interaction with critical infrastructure systems are examples of services that motivate the need for secure mobile communication. Mobile IPv6 is being touted to provide communication support for such services. The security of Mobile IPv6 poses key challenges impeding its wide-scale adoption. Several security mechanisms have been proposed in the literature. This paper surveys security vulnerabilities of Mobile IPv6, provides a taxonomy for the main existing and proposed solutions, and then extends to outline some open issues.  相似文献   

9.
Guest Editors' Introduction: Energy Harvesting and Conservation   总被引:1,自引:0,他引:1  
Pervasive computing aims to integrate computation into our daily work practice to enhance our activities without being noticed. In other words, computing becomes truly invisible. Yet at the heart of every pervasive computing system are electronic components that consume energy. Managing the energy needs of mobile systems, or systems for which reliable power isn’t guaranteed, can be a significant distraction for users. How can we minimize user involvement in the energy management process to make pervasive computing devices more pervasive?  相似文献   

10.
《Advanced Robotics》2013,27(9-10):1249-1270
This paper presents a multi-sensor-based control strategy allowing a mobile robot to safely navigate with respect to a given human being. Two sensors are embedded in our robot: a vision system that is able to detect and track the person of interest, and a RFID antennas belt that can locate the tag worn by the latter. Thus, our control strategy will be built using image features (when the user is visible) and RFID information (when not). In the first case, a robust visual servoing control will be designed, while in the second case a suitable RFID controller will be proposed. Experimental results demonstrate the efficiency of the proposed control strategy.  相似文献   

11.
ABSTRACT

This study aims to augment our understanding of user intention to use mobile IT in health. Experiential dispositions and technology perceptions around a mobile service that is currently in use to access other value-seeking services are integrated to present an enriched characterization of intention to use m-health. Primary data from a pressing health context in a developing economy are collected to validate the model. The results demonstrate that previous experience from value services received on a mobile service enhances user attention, which in turn positively impacts the perceived usefulness of an incoming m-health program, which then influences user intention to adopt m-health services delivered on that mobile service. Overall, the findings provide a comprehensive understanding of user intention to accept m-health. Additionally, our results provide insights toward the choice of mobile technology and indicate aspects of message framing that may ensure practicable deployment and successful implementation of m-health programs.  相似文献   

12.
Today, mobile and smart phones are often viewed as enablers of pervasive computing systems because they provide anytime and anywhere access to information services and computational resources. However, mobile devices are inherently constrained in their computational power and battery capacity making them mere “dumb terminals” connected to a resource-rich pervasive environment. If they are ever to play a more prominent role as true elements of a pervasive environment, mobile devices must be able to embed more application logic and delegate processing requests to pervasive infrastructure. In this paper we discuss distribution and offloading of computationally intensive tasks in pervasive environments populated by mobile devices. This approach is illustrated by experimenting with a distributed version of iterative deepening A* search algorithm. In our approach, the solution space of a problem being solved is partitioned and distributed among heterogeneous mobile devices, which yields a significant increase in the time of finding an optimal solution. Distributed IDA* search algorithm does not require any coordination or communication between mobile devices, but added inter-processor communication through shared memory further increases the efficiency of the algorithm. This paper presents the results of our experiments with the algorithm and discusses a number of issues related to its implementation.  相似文献   

13.
Pervasive computing is a user-centric, scalable, parallel, and distributed computing paradigm, allowing users to access to their preferred services even while moving around. Transaction management for pervasive environments has to provide mobile users with reliable and transparent services anytime anywhere. To make such a vision a reality, the communication of pervasive transaction processing should be context-aware for adapting to dynamically changing execution environments, and energy-efficient for prolonging the lifetime of battery-powered mobile devices. In this paper, we propose a context model and a context-aware transaction model for pervasive transactions, and present a c\underline{\mathrm{c}} ontext-adaptive and e\underline{\mathrm{e}} nergy-efficient t\underline{\mathrm{t}} ransaction m\underline{\mathrm{m}} anagement mechanism (CETM) that can dynamically adjust transaction execution behaviors in terms of current context information. Moreover, we model and verify the correctness of the CETM through Petri nets. The simulation results have demonstrated that our transaction management mechanism CETM can significantly reduce the failed probability of concurrent pervasive transactions.  相似文献   

14.
Dynamic Service Composition in Pervasive Computing   总被引:3,自引:0,他引:3  
Service-oriented architectures (SOAs) promise to provide transparency to resource access by exposing the resources available as services. SOAs have been employed within pervasive computing systems to provide essential support to user tasks by creating services representing the available resources. The mechanism of combining two or more basic services into a possibly complex service is known as service composition. Existing solutions to service composition employ a template-matching approach, where the user needs are expressed as a request template, and through composition, a system would identify services to populate the entities within the request template. However, with the dynamism involved in pervasive environments, the user needs have to be met by exploiting available resources, even when an exact match does not exist. In this paper, we present a novel service composition mechanism for pervasive computing. We employ the service-oriented middleware platform called pervasive information communities organization (PICO) to model and represent resources as services. The proposed service composition mechanism models services as directed attributed graphs, maintains a repository of service graphs, and dynamically combines multiple basic services into complex services. Further, we present a hierarchical overlay structure created among the devices to exploit the resource unevenness, resulting in the capability of providing essential service-related support to resource-poor devices. Results of extensive simulation studies are presented to illustrate the suitability of the proposed mechanism in meeting the challenges of pervasive computing user mobility, heterogeneity, and the uncertain nature of involved resources.  相似文献   

