The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual organizations are increasingly pervasive in knowledge work, despite significant challenges with respect to support for common ground, member awareness, sense of community, work coupling, incentives, and other issues. Understanding how specific sociotechnical affordances of VOs can enhance effectiveness in new and distinctive ways will improve our understanding of virtual organizations, and...
Service discovery is vital in ubiquitous applications, where a large number of devices and software components collaborate unobtrusively and provide numerous services without user intervention. Existing service discovery schemes use a service matching process in order to offer services of interest to the users. Potentially, the context information of the users and surrounding environment can be used...
Existing context-based access control mechanisms have a problem of tradeoffs between the expressive power and the management efficiency of authorization policy. In this paper we introduce the context-aware role engineering which is a new concept for context-based access control and context-aware service scenario driven role engineering approach. The context-aware role engineering enables that context-based...
Smartphones define a trend towards increasing combination and integration of sensing capabilities with almost ubiquitous inter-connectivity. Resulting location-based services and context-aware applications will benefit users by adapting better to the user application needs. However, there is a lack of effective means for controlling privacy in such systems which will likely increase further with future...
The paper presents the issues on the role of wireless access networks to support the kind of information exchange and interactions involved in the evolving social networks. The author discusses several requirements that the wireless access networks and social networking needs to address such as the communication infrastructure, distributed and informal trusts, environment interactions, body interactions,...
One of the most serious problems that conventional knowledge management (KM) encompasses has been pointed out tardy and ineffective acquisition of knowledge. To resolve this problem, knowledge must be autonomously acquired according to its context of use by applying the technique of keyword extraction in machine learning algorithm-based text mining. Once the topic of the given knowledge can be identified...
Context-aware computing has been considered as promising topic in pervasive computing area, but a review of the existing approaches shown that developing diverse application services in this area is still motivated based on the analysis of existing approaches in literature. The purpose of this study, is proposed the composite context information model to provide the knowledge that is determine the...
The Future Internet is foreseen to fully handle multimedia services which have experienced an explosive growth in the recent years. Therefore, improving the scalability of these services is getting crucial. One common approach for this purpose is the deployment of multiple replicas of a server throughout the network. The resulting issue is to direct the user request to the best server. Methods based...
Multi core architectures that are built to reap performance and energy efficiency benefits from the parallel execution of applications often employ runtime adaptive techniques in order to achieve, among others, load balancing, dynamic thermal management, and to enhance the reliability of a system. Typically, such runtime adaptation in the system level requires the ability to quickly and consistently...
Content usage statistics from superdistribution users have great commercial values since they can be used for any number of purposes including marketing, accounting, and/or fraud prevention. However tracking content usage under the superdistribution model poses a great challenge since most content users have no explicit pre-established relationship with the content provider. In this paper, we present...
“Context” is a widely used term, but its use stills suffers from either generality or incompleteness. This paper reviews the two main contrasting theoretical paradigms on linguistic contexts, provides some materials for reasoning about the different ways we use the term “context” in everyday life and in fusion domain, and proposes the use of distinct terms to denote different conceptual levels.
Current communication and computation technologies make it possible to embed intelligence and communication capabilities in most of the things surrounding us; this leading to the Internet of Things (IoT) concept. To really exploit the potential of the IoT, objects and provided services should be easily discoverable and usable by humans and by other objects. Besides, trustworthiness of the billions...
The complexity of developing and deploying context-aware pervasive-computing applications calls for distributed software infrastructures that unobtrusively support to contextual data collecting, information sharing and security privacy controlling. In this paper, we motivate a human-centric design for such an infrastructure to support context-aware applications. A novel peer to peer based semantic...
Since recently, it is accepted that mediation can take many forms depending on the application domains: for example, mediation can be seen as a means to deal with interoperability between legacy applications in large Information Systems in a variety of environments including Cloud or to synchronize, integrate and route data from sensor networks in pervasive applications. In this paper we present a...
In this paper, context awareness is exploited by defining semantic relations among sensor nodes. Data is routed in a multi-hop network after the establishment of semantic based communication links between sensors. Minimizing the energy consumption is a critical issue in resource constrained sensor networks. Context awareness introduces a new level of intelligence that can be exploited in order to...
With the advent of ubiquitous computing environments it has become increasingly important for applications to take full advantage of Context aware computing to increase the satisfaction of the users in entertainment services. The contextual information, such as, user location, user's profile, user interest, user role, user age, etc has to be considered to offer greater services to the user without...
Due to the context of pervasive computing with time-sensitive, the system scheduling management module must support real-time scheduling of context-aware. When a context information acting on the high-level application, may make other emergency contexts in a wait state which is not conducive to real-time systems and efficient implementation in ubiquitous computing environment. In order to solve this...
In this paper, we propose a context-aware system framework characteristic of two novel features. First, this framework is capable of modeling highly complex usage scenarios as a finite state machine while having transitions controlled by context information. And, this framework is designed with Augmented Reality capability as an integral component in its overall architecture to enable augmented interaction...
Effective manipulation of context is very important in the research of context-awareness. In recent years, thus, a variety of context models have been proposed to properly handle the key aspects of the context, while focusing on scenario-based acquisition, management, and representation of context. However, they are difficult to be employed for agent system requiring distributed reasoning. In this...
In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set of challenges that need to be addressed, (3)then we also propose a context-aware security framework for general cyber-physical systems and suggest some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.