99,987 research outputs found
A Survey on Service Composition Middleware in Pervasive Environments
The development of pervasive computing has put the light on a challenging problem: how to dynamically compose services in heterogeneous and highly changing environments? We propose a survey that defines the service composition as a sequence of four steps: the translation, the generation, the evaluation, and finally the execution. With this powerful and simple model we describe the major service composition middleware. Then, a classification of these service composition middleware according to pervasive requirements - interoperability, discoverability, adaptability, context awareness, QoS management, security, spontaneous management, and autonomous management - is given. The classification highlights what has been done and what remains to do to develop the service composition in pervasive environments
Building microclouds at the network edge with the Cloudy platform
Edge computing enables new types of services which operate at the network edge. There are important use cases in pervasive computing, ambient intelligence and the Internet of Things (IoT) for edge computing. In this demo paper we present microclouds deployed at the networks edge in the Guifi.net community network leveraging an open extensible platform called Cloudy. The demonstration focuses on the following aspects: The usage of Cloudy for end users, the services of Cloudy to build microclouds, and the application scenarios of IoT data management within microclouds.Peer ReviewedPostprint (author's final draft
An identity aware wimax personalization for pervasive computing services
Mobile Internet access is becoming more and more pervasive in the new 4G scenarios, where WiMAX is to play a crucial role. WiMax has advantages when considering both
energy consumption and bandwidth, when compared with
HSDPA and LTE. However, we have found some limitations in
IEEE 802.16 security support, which may limit authentication
and authorization mechanisms for ubiquitous service
development. In this article we analyze weaknesses and
vulnerabilities we have found in WiMAX security. WiMax,
with the adequate identity management support, could be
invaluable for developing new pervasive computing services.
We propose the introduction of identity management in WiMAX, as a pervious step to the definition of identity aware
WiMax personalization of pervasive computing servicesProyecto CCG10-UC3M/TIC-4992 de la Comunidad AutĂłnoma de Madrid y la Universidad Carlos III de Madri
Autonomic Management of Smart Spaces
Management complexity of Smart Space environments increases with advances in
pervasive computing domains. Extensive research work has been carried out to demonstrate the
power of pervasive computing across a wide spectrum of domains. This research shows the
significance of pervasive computing and it also highlights the complexity issues in the
development, deployment and maintenance of such environments.
To allow industry to adopt pervasive computing, especially its offspring Smart Spaces, a method of
management must be devised. While research is being carried out in this area, a new and exciting
area has emerged known as Autonomic Computing. Autonomic Computing has now become an
umbrella term for computer environments that display forms of autonomic control over
themselves.
This paper explores the overlap of Pervasive Computing and Autonomic Computing with
particular reference to Smart Spaces. It shows how the self-administrating properties of an
autonomic computing solution, using IBM’s Autonomic Toolkit, complements a Smart Space
enabled framework such as Open Service Gateway initiative (OSGi). The conclusion reached is
that the convergence of Autonomic Computing and Pervasive Computing research areas could
provide a more promising future for the management of pervasive environments resulting in a
reduction in cost and complexity
Security and Privacy Implications of Pervasive Memory Augmentation
Pervasive computing is beginning to offer the potential to rethink and redefine how technology can support human memory augmentation. For example, the emergence of widespread pervasive sensing, personal recording technologies, and systems for the quantified self are creating an environment in which it's possible to capture fine-grained traces of many aspects of human activity. Contemporary psychology theories suggest that these traces can then be used to manipulate our ability to recall - to both reinforce and attenuate human memories. Here, the authors consider the privacy and security implications of using pervasive computing to augment human memory. They describe a number of scenarios, outline the key architectural building blocks, and identify entirely new types of security and privacy threats-namely, those related to data security (experience provenance), data management (establishing new paradigms for digital memory ownership), data integrity (memory attenuation and recall-induced forgetting), and bystander privacy. Together, these threats present compelling research challenges for the pervasive computing research community. This article is part of a special issue on privacy and security
Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges
Cloud computing is offering utility-oriented IT services to users worldwide.
Based on a pay-as-you-go model, it enables hosting of pervasive applications
from consumer, scientific, and business domains. However, data centers hosting
Cloud applications consume huge amounts of energy, contributing to high
operational costs and carbon footprints to the environment. Therefore, we need
Green Cloud computing solutions that can not only save energy for the
environment but also reduce operational costs. This paper presents vision,
challenges, and architectural elements for energy-efficient management of Cloud
computing environments. We focus on the development of dynamic resource
provisioning and allocation algorithms that consider the synergy between
various data center infrastructures (i.e., the hardware, power units, cooling
and software), and holistically work to boost data center energy efficiency and
performance. In particular, this paper proposes (a) architectural principles
for energy-efficient management of Clouds; (b) energy-efficient resource
allocation policies and scheduling algorithms considering quality-of-service
expectations, and devices power usage characteristics; and (c) a novel software
technology for energy-efficient management of Clouds. We have validated our
approach by conducting a set of rigorous performance evaluation study using the
CloudSim toolkit. The results demonstrate that Cloud computing model has
immense potential as it offers significant performance gains as regards to
response time and cost saving under dynamic workload scenarios.Comment: 12 pages, 5 figures,Proceedings of the 2010 International Conference
on Parallel and Distributed Processing Techniques and Applications (PDPTA
2010), Las Vegas, USA, July 12-15, 201
MobiThin management framework: design and evaluation
In thin client computing, applications are executed on centralized servers. User input (e.g. keystrokes) is sent to a remote server which processes the event and sends the audiovisual output back to the client. This enables execution of complex applications from thin devices. Adopting virtualization technologies on the thin client server brings several advantages, e.g. dedicated environments for each user and interesting facilities such as migration tools. In this paper, a mobile thin client service offered to a large number of mobile users is designed. Pervasive mobile thin client computing requires an intelligent service management to guarantee a high user experience. Due to the dynamic environment, the service management framework has to monitor the environment and intervene when necessary (e.g. adapt thin client protocol settings, move a session from one server to another). A detailed performance analysis of the implemented prototype is presented. It is shown that the prototype can handle up to 700 requests/s to start the mobile thin client service. The prototype can make a decision for up to 700 monitor reports per second
On Data Management in Pervasive Computing Environments
Abstract—This paper presents a framework to address new data management challenges introduced by data-intensive, pervasive computing environments. These challenges include a spatio-temporal variation of data and data source availability, lack of a global catalog and schema, and no guarantee of reconnection among peers due to the serendipitous nature of the environment. An important aspect of our solution is to treat devices as semiautonomous peers guided in their interactions by profiles and context. The profiles are grounded in a semantically rich language and represent information about users, devices, and data described in terms of “beliefs,” “desires, ” and “intentions. ” We present a prototype implementation of this framework over combined Bluetooth and Ad Hoc 802.11 networks and present experimental and simulation results that validate our approach and measure system performance. Index Terms—Mobile data management, pervasive computing environments, data and knowledge representation, profile-driven caching algorithm, profile driven data management, data-centric routing algorithm. æ
- …