88,206 research outputs found
Svjesnost konteksta u mreži pokretnih programskih agenata
The paper deals with context awareness in information, communication and computing systems and context introduction in mobile software agent network. Mobile agent network is a formal system that includes a multi-agent system residing in a network of interconnected nodes, which hosts agents, allowing their operation, communication and migration. Software agents can help in managing complex relationships between information and communication service users and service providers. The role of intelligent and mobile agents representing service users and service providers in the network and supporting context awareness is considered. Context is defined as any information that can be used to characterize the situation of an entity respecting its physical, social, communication and computing environment. A unified treatment of context information contained in the user profile, presence service and those relevant for general context-aware systems is proposed in order to preserve the functionality and performance evaluation capabilities of the mobile agent network. The approach elaborated in the paper is based on conceptual context representation, system services and agent operations required for supporting context-awareness in the mobile agent network. Case study on agent-based ad-hoc social network service is included.Rad se bavi svjesnošću konteksta u informacijskim, komunikacijskim i računalnim sustavima i uvođenjem konteksta u mrežu pokretnih programskih agenata. Mreža pokretnih agenata je formalni sustav koji uključuje višeagentski sustav koji djeluje u mreži međusobno povezanih čvorova koji udomljuju agente, omogućujući im provedbu operacija, komunikaciju i migraciju. Programski agenti mogu pridonijeti upravljanju složenih odnosa između korisnika i davatelja informacijskih i komunikacijskih usluga. Razmatra se uloga inteligentnih i pokretnih agenata koji predstavljaju korisnike i davatelje usluga u mreži te im omogućuju kontekstno svjesnu potporu. Kontekst se definira kao svaka informacija kojom se može obilježiti situacija nekog entiteta uvažavajući njegovo fizičko, društveno, komunikacijsko i računalno okružje. Predlaže se objedinjeno tretiranje kontekstne informacije sadržane u korisničkom profilu, usluzi nazočnosti, kao i one mjerodavne za opće kontekstnosvjesne sustave, kako bi se očuvala mogućnost evaluacije funkcionalnosti i performansi mreže pokretnih agenata. Pristup obrađen u radu zasniva se na koncepcijskom predočavanju konteksta te uslugama sustava i agentskim operacijama potrebnima za potporu konteksta u mreži pokretnih agenata. Uključen je studijski primjer agentski zasnovanog ad-hoc društvenog umrežavanja
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few. Security for mobile devices, though still in its infancy, has drawn the attention of various researchers. As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users - - though for most it will be an afterthought, like many other computing functions. The usability and expansion of pervasive computing applications depends greatly on the security and reliability provided by the applications. At this critical juncture, security research is growing. This paper examines the recent trends and forward thinking investigation in several fields of security, along with a brief history of previous accomplishments in the corresponding areas. Some open issues have been discussed for further investigation
Blackboard Rules for Coordinating Context-aware Applications in Mobile Ad Hoc Networks
Thanks to improvements in wireless communication technologies and increasing
computing power in hand-held devices, mobile ad hoc networks are becoming an
ever-more present reality. Coordination languages are expected to become
important means in supporting this type of interaction. To this extent we argue
the interest of the Bach coordination language as a middleware that can handle
and react to context changes as well as cope with unpredictable physical
interruptions that occur in opportunistic network connections. More concretely,
our proposal is based on blackboard rules that model declaratively the actions
to be taken once the blackboard content reaches a predefined state, but also
that manage the engagement and disengagement of hosts and transient sharing of
blackboards. The idea of reactiveness has already been introduced in previous
work, but as will be appreciated by the reader, this article presents a new
perspective, more focused on a declarative setting.Comment: In Proceedings FOCLASA 2012, arXiv:1208.432
Robotic Wireless Sensor Networks
In this chapter, we present a literature survey of an emerging, cutting-edge,
and multi-disciplinary field of research at the intersection of Robotics and
Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor
Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system
that aims to achieve certain sensing goals while meeting and maintaining
certain communication performance requirements, through cooperative control,
learning and adaptation. While both of the component areas, i.e., Robotics and
WSN, are very well-known and well-explored, there exist a whole set of new
opportunities and research directions at the intersection of these two fields
which are relatively or even completely unexplored. One such example would be
the use of a set of robotic routers to set up a temporary communication path
between a sender and a receiver that uses the controlled mobility to the
advantage of packet routing. We find that there exist only a limited number of
articles to be directly categorized as RWSN related works whereas there exist a
range of articles in the robotics and the WSN literature that are also relevant
to this new field of research. To connect the dots, we first identify the core
problems and research trends related to RWSN such as connectivity,
localization, routing, and robust flow of information. Next, we classify the
existing research on RWSN as well as the relevant state-of-the-arts from
robotics and WSN community according to the problems and trends identified in
the first step. Lastly, we analyze what is missing in the existing literature,
and identify topics that require more research attention in the future
A personal networking solution
This paper presents an overview of research being conducted on Personal Networking Solutions within the Mobile VCE Personal Distributed Environment Work Area. In particular it attempts to highlight areas of commonality with the MAGNET initiative. These areas include trust of foreign devices and service providers, dynamic real-time service negotiation to permit context-aware service delivery, an automated controller algorithm for wireless ad hoc networks, and routing protocols for ad hoc networking environments. Where possible references are provided to Mobile VCE publications to enable further reading
A self-managing infrastructure for ad-hoc situation determination
Automatically determining the situation of an ad-hoc group of people and devices within a smart environment is a significant challenge in pervasive computing systems. Current approaches often rely on an environment expert to correlate the situations that occur with the available sensor data, while other machine learning based approaches require long training periods before the system can be used. This paper presents a novel approach to situation determination that attempts to overcome these issues by providing a reusable library of general situation specifications that can be easily extended to create new specific situations, and immediately deployed without the need of an environment expert. The architecture of an accompanying situation determination infrastructure is provided, which autonomously optimises and repairs itself in reaction to changes or failures in the environment
A model and architecture for situation determination
Automatically determining the situation of an ad-hoc group of people and devices within a smart environment is a significant challenge in pervasive computing systems. Current approaches often rely on an environment expert to correlate the situations that occur with the available sensor data, while other machine learning based approaches require long training periods before the system can be used. Furthermore, situations are commonly recognised at a low-level of granularity, which limits the scope of situation-aware applications. This paper presents a novel approach to situation determination that attempts to overcome these issues by providing a reusable library of general situation specifications that can be easily extended to create new specific situations, and immediately deployed without the need of an environment expert. A proposed architecture of an accompanying situation determination middleware is provided, as well as an analysis of a prototype implementation
Recommended from our members
Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain
Unmanned aerial vehicles (UAVs) can support surveillance even in areas without network infrastructure. However, UAV networks raise security challenges because of its dynamic topology. This paper proposes a technique for maintaining security in UAV networks in the context of surveillance, by corroborating information about events from different sources. In this way, UAV networks can conform peer-to-peer information inspired by the principles of blockchain, and detect compromised UAVs based on trust policies. The proposed technique uses a secure asymmetric encryption with a pre-shared list of official UAVs. Using this technique, the wrong information can be detected when an official UAV is physically hijacked. The novel agent based simulator ABS-SecurityUAV is used to validate the proposed approach. In our experiments, around 90% of UAVs were able to corroborate information about a person walking in a controlled area, while none of the UAVs corroborated fake information coming from a hijacked UAV
- …