A Hybrid CARV Architecture for Pervasive Computing Environments

被引:0
|
作者
Kim, SoonGohn [1 ]
Ko, Eung Nam [2 ]
机构
[1] Joongbu Univ, Div Comp & Game Sci, 101 Daehakro, GumsanGun 312702, Chungnam, South Korea
[2] Baekseok Univ, Informat & Commun Div, Cheonan 330704, Chungnam, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes a hybrid CARV software architecture that is running on situation-aware middleware for a web based distance education system which has an object with a various information for each session. There are two approaches to software architecture on which distributed, collaborative applications are based. Those include CACV(Centralized-Abstraction and Centralized-View) and RARV(Replicated-Abstraction and Replicated-View). We propose an adaptive concurrency control QOS agent based on a hybrid software architecture which is adopting the advantage of CACV and RARV for situation-aware middleware.
引用
收藏
页码:380 / +
页数:2
相关论文
共 50 条
  • [31] Ontology access patterns for pervasive computing environments
    Villanueva, F. J.
    Villa, D.
    Barba, J.
    Rincon, F.
    Moya, F.
    Lopez, J. C.
    [J]. AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244
  • [32] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33
  • [33] Protecting Users' Anonymity in Pervasive Computing Environments
    Pareschi, Linda
    Riboni, Daniele
    Bettini, Claudio
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 11 - 19
  • [34] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    [J]. WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [35] Advances in security and multimodality for pervasive computing environments
    Park, Jong Hyuk
    Hsu, Ching-Hsien
    Chilamkurti, Naveen
    Denko, Mieso
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 1341 - 1342
  • [36] On experiments with a transport protocol for pervasive computing environments
    Avancha, S
    Korolev, V
    Joshi, A
    Finin, T
    Yesha, Y
    [J]. COMPUTER NETWORKS, 2002, 40 (04) : 515 - 535
  • [37] Collaborative resource discovery in pervasive computing environments
    Al-Jaroodi, Jameela
    Kharhash, Ahlam
    AlDhahiri, Amal
    Shamisi, Asma
    Dhaheri, Aysha
    AlQayedi, Fatima
    Dhaheri, Sheikha
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS: CTS 2008, 2008, : 135 - 141
  • [38] Understanding identity exposure in pervasive computing environments
    Zhu, Feng
    Carpenter, Sandra
    Kulkarni, Ajinkya
    [J]. PERVASIVE AND MOBILE COMPUTING, 2012, 8 (05) : 777 - 794
  • [39] A Context Query Language for Pervasive Computing Environments
    Reichle, Roland
    Wagner, Michael
    Khan, Mohammad Ullah
    Geihs, Kurt
    Valla, Massimo
    Fra, Cristina
    Paspallis, Nearchos
    Papadopoulos, George A.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 434 - +
  • [40] Enabling Personal Privacy for Pervasive Computing Environments
    Baguees, Susana Alcalde
    Zeidler, Andreas
    Klein, Cornel
    Fernandez Valdivielso, Carlos
    Matias, Ignacio R.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (03) : 341 - 371