60,608 research outputs found
Towards a Tool-based Development Methodology for Pervasive Computing Applications
Despite much progress, developing a pervasive computing application remains a
challenge because of a lack of conceptual frameworks and supporting tools. This
challenge involves coping with heterogeneous devices, overcoming the
intricacies of distributed systems technologies, working out an architecture
for the application, encoding it in a program, writing specific code to test
the application, and finally deploying it. This paper presents a design
language and a tool suite covering the development life-cycle of a pervasive
computing application. The design language allows to define a taxonomy of
area-specific building-blocks, abstracting over their heterogeneity. This
language also includes a layer to define the architecture of an application,
following an architectural pattern commonly used in the pervasive computing
domain. Our underlying methodology assigns roles to the stakeholders, providing
separation of concerns. Our tool suite includes a compiler that takes design
artifacts written in our language as input and generates a programming
framework that supports the subsequent development stages, namely
implementation, testing, and deployment. Our methodology has been applied on a
wide spectrum of areas. Based on these experiments, we assess our approach
through three criteria: expressiveness, usability, and productivity
Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability
The fifth generation (5G) mobile telecommunication network is expected to
support Multi- Access Edge Computing (MEC), which intends to distribute
computation tasks and services from the central cloud to the edge clouds.
Towards ultra-responsive, ultra-reliable and ultra-low-latency MEC services,
the current mobile network security architecture should enable a more
decentralized approach for authentication and authorization processes. This
paper proposes a novel decentralized authentication architecture that supports
flexible and low-cost local authentication with the awareness of context
information of network elements such as user equipment and virtual network
functions. Based on a Markov model for backhaul link quality, as well as a
random walk mobility model with mixed mobility classes and traffic scenarios,
numerical simulations have demonstrated that the proposed approach is able to
achieve a flexible balance between the network operating cost and the MEC
reliability.Comment: Accepted by IEEE Access on Feb. 02, 201
Integration of Satellites in 5G through LEO Constellations
The standardization of 5G systems is entering in its critical phase, with
3GPP that will publish the PHY standard by June 2017. In order to meet the
demanding 5G requirements both in terms of large throughput and global
connectivity, Satellite Communications provide a valuable resource to extend
and complement terrestrial networks. In this context, we consider a
heterogeneous architecture in which a LEO mega-constellation satellite system
provides backhaul connectivity to terrestrial 5G Relay Nodes, which create an
on-ground 5G network. Since large delays and Doppler shifts related to
satellite channels pose severe challenges to terrestrial-based systems, in this
paper we assess their impact on the future 5G PHY and MAC layer procedures. In
addition, solutions are proposed for Random Access, waveform numerology, and
HARQ procedures.Comment: Submitted to IEEE Global Communications Conference (GLOBECOM) 201
Pipes and Connections
This document describes the low-level Pipe and ConnectionManager objects of the Mesh-
Router system. The overall MeshRouter framework provides a general scheme for interest-
limited communications among a number of client processes. This generality is achieved by
a carefully factorized, object-oriented software implementation. Within this framework, the
Pipe and ConnectionManager (base) classes dened in this note specify the interfaces for i) ac-
tual `bits on the wire' communications and ii) dynamic client insertions during overall system
execution. Two specic implementations of the Pipe class are described in detail: a `Memo-
ryPipe' linking objects instanced on a single processor and a more general 'rtisPipe' providing
inter-processor communications built entirely from the standard RTI-s library used in current
JSAF applications. Initialization procedures within the overall MeshRouter system are dis-
cussed, with particular attention given to dynamic management of inter-processor connections.
Prototype RTI-s router processes are discussed, and simple extensions of the standard system
conguration data les are presented
Context-aware adaptation in DySCAS
DySCAS is a dynamically self-configuring middleware for automotive control systems. The addition of autonomic, context-aware dynamic configuration to automotive control systems brings a potential for a wide range of benefits in terms of robustness, flexibility, upgrading etc. However, the automotive systems represent a particularly challenging domain for the deployment of autonomics concepts, having a combination of real-time performance constraints, severe resource limitations, safety-critical aspects and cost pressures. For these reasons current systems are statically configured. This paper describes the dynamic run-time configuration aspects of DySCAS and focuses on the extent to which context-aware adaptation has been achieved in DySCAS, and the ways in which the various design and implementation challenges are met
Deferred Action: Theoretical model of process architecture design for emergent business processes
E-Business modelling and ebusiness systems development assumes fixed company resources,
structures, and business processes. Empirical and theoretical evidence suggests that company resources
and structures are emergent rather than fixed. Planning business activity in emergent contexts requires
flexible ebusiness models based on better management theories and models . This paper builds and
proposes a theoretical model of ebusiness systems capable of catering for emergent factors that affect
business processes. Drawing on development of theories of the âaction and designâclass the Theory of
Deferred Action is invoked as the base theory for the theoretical model. A theoretical model of flexible
process architecture is presented by identifying its core components and their relationships, and then
illustrated with exemplar flexible process architectures capable of responding to emergent factors.
Managerial implications of the model are considered and the modelâs generic applicability is discussed
- âŠ