15.
Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices which can become linked in a pervasive computing environment: PDAs, GPS sensors, RFID chips/readers, publicly-located video surveillance cameras, Internet-enabled mobile phones, and the like, each raise threats to individual privacy. Without discounting the value of this approach, this paper aims to propose an alternative; and, as a result of recasting the threat to individual privacy from pervasive computing, to identify other, and deeper, moral goods that pervasive computing puts at risk that otherwise might remain concealed. In particular, I argue that pervasive computing threatens to compromise what I call existential autonomy: the right to decide for ourselves at least some of the existential conditions under which we form and develop our ways of life, including our relations to information technology. From this perspective, some moral goods at stake in protecting privacy in an environment of pervasive computing emerge that have less to do with furthering human well-being through the promotion of self-identity and subjectivity, than with stimulating curiosity, receptivity to difference, and, most broadly, openness to the world.  相似文献   

16.
In the current article, we address the problem of constructing radiofrequency identification (RFID)-augmented environments for mobile robots and the issues related to creating user interfaces for efficient remote navigation with a mobile robot in such environments. First, we describe an RFID-based positioning and obstacle identification solution for remotely controlled mobile robots in indoor environments. In the robot system, an architecture specifically developed by the authors for remotely controlled robotic systems was tested in practice. Second, using the developed system, three techniques for displaying information about the position and movements of a remote robot to the user were compared. The experimental visualization techniques displayed the position of the robot on an indoor floor plan augmented with (1) a video view from a camera attached to the robot, (2) display of nearby obstacles (identified using RFID technology) on the floor plan, and (3) both features. In the experiment, test subjects controlled the mobile robot through predetermined routes as quickly as possible avoiding collisions. The results suggest that the developed RFID-based environment and the remote control system can be used for efficient control of mobile robots. The results from the comparison of the visualization techniques showed that the technique without a camera view (2) was the fastest, and the number of steering motions made was smallest using this technique, but it also had the highest need for physical human interventions. The technique with both additional features (3) was subjectively preferred by the users. The similarities and differences between the current results and those found in the literature are discussed.  相似文献   

17.
Increasingly, mobile devices play a key role in the communication between users and the services embedded in their environment. With ever greater number of services added to our surroundings, there is a need to personalize services according to the user needs and environmental context avoiding service behavior from becoming overwhelming. In order to prevent this information overload, we present a method for the development of mobile services that can be personalized in terms of obtrusiveness (the degree in which each service intrudes the user’s mind) according to the user needs and preferences. That is, services can be developed to provide their functionality at different obtrusiveness levels depending on the user by minimizing the duplication of efforts. On the one hand, we provide mechanisms for describing the obtrusiveness degree required for a service. On the other hand, we make use of Feature Modeling techniques in order to define the obtrusiveness level adaptation in a declarative manner. An experiment was conducted in order to put in practice the proposal and evaluate the user acceptance for the personalization capabilities provided by our approach.  相似文献   

18.
IPTV, a technological convergence that combines communication and broadcasting technologies, delivers customized, interactive TV content and other multimedia information over wired and wireless connections. Providing secure access to IPTV services calls for authentication, without proper and secure authentication mechanisms, an individual impersonating a subscriber could steal a service. This paper proposes a new authentication protocol to authenticate IPTV users. The authors based the proposed protocol, a hybrid authentication protocol providing lightweight, personalized user authentication, on RFID (radio-frequency identification) and USIM (Universal Subscriber Identity Module) technologies. In the proposed protocol, USIM performs highly personalized authentication, and the authenticated subscriber’s RFID tags can have a temporary authority to execute authentication. These RFID tags become Agent Tags authorized to authenticate subscribers. Agent Tags identify and authenticate themselves to RFID readers in the set-top box, thus, simplifying the authentication process.  相似文献   

19.
顾敬潇  彭鑫  赵文耘 《计算机科学》2015,42(12):52-55, 64
普适计算环境下的智能移动设备是面向终端用户的服务资源聚集和编排的主要载体。普适计算环境中的服务资源具有多种不同的形态,包括基于互联网提供的Web服务、终端设备自身服务和资源(例如本地应用、自带传感器)以及所处环境中可访问的服务(例如环境传感器)。此外,不断变化的上下文环境对软件本身的自适应能力提出了新的要求,而移动设备上的服务编排受设备计算能力和资源的限制。为了解决上述问题,提出了一个面向普适计算环境的Android平台服务编排框架ASOF。通过ASOF,移动终端可在运行时获取所需业务流程的服务模板,并对该模板中的抽象服务进行服务绑定,实现轻量级的混合服务编排,使终端能够动态获得调用普适计算环境中各种类型的服务的能力。随后,基于OSGi Felix框架给出了一套ASOF的标准实现,并以一个具体案例验证其有效性。  相似文献   

20.
Snow  A.P. Varshney  U. Malloy  A.D. 《Computer》2000,33(7):49-55
The world is becoming more dependent on wireless and mobile services, but the ability of wireless network infrastructures to handle the growing demand is questionable. As wireless and mobile services grow, weaknesses in network infrastructures become clearer. Failures not only affect current voice and data use but could also limit emerging wireless applications such as e-commerce and high-bandwidth Internet access. As wireless and mobile systems play greater roles in emergency response, including 911 and enhanced 911 services, network failures take on life-or-death significance. Therefore, in addition to directing some attention to designing survivable wireless and mobile networks, developers must also keep in mind that increasingly pervasive and demanding services will further escalate the importance of reliability and survivability requirements. The authors explain several options providers must consider to decrease the number of network failures and to cope with failures when they do occur  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号