The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The main idea behind this article is to propose technological tools in order to design, implement and deploy applications dedicated to smart-∗. Our approach is particularly relative to the smart cities domain, which is the most suitable field of experimentation for a wider domain called long-life applications. Currently, our computers and more generally, our mobile devices (tablets, smartphones) host...
In recent years there has been a huge discussion about the IoT (Internet of Things) concept, and even more about IoT within industrial environment. The real IoT is a network of devices with local intelligence (sensors, lights, gas pumps, HVAC systems), which shares access & control mechanisms to push and pull status and command information from the networked world. However, there are still some...
RFID and WSN technologies are widely used in today's pervasive computing. In Wireless Sensor Networks, sensor nodes sense the physical environment and send the sensed data to the sink by multi-hops. WSN are used in many applications such as military and environment monitoring. In Radio Frequency Identification, a unique ID is assigned to a RFID tag which is associated with a real world object. RFID...
This paper describes a middleware to integrate external tools from third-party providers in the PoEML e-learning platform. PoEML is a modelling language that enables the modelling collaborative learning units. This middleware enables us to include tools from third-party providers in the environments provided to support collaborative learning activities. The main feature of this solution is that the...
In wireless mobile networks, because of low bandwidth, long delay, low reliability, disconnecting frequently and differences in many platforms of commercial services etc., it is difficult to get a stable and high quality commercial service. For this case, a flexible interface, context-aware and intelligent mobile E-commerce platform is designed. It connects kinds of commercial services platforms efficiently...
It has become more and more obvious that in Cloud Computing, applications are key drivers to make Cloud business a success. Multi-tenancy is a critical technology to allow one instance of application serving multiple customers at the same time to share Cloud resources and achieve high operational efficiency. There are different options of realizing multi-tenancy, in this paper we describe a transparent...
Business requirements for rapid operational efficiency, customer responsiveness as well as rapid adaptability are actively driving the need for ever increasing communication and integration capabilities of software assets. In this context, security, although acknowledged as being a necessity, is often perceived as a hindrance. Indeed, dynamic environments require flexible and understandable security...
Service Oriented Architecture (SOA) is not only an architecture, rather it is a relationship between the service provider, broker and user. Designing middleware platforms for this architecture really helps in achieving interoperability, loose coupling and high efficiency especially for applications running in heterogeneous environments. The job of an SOA middleware is to cater for the functional properties...
RFID technology finds immense applicability in various domains utilizing identification as the base operation such as in access control, localization, and tracking etc. It may be designed to work satisfactorily for either singular or a limited range of applications. However, the strict-coupling between applications and RFID equipment must be relaxed to scale up their usability. In order to achieve...
Radio Frequency Identification (RFID) is one of the core technologies which can open the new era of ubiquitous computing history. With the prevalence of RFID technology, RFID middleware become the pivot of RFID application system. However, one major stumbling block of using RFID technology in ubiquitous environment is the lack of security enforcement. In this paper, we put forward a common layer for...
Radio Frequency Identification (RFID) is one of the core technologies which can open the new era of ubiquitous computing history. With the prevalence of RFID technology, RFID middleware become the pivot of RFID application system. However, one major stumbling block of using RFID technology in ubiquitous environment is the lack of security enforcement. In this paper, we put forward a common layer for...
Component integration plays a decisive role in service-oriented architectures (SOAs). The technical implementation must faithfully reflect business and enterprise integration requirements. This implies a good understanding of the globally observable message choreography but also of how messages are handled by the involved components and by the SOA middleware. In this paper, we present a solution to...
The design of distributed applications is a complex undertaking, especially if the designers are forced to immediately deal with the detailed behaviour of the underlying middleware. It would be better if the designers could first focus on the essentials of the applications using suitable abstractions of interaction mechanisms that are provided by communication middleware. In this paper we present...
Passive RFID event refers to one kind of composite event in RFID middleware, one or more constituent sub-events of which do not occur under certain condition. Definition of passive RFID event requires careful consideration of temporal constraint and composition hierarchy, and moreover, the detection requires well-organized query plan for eventpsilas absence in runtime context. To process complex RFID...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.