12,570 research outputs found

    Reinvigorating the discipline:pervasive computing and tomorrow's computer scientists

    Get PDF
    Declining enrollments in computer science and related fields are a global concern. This issue's column, by Mike Hazas and Rebecca Marsden of Lancaster University in the UK describes the novel Lancaster Headstart program that uses the excitement of pervasive computing to attract students into the computer science

    Characteristics of pervasive learning environments in museum contexts

    Get PDF
    There is no appropriate learning model for pervasive learning environments (PLEs), and museums maintain authenticity at the cost of unmarked information. To address these problems, we present the LieksaMyst PLE developed for Pielinen Museum and we derive a set of characteristics that an effective PLE should meet and which form the basis of a new learning model currently under development. We discuss how the characteristics are addressed in LieksaMyst and present an evaluation of the game component of LieksaMyst. Results indicate that, while some usability issues remain to be resolved, the game was received well by the participants enabling them to immerse themselves in the story and to interact effectively with its virtual characters

    Architecture and Implementation of a Trust Model for Pervasive Applications

    Get PDF
    Collaborative effort to share resources is a significant feature of pervasive computing environments. To achieve secure service discovery and sharing, and to distinguish between malevolent and benevolent entities, trust models must be defined. It is critical to estimate a device\u27s initial trust value because of the transient nature of pervasive smart space; however, most of the prior research work on trust models for pervasive applications used the notion of constant initial trust assignment. In this paper, we design and implement a trust model called DIRT. We categorize services in different security levels and depending on the service requester\u27s context information, we calculate the initial trust value. Our trust value is assigned for each device and for each service. Our overall trust estimation for a service depends on the recommendations of the neighbouring devices, inference from other service-trust values for that device, and direct trust experience. We provide an extensive survey of related work, and we demonstrate the distinguishing features of our proposed model with respect to the existing models. We implement a healthcare-monitoring application and a location-based service prototype over DIRT. We also provide a performance analysis of the model with respect to some of its important characteristics tested in various scenarios

    Lessons learned from the design of a mobile multimedia system in the Moby Dick project

    Get PDF
    Recent advances in wireless networking technology and the exponential development of semiconductor technology have engendered a new paradigm of computing, called personal mobile computing or ubiquitous computing. This offers a vision of the future with a much richer and more exciting set of architecture research challenges than extrapolations of the current desktop architectures. In particular, these devices will have limited battery resources, will handle diverse data types, and will operate in environments that are insecure, dynamic and which vary significantly in time and location. The research performed in the MOBY DICK project is about designing such a mobile multimedia system. This paper discusses the approach made in the MOBY DICK project to solve some of these problems, discusses its contributions, and accesses what was learned from the project

    Interoperating Context Discovery Mechanisms

    Get PDF
    Context-Aware applications adapt their behaviour to the current situation of the user. This information, for instance user location and user availability, is called context information. Context is delivered by distributed context sources that need to be discovered before they can be used to retrieve context. Currently, multiple context discovery mechanisms exist, exhibiting heterogeneous capabilities (e.g. communication mechanisms, and data formats), which can be available to context-aware applications at arbitrary moments during the ap-plication’s lifespan. In this paper, we discuss a middleware mechanism that en-ables a (mobile) context-aware application to interoperate transparently with different context discovery mechanisms available at run-time. The goal of the proposed mechanism is to hide the heterogeneity and availability of context discovery mechanisms for context-aware applications, thereby facilitating their development
    • …
    corecore