首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Pervasive computing applications often need to maintain uninterrupted computing experiences when users move across devices. This advanced feature, recognized as application mobility, brings many challenges to the pervasive computing community. For a better understanding of the challenges and existing approaches to application mobility, this paper surveys related work with a classification and comparison framework established along four dimensions of design concerns in application migration: temporal, spatial, entity and other concerns. Through this survey this paper attempts to provide a systematic reference for developers to leverage off among different migration strategies for seamless application mobility. Moreover, it sheds some light on future work directions.  相似文献   

2.
The rapidly emerging area of pervasive computing faces many challenging research issues critical to application developers. Wide heterogeneity of hardware, software, and network resources pose veritable coordination problems and demand thorough knowledge of individual elements and technologies. In order to ease this problem and to aid application developers, different middleware platforms have been proposed by researchers. Though the existing middleware solutions are useful, they themselves have varied features and contribute partially, for context, data, or service management related application developments. There is no single middleware solution that can address a majority of pervasive computing application development issues, due to the diverse underlying challenges. In this survey paper, we identify different design dimensions of pervasive computing middleware and investigate their use in providing various system services. In-depth analysis of the system services have been carried out and middleware systems have been carefully studied. With a view to aid future middleware developers, we also identify some challenging open research issues that have received little or no attention in existing middleware solutions.  相似文献   

3.
In product design, prototypes - approximations of a product along some dimensions - are the essential medium for information, interaction, integration, and collaboration. Information appliances such as mobile phones, digital cameras, and music players are a growing area of ubiquitous computing. Designers currently create two separate sets of prototypes: "looks-like" prototypes that show only the device's form (the atoms) and "works-like" prototypes that use a computer display to demonstrate the interaction (the bits). Because of the required skill and time investment, designers don't build comprehensive prototypes that join form and function until late in development.  相似文献   

4.
MundoCore is a communication middleware specifically designed for the requirements of pervasive computing. To address the high degree of heterogeneity of platforms and networking technologies, it is based on a microkernel design, supports dynamic reconfiguration, and provides a common set of APIs for different programming languages (Java, C++, Python) on a wide range of different devices. The architectural model addresses the need for proper language bindings, different communication abstractions, peer-to-peer overlays, different transport protocols, different invocation protocols, and automatic peer discovery.  相似文献   

5.
普适计算的可信研究*   总被引:1,自引:0,他引:1  
随着应用规模的不断扩展以及具有无处不在性和便捷性的普适计算模式的特点,对普适计算环境下的可信保障提出了更高的要求。普适计算的可信保证是无时无处不在而又不可见的计算方式得以实施的重要保障,是普适计算领域的研究热点。从访问控制、隐私保护和容错三个方面阐述了普适计算的可信技术,并指出了该领域的未来研究发展趋势。  相似文献   

6.
Toward pervasive computing   总被引:1,自引:0,他引:1  
Summary form only given. The fundamental principles that guide pervasive computing environment design evolved with distributed systems: local area networks, middleware, wide-area networks, the WWW. Over the years, ever smaller, portable computers came on the market and wireless networking technology evolved, leading to the emergence of mobile and wireless computing. Embedded computing gave us small devices, sensors and actuators, increasingly with communications capability. There are now substantial projects that demonstrate that sensor-rich environments, such as active buildings and cities, are feasible and will be deployed widely in the real world in the near future. This issue of Pervasive Computing describes several such projects.  相似文献   

7.
Location privacy in pervasive computing   总被引:16,自引:0,他引:16  
As location-aware applications begin to track our movements in the name of convenience, how can we protect our privacy? This article introduces the mix zone-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity. It is based on frequently changing pseudonyms.  相似文献   

8.
Ontology-enabled pervasive computing applications   总被引:1,自引:0,他引:1  
Information technology's rapid evolution has made tremendous amounts of information and services available at our fingertips. However, we still face the frustration of trying to do simple things in the device- and application-rich environments where we live and work. Task computing is defined as computation to fill the gap between the tasks that users want to perform and the services that constitute available actionable functionality. To support task computing, we have implemented a Task Computing Environment including client environment, service discovery mechanism, and Semantic Web services and tools. TCE is composed of several components including STEER (Semantic Task Execution EditoR), White Hole, and PIPE (Pervasive Instance Provision Environment).  相似文献   

9.
10.
Unseen, a knowledge-sharing experience machine for outdoor public spaces, continuously collects real-time data on plants, insects, and animals through a multicamera vision system. Unseen's interpretation and sharing of this data invites visitors to reconsider and question their preconceptions about wildlife. We describe the conception, implementation, and evaluation of a knowledge-sharing system for outdoor spaces. Like a nature interpretation center, our fully automated, machine vision-based outdoor installation shows visitors interesting facts about the area they are visiting.  相似文献   

11.
rfid has already found its way into a variety of large scale applications and arguably it is already one of the most successful technologies in the history of computing. Beyond doubt, rfid is an effective automatic identification technology for a variety of objects including natural, manufactured and handmade artifacts; humans and other species; locations; and increasingly media content and mobile services. In this survey we consider developments towards establishing rfid as the cost-effective technical solution for the development of open, shared, universal pervasive computing infrastructures and look ahead to its future. In particular, we discuss the ingredients of current large scale applications; the role of network services to provide complete systems; privacy and security implications; and how rfid is helping prototype emerging pervasive computing applications. We conclude by identifying common trends in the new applications of rfid and ask questions related to sustainable universal deployment of this technology.  相似文献   

