99,987 research outputs found

    A Survey on Service Composition Middleware in Pervasive Environments

    Get PDF
    The development of pervasive computing has put the light on a challenging problem: how to dynamically compose services in heterogeneous and highly changing environments? We propose a survey that defines the service composition as a sequence of four steps: the translation, the generation, the evaluation, and finally the execution. With this powerful and simple model we describe the major service composition middleware. Then, a classification of these service composition middleware according to pervasive requirements - interoperability, discoverability, adaptability, context awareness, QoS management, security, spontaneous management, and autonomous management - is given. The classification highlights what has been done and what remains to do to develop the service composition in pervasive environments

    Building microclouds at the network edge with the Cloudy platform

    Get PDF
    Edge computing enables new types of services which operate at the network edge. There are important use cases in pervasive computing, ambient intelligence and the Internet of Things (IoT) for edge computing. In this demo paper we present microclouds deployed at the networks edge in the Guifi.net community network leveraging an open extensible platform called Cloudy. The demonstration focuses on the following aspects: The usage of Cloudy for end users, the services of Cloudy to build microclouds, and the application scenarios of IoT data management within microclouds.Peer ReviewedPostprint (author's final draft

    An identity aware wimax personalization for pervasive computing services

    Get PDF
    Mobile Internet access is becoming more and more pervasive in the new 4G scenarios, where WiMAX is to play a crucial role. WiMax has advantages when considering both energy consumption and bandwidth, when compared with HSDPA and LTE. However, we have found some limitations in IEEE 802.16 security support, which may limit authentication and authorization mechanisms for ubiquitous service development. In this article we analyze weaknesses and vulnerabilities we have found in WiMAX security. WiMax, with the adequate identity management support, could be invaluable for developing new pervasive computing services. We propose the introduction of identity management in WiMAX, as a pervious step to the definition of identity aware WiMax personalization of pervasive computing servicesProyecto CCG10-UC3M/TIC-4992 de la Comunidad AutĂłnoma de Madrid y la Universidad Carlos III de Madri

    Autonomic Management of Smart Spaces

    Get PDF
    Management complexity of Smart Space environments increases with advances in pervasive computing domains. Extensive research work has been carried out to demonstrate the power of pervasive computing across a wide spectrum of domains. This research shows the significance of pervasive computing and it also highlights the complexity issues in the development, deployment and maintenance of such environments. To allow industry to adopt pervasive computing, especially its offspring Smart Spaces, a method of management must be devised. While research is being carried out in this area, a new and exciting area has emerged known as Autonomic Computing. Autonomic Computing has now become an umbrella term for computer environments that display forms of autonomic control over themselves. This paper explores the overlap of Pervasive Computing and Autonomic Computing with particular reference to Smart Spaces. It shows how the self-administrating properties of an autonomic computing solution, using IBM’s Autonomic Toolkit, complements a Smart Space enabled framework such as Open Service Gateway initiative (OSGi). The conclusion reached is that the convergence of Autonomic Computing and Pervasive Computing research areas could provide a more promising future for the management of pervasive environments resulting in a reduction in cost and complexity

    Security and Privacy Implications of Pervasive Memory Augmentation

    Get PDF
    Pervasive computing is beginning to offer the potential to rethink and redefine how technology can support human memory augmentation. For example, the emergence of widespread pervasive sensing, personal recording technologies, and systems for the quantified self are creating an environment in which it's possible to capture fine-grained traces of many aspects of human activity. Contemporary psychology theories suggest that these traces can then be used to manipulate our ability to recall - to both reinforce and attenuate human memories. Here, the authors consider the privacy and security implications of using pervasive computing to augment human memory. They describe a number of scenarios, outline the key architectural building blocks, and identify entirely new types of security and privacy threats-namely, those related to data security (experience provenance), data management (establishing new paradigms for digital memory ownership), data integrity (memory attenuation and recall-induced forgetting), and bystander privacy. Together, these threats present compelling research challenges for the pervasive computing research community. This article is part of a special issue on privacy and security

    Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges

    Full text link
    Cloud computing is offering utility-oriented IT services to users worldwide. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. However, data centers hosting Cloud applications consume huge amounts of energy, contributing to high operational costs and carbon footprints to the environment. Therefore, we need Green Cloud computing solutions that can not only save energy for the environment but also reduce operational costs. This paper presents vision, challenges, and architectural elements for energy-efficient management of Cloud computing environments. We focus on the development of dynamic resource provisioning and allocation algorithms that consider the synergy between various data center infrastructures (i.e., the hardware, power units, cooling and software), and holistically work to boost data center energy efficiency and performance. In particular, this paper proposes (a) architectural principles for energy-efficient management of Clouds; (b) energy-efficient resource allocation policies and scheduling algorithms considering quality-of-service expectations, and devices power usage characteristics; and (c) a novel software technology for energy-efficient management of Clouds. We have validated our approach by conducting a set of rigorous performance evaluation study using the CloudSim toolkit. The results demonstrate that Cloud computing model has immense potential as it offers significant performance gains as regards to response time and cost saving under dynamic workload scenarios.Comment: 12 pages, 5 figures,Proceedings of the 2010 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 2010), Las Vegas, USA, July 12-15, 201

    MobiThin management framework: design and evaluation

    Get PDF
    In thin client computing, applications are executed on centralized servers. User input (e.g. keystrokes) is sent to a remote server which processes the event and sends the audiovisual output back to the client. This enables execution of complex applications from thin devices. Adopting virtualization technologies on the thin client server brings several advantages, e.g. dedicated environments for each user and interesting facilities such as migration tools. In this paper, a mobile thin client service offered to a large number of mobile users is designed. Pervasive mobile thin client computing requires an intelligent service management to guarantee a high user experience. Due to the dynamic environment, the service management framework has to monitor the environment and intervene when necessary (e.g. adapt thin client protocol settings, move a session from one server to another). A detailed performance analysis of the implemented prototype is presented. It is shown that the prototype can handle up to 700 requests/s to start the mobile thin client service. The prototype can make a decision for up to 700 monitor reports per second

    On Data Management in Pervasive Computing Environments

    Get PDF
    Abstract—This paper presents a framework to address new data management challenges introduced by data-intensive, pervasive computing environments. These challenges include a spatio-temporal variation of data and data source availability, lack of a global catalog and schema, and no guarantee of reconnection among peers due to the serendipitous nature of the environment. An important aspect of our solution is to treat devices as semiautonomous peers guided in their interactions by profiles and context. The profiles are grounded in a semantically rich language and represent information about users, devices, and data described in terms of “beliefs,” “desires, ” and “intentions. ” We present a prototype implementation of this framework over combined Bluetooth and Ad Hoc 802.11 networks and present experimental and simulation results that validate our approach and measure system performance. Index Terms—Mobile data management, pervasive computing environments, data and knowledge representation, profile-driven caching algorithm, profile driven data management, data-centric routing algorithm. æ
    • …
    corecore