The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers,...
Scheduling in distributed computing systems is the process of allocating resources to a computational task. The complexity of this allocation process increases with the amount of criteria that are considered for the scheduling decision. Pervasive computing systems show a high degree of heterogeneity and dynamism. The constant joining and leaving of devices makes the system error-prone and less predictable...
Context-aware computing is a lethal paradigm for making technology inconspicuous in people's lives. It is a disruptive technology capable of transforming and enriching human experience. Traditionally, applications collected context data directly from sensors and utilized them to target a narrow set of use cases. However, this is not a scalable approach. With the advent of Internet of Things (IoT),...
The Internet of Things (IoT) is a large-scale complex networked cyber physical system in which the Smart Objects (SOs) will be the fundamental building blocks. Although, many research efforts in the IoT realm have been to date devoted to device, networking and application service perspectives, software engineering approaches for the development of IoT systems are still in their infancy. This paper...
In the recent years, the number of emergencies has been observed to increase exponentially. In emergency-affected networks, knowledge of realistic user mobility plays a key role to provide critical services and information. Since present models fail to capture actual post-emergency user movements, a realistic post-emergency mobility model has recently been proposed. Nevertheless, this model suffers...
Ubiquitous computing (Ubicomp) environments are characterized by high distribution, heterogeneity and dynamism. In these environments, applications must be aware of their contexts and adapt to changes in them. A major research challenge in the area of Ubicomp is related to context awareness. Considering the characteristics of ubiquitous environments, this paper presents an architecture for context...
The context-awareness is a central aspect in the design of pervasive systems, characterizing their ability to adapt its structure and behavior. The context-aware exception handling (CAEH) is an existing approach employed to design exception handling in pervasive systems. In this approach, the context is used to define, detect, propagate, and handle exceptions. CAEH is a complex and error prone activity,...
In this paper, we discuss alternative paths towards system support for Pervasive Computing that are based on a balanced combination between global services and situated devices that we hypothesise will be the key to widespread deployment of Pervasive Computing: global services provide functionality that can be relevant anywhere, thus obviating the need to create dedicated services on a case-by-case...
The current technological scenario presents different mobile devices, which support wireless communication at an increasingly low cost. This all makes it possible to build systems thought to be impossible. The utilization of computational and natural elements, and the mixing of virtual and real elements, set up a complex relationship between elements. A good organization of these relations would enable...
Mobile devices like laptops or smart phones are getting more and more powerful, but still these devices are mainly used to access services, which are provided by centralized servers in the Internet. We argue that the full potential of such mobile devices could be unfold if these devices would provide services like instant messaging or file transfer themselves in a peer-to-peer manner. In this paper,...
Today's computationally able mobile devices are capable of acting as service providers as opposed to their traditional role as consumers. To address the challenges associated with the development of these mobile services, we have developed Odin, a middleware which masks complexity, allowing rapid development of mobile services. Odin, however, does not allow cross-platform development, which is an...
With the advances in sensing technology and the proliferation of mobile devices and applications, provisioning of context information has been a particularly common research topic. Many research works have proposed, designed, and implemented frameworks and middleware infrastructures for context management. High-level context information is typically acquired from context services that aggregate raw...
Based on multi-agent technology, this paper proposes a novel system infrastructure for context-aware system. We provide frameworks for communication and mobility. We suggest an agent model that integrates the software agents of the application with the hardware agents of the physical environment. We describe an integrated target tracking experiment, to demonstrate an implementation of this architecture...
Modeling ad-hoc context-aware services and applications that are delivered to a user as they move through a smart space has always been fraught with difficulty. It requires representation, management and inference of context, dynamic update of both context & application domain models, reasoning matching, querying and triggering of services. Quite often these systems comprise of many models...
The Internet of things(IoT) is considered to be the next step in the revolution of internet, the combination of the Internet and emerging technologies such as nearfield communications, real-time localization, and embedded sensors,which lets us transform everyday objects into smart objects that can understand and react to their environment.With an increasing diversity of RFID devices integrated in...
This paper presents a middleware for building context-aware applications. One of the main components, Device Information Access (DIA), is discussed in detail. Since many kinds of devices (e.g., RFID, GPS, Bluetooth, etc.) can be used to collect the context information, the middleware defines the Device Information Access component to communicate with different devices. A set of interfaces are devised...
E-health makes use of information and communication methods and the latest e-research tools to support the understanding of body functions. E-scientists in this field take already advantage of one single infrastructure to perform computationally-intensive investigations of the human body that tend to consider each of the constituent parts separately without taking into account the multiple important...
Grid workflow authoring tools are typically specific to particular workflow engines built into grid middleware, or are application specific and are designed to interact with specific software implementations. g-Eclipse is a middleware independent grid workbench that aims to provide a unified abstraction of the grid and includes a grid workflow builder to allow users to author and deploy workflows...
This paper reports about a research project-HLA ACTOR REPAST- aimed to distributing RePast models thus potentially corresponding to the computational demands of large and reconfigurable multi-agent systems (MASs). Novel in HLA ACTOR REPAST is an exploitation of a lean actor infrastructure implemented in Java. Actors bring to RePast agents such features as migration, location-transparent naming,efficient...
In ubiquitous computing environments, the software component model with semantic information and adaptation to satisfy various resources constraints and component interdependence is needed. This paper mainly presents an adaptive and semantic component model for an adaptive middleware. The model consists of an adaptive component model and a semantic virtual agent model. The contribution of our work...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.