12.
Project Aura: toward distraction-free pervasive computing   总被引:17,自引:0,他引:17  
The most precious resource in a computer system is no longer its processor, memory, disk, or network, but rather human attention. Aura aims to minimize distractions on a user's attention, creating an environment that adapts to the user's context and needs. Aura is specifically intended for pervasive computing environments involving wireless communication, wearable or handheld computers, and smart spaces. Human attention is an especially scarce resource in such environments, because the user is often preoccupied with walking, driving, or other real-world interactions. In addition, mobile computing poses difficult challenges such as intermittent and variable-bandwidth connectivity, concern for battery life, and the client resource constraints that weight and size considerations impose. To accomplish its ambitious goals, research in Aura spans every system level: from the hardware, through the operating system, to applications and end users. Underlying this diversity of concerns, Aura applies two broad concepts. First, it uses proactivity, which is a system layer's ability to anticipate requests from a higher layer. In today's systems, each layer merely reacts to the layer above it. Second, Aura is self-tuning: layers adapt by observing the demands made on them and adjusting their performance and resource usage characteristics accordingly. Currently, system-layer behavior is relatively static. Both of these techniques will help lower demand for human attention.  相似文献   

13.
Trust-based security in pervasive computing environments   总被引:1,自引:0,他引:1  
Kagal  L. Finin  T. Joshi  A. 《Computer》2001,34(12):154-157
Traditionally, stand-alone computers and small networks rely on user authentication and access control to provide security. These physical methods use system-based controls to verify the identity of a person or process, explicitly enabling or restricting the ability to use, change, or view a computer resource. However, these strategies are inadequate for the increased flexibility that distributed networks such as the Internet and pervasive computing environments require because such systems lack central control and their users are not all predetermined. Mobile users expect to access locally hosted resources and services anytime and anywhere, leading to serious security risks and access control problems. We propose a solution based on trust management that involves developing a security policy, assigning credentials to entities, verifying that the credentials fulfill the policy, delegating trust to third parties, and reasoning about users' access rights. This architecture is generally applicable to distributed systems but geared toward pervasive computing environments  相似文献   

14.
基于上下文的普适计算角色访问控制模型   总被引:1,自引:0,他引:1  
针对普适计算访问控制上下文感知的特点,分析了现有扩展RBAC模型的不足,提出了基于上下文的角色访问控制模型(CRBAC).模型定义了可执行角色集,引入由时间状态,位置信息、用户信任值组成的上下文信息,由上下文信息激活可执行角色集,并以此代表用户最终获得的权限,这样用户就只能在一定的上下文中才可以执行某个角色的某个权限,实现了细粒度的动态授权.然后分别对此模型下单用户和多用户的访问控制过程进行了描述,最后利用有限状态机验证了模型的安全性.  相似文献   

15.
16.
Service discovery in pervasive computing environments   总被引:6,自引:0,他引:6  
Pervasive computing environments pose unique service discovery challenges. We have developed a taxonomy of existing protocols as a basis for analyzing their approaches and identifying problems and open issues relative to service discovery in pervasive computing environments.  相似文献   

17.
Adaptive offloading for pervasive computing   总被引:1,自引:0,他引:1  
Delivering a complex application on a resource-constrained mobile device is challenging. An adaptive offloading system enables dynamic partitioning of the application and efficient offloading of part of its execution to a nearby surrogate. To deliver pervasive services without modifying the application or degrading its fidelity, we propose an adaptive offloading system that includes two key parts: a distributed offloading platform and an offloading inference engine. There are two important decision-making problems for adaptive offloading: adaptive offloading triggering and efficient application partitioning.  相似文献   

18.
An infrastructure approach to support context-aware pervasive computing is advantageous for rapid prototyping of context-aware distributed applications and beneficial for unifying modelling of context and reasoning in uncertain conditions. This paper presents the ECORA framework for context-aware computing, which is designed with a focus on reasoning about context under uncertainty and addressing issues of heterogeneity, scalability, communication and usability. The framework follows an agent-oriented hybrid approach, combining centralized reasoning services with context-aware, reasoning capable mobile software agents. The use of a centralized reasoning engine provides powerful reasoning capabilities and deploying context-aware mobile agents enables agility and robustness of components in the pervasive system. The design and implementation of the framework at different levels, as well as three case studies, are presented.  相似文献   

19.
Some industry designers have used video scenarios - short movies that show how users might actually interact with a product. However, cost and production issues undermine this method's usefulness. To address this challenge, the author and his students have developed a new method called video sketches. Although similar to video scenarios, video sketches significantly lower the production threshold by replacing video footage with photos. Unlike traditional video, video sketches require tools that most design students have on hand. Students used consumer-level digital still cameras and laptops as their main tools. They composited the images using standard graphic design software and constructed the linear story using low-end video-editing software. Audio production presented the most difficult challenge. Students produced their video sketches following the traditional three-phase (preproduction, production, and postproduction) process. Traditional cinematography issues also apply to making video sketches.  相似文献   

20.
PvcwCORBA:普适计算环境中间件的实现   总被引:1,自引:0,他引:1  
张向刚  刘锦德 《计算机应用》2004,24(8):10-13,17
针对普适环境的平台的多样性、资源的有限性、设备的移动性和应用高性能要求等需求,提出了其中间件的设计和实现方法,并据此构建了pvcwCORBA。通过试验验证了pvcwCORBA作为支持无线接入功能的高性能、嵌入式CORBA,能够适应普适计算环境的要求。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号