672 research outputs found

    Components Interoperability through Mediating Connector Patterns

    Full text link
    A key objective for ubiquitous environments is to enable system interoperability between system's components that are highly heterogeneous. In particular, the challenge is to embed in the system architecture the necessary support to cope with behavioral diversity in order to allow components to coordinate and communicate. The continuously evolving environment further asks for an automated and on-the-fly approach. In this paper we present the design building blocks for the dynamic and on-the-fly interoperability between heterogeneous components. Specifically, we describe an Architectural Pattern called Mediating Connector, that is the key enabler for communication. In addition, we present a set of Basic Mediator Patterns, that describe the basic mismatches which can occur when components try to interact, and their corresponding solutions.Comment: In Proceedings WCSI 2010, arXiv:1010.233

    Achieving interoperability through semantics-based technologies: the instant messaging case

    Get PDF
    The success of pervasive computing depends on the ability to compose a multitude of networked applications dynamically in order to achieve user goals. However, applications from different providers are not able to interoperate due to incompatible interaction protocols or disparate data models. Instant messaging is a representative example of the current situation, where various competing applications keep emerging. To enforce interoperability at runtime and in a non-intrusive manner, mediators are used to perform the necessary translations and coordination between the heterogeneous applications. Nevertheless, the design of mediators requires considerable knowledge about each application as well as a substantial development effort. In this paper we present an approach based on ontology reasoning and model checking in order to generate correct-by-construction mediators automatically. We demonstrate the feasibility of our approach through a prototype tool and show that it synthesises mediators that achieve efficient interoperation of instant messaging applications

    Internet of things: why we are not there yet

    Get PDF
    Twenty-one years past since Weiser’s vision of ubiquitous computing (UbiComp) has been written, and it is yet to be fully fulfilled despite of almost all the needed technologies already available. Still, the widespread interest in UbiComp and the results in some of its fields pose a question: why we are not there yet? It seems we miss the ‘octopus’ head. In this paper, we will try to depict the reasons why we are not there yet, from three different points of view: interaction media, device integration and applications

    An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet

    Get PDF
    A new type of service, known as a Location Based Service (LBS), is emerging that incorporates users' location information, and many of these LBSs operate over the Internet. However, the potential misuse of this location information is a serious concern. Therefore, the main goal of this thesis is to develop techniques, which increase users' security and privacy, for use with these LBSs. The �rst technique that we propose is a three-party protocol that is used to mutually identify and authenticate users, LBSs, and a trusted middleware infrastructure that is responsible for managing the users' identity and location information. This protocol enables users to simultaneously identify and authenticate themselves to the infrastructure using real identities, and to the LBSs using pseudonyms. This protocol can be subsequently used to securely exchange messages containing location information. The second technique that we propose is an access control model that enables users to create permissions that specify which users and LBSs are entitled to obtain location information about which other users, under what circumstances the location information is released to the users and LBSs, and the accuracy of any location information that is released to the users and LBSs. The third technique that we propose is a blurring algorithm that performs spatial blurring on users' location information. It does not perform temporal blurring, because this reduces an LBS's ability to �offer a useful service. Instead, our blurring algorithm introduces a new parameter that speci�es the frequency with which location information is released for a particular user. This frequency parameter is a function of the size of the blurred location. These three techniques can be used as part of an overall solution for providing users with increased security while using LBSs that operate over the Internet

    U.S. v. Microsoft: Did Consumers Win?

    Get PDF
    U.S. v. Microsoft and the related state suit filed in 1998 appear finally to have concluded. In a unanimous en banc decision issued in late June 2004, the D.C. Circuit Court of Appeals rejected challenges to the remedies approved by the District Court in November 2002. The wave of follow-on private antitrust suits filed against Microsoft also appears to be subsiding. In this paper we review the remedies imposed in the United States, in terms of both their relationship to the violations found and their impact on consumer welfare. We conclude that the remedies addressed the violations ultimately found by the Court of Appeals (which were a subset of those found by the original district court and an even smaller subset of the violations alleged, both in court and in public discourse) and went beyond them in important ways. Thus, for those who believe that the courts were right in finding that some of Microsoft's actions harmed competition, the constraints placed on its behavior and the active, ongoing oversight by the Court and the plaintiffs provide useful protection against a recurrence of such harm. For those who believe that Microsoft should not have been found liable because of insufficient evidence of harm to consumers, the remedies may be unnecessary, but they avoided the serious potential damage to consumer welfare that was likely to accompany the main alternative proposals. The remedies actually imposed appear to have struck a reasonable balance between protecting consumers against the types of actions found illegal and harming consumers by unnecessarily restricting Microsoft's ability to compete.

    Middleware’s message : the financial technics of codata

    Get PDF
    In this paper, I will argue for the relevance of certain distinctive features of messaging systems, namely those in which data (a) can be sent and received asynchronously, (b) can be sent to multiple simultaneous recipients and (c) is received as a “potentially infinite” flow of unpredictable events. I will describe the social technology of the stock ticker, a telegraphic device introduced at the New York Stock Exchange in the 1860s, with reference to early twentieth century philosophers of synchronous experience (Bergson), simultaneous sign interpretations (Mead and Peirce), and flows of discrete events (Bachelard). Then, I will show how the ticker’s data flows developed into the 1990s-era technologies of message queues and message brokers, which distinguished themselves through their asynchronous implementation of ticker-like message feeds sent between otherwise incompatible computers and terminals. These latter systems’ characteristic “publish/subscribe” communication pattern was one in which conceptually centralized (if logically distributed) flows of messages would be “published,” and for which “subscribers” would be spontaneously notified when events of interest occurred. This paradigm—common to the so-called “message-oriented middleware” systems of the late 1990s—would re-emerge in different asynchronous distributed system contexts over the following decades, from “push media” to Twitter to the Internet of Things

    Open Source Software: All You Do Is Put It Together

    Get PDF
    The authors propose an infrastructure for rapidly prototyping applications from open source software components. The Adaptable Multi-Interface Communicator infrastructure (AMICO) is based on ideas of middleware platforms for component integration, but it focuses on pragmatic aspects of OSS integration, often absent from many existing integration platforms. The authors also identify the key requirements of middleware for rapid prototyping with OSS components and illustrate their approach through two examples in complex scenarios
    corecore