36 research outputs found

    Towards ad hoc contextual services for pervasive computing

    Get PDF
    International audienceContext-awareness is a key challenge for pervasive computing, as it is a prime requirement towards delivering applications to users in a way that best matches user requirements, digital resources availability and physical conditions. However, enabling anytime, anywhere context-awareness, as targeted by pervasive computing, is further challenged by the openness of the environment, which requires making available context information in various computing environments. This then calls for the ad hoc networking of context sources and of context-aware applications, so that applications may always benefit from a context knowledge base, although it may be more or less rich, depending on the specific environment. Building upon the context management literature, and the Service-Oriented Architecture (SOA) paradigm that is a major enabler of open ad hoc networking, this paper sketches key context-aware system concepts that need be incorporated in the SOA style towards enabling context-aware services for pervasive computing

    Towards ad hoc contextual services for pervasive computing

    Full text link

    Designing a Framework to Handle Context Information

    Get PDF
    In the recent years, a number of context-aware frameworks have been proposed to facilitate the development of context-aware applications. From the experience gained, in this paper we explore the design principles that contextaware platforms should conform to, the functionalities they have to provide and the technologies and tools that can be used for their implementation. Subsequently, we propose a context-aware framework and describe the architecture it adopts, making our own technological selection from the options previously identified

    Concept-based discovery of mobile services

    Full text link

    Managing motion triggered executables in distributed mobile databases

    Get PDF
    Mobile devices have brought new applications into our daily life. However, ecient man- agement of these objects to support new applications is challenging due to the distributed nature and mobility of mobile objects. This dissertation describes a new type of mobile peer- to-peer (M-P2P) computing, namely geotasking, and presents ecient management of mobile objects to support geotasking. Geotasking mimics human interaction with the physical world. Humans generate information using sensing ability and store information to geographical lo- cations. Humans also retrieve this information from the physical locations. For instance, an installation of a new stop sign at some intersection in town is analogous to an insertion of a new data item into the database. Instead of processing regular data as in traditional data management systems, geotasking manages a collection of geotasks, each dened as a computer program bound to a geographical region. The hardware platform for geotasking consists of popular networked position-aware mobile devices such as cell phones, personal digital assis- tants, and laptops. We design and implement novel system software to facilitate programming and ecient management of geotasks. Such management includes inserts, deletes, updates, retrieval and execution of a geotask triggered by mobile object correlations, geotask mobil- ity, and geotask dependency. Geotasking enables useful applications ranging from warning of dangerous areas for military and search-and-rescue missions to monitoring the population in a certain area for trac management to informing tourists of exciting events in an area and other such applications. Geotasking provides a distributed and unied solution for supporting various types of applications

    Sporadic cloud-based mobile augmentation on the top of a virtualization layer: a case study of collaborative downloads in VANETs

    Get PDF
    Current approaches to Cloud-based Mobile Augmentation (CMA) leverage (cloud-based) resources to meet the requirements of rich mobile applications, so that a terminal (the so-called application node or AppN) can borrow resources lent by a set of collaborator nodes (CNs). In the most sophisticated approaches proposed for vehicular scenarios, the collaborators are nearby vehicles that must remain together near the application node because the augmentation service is interrupted when they move apart. This leads to disruption in the execution of the applications and consequently impoverishes the mobile users’ experience. This paper describes a CMA approach that is able to restore the augmentation service transparently when AppNs and CNs separate. The functioning is illustrated by a NaaS model where the AppNs access web contents that are collaboratively downloaded by a set of CNs, exploiting both roadside units and opportunistic networking. The performance of the resulting approach has been evaluated via simulations, achieving promising results in terms of number of downloads, average download times, and network overheadMinisterio de Educación y Ciencia | Ref. TIN2017-87604-

    Novel techniques for location-cloaked applications

    Get PDF
    Location cloaking has been shown to be cost-effective in mitigating location privacy and safety risks. This strategy, however, has significant impact on the applications that rely on location information. They may suffer efficiency loss; some may not even work with reduced location resolution. This research investigates two problems. 1) How to process location-cloaked queries. Processing such queries incurs significant more workload for both server and client. While the server needs to retrieve more query results and transmit them to the client, the client downloading these results wastes its battery power because most of them are useless. To address these problems, we propose a suite of novel techniques including query decomposition, scheduling, and personalized air indexing. These techniques are integrated into a single unified platform that is capable of handling various types of queries. 2) How a node V can verify whether or not another node P indeed locates in a cloaking region it claims. This problem is challenging due to the fact that the process of location verification may allow V to refine P\u27s location within the region. We identify two types of attacks, transmission coverage attack and distance bounding attack. In the former, V refines a cloaking region by adjusting its transmission range to partially overlap with the region, whereas in the latter, by measuring the round trip time of its communication with P. We present two corresponding counter strategies, and built on top of them, propose a novel technique that allows P to participate in location verification while providing a certain level of guarantee that its cloaking region will not be refined during the process
    corecore