iShadow: Yet Another Pervasive Computing Environment

被引:2
|
作者
Zhang, Daqiang [1 ]
Guan, Hu [1 ]
Zhou, Jingyu [1 ]
Tang, Feilong [1 ]
Guo, Minyi [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200240, Peoples R China
关键词
D O I
10.1109/ISPA.2008.133
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Previous architectures of pervasive computing are customized for specific types of applications. In this paper we propose a new architecture named iShadow, which facilitates the design and implementation of generic applications in pervasive computing environment. iShadow gracefully integrates physical spaces and human attention, and provides fundamental and flexible support to construct pervasive applications rapidly. Significant differences of iShadow from previous works are lightweight user-shadow model, scalable resource discovery and potent context inference mechanism. Our prototypes demonstrate that the iShadow architecture is robust, feasible and effective for pervasive applications.
引用
收藏
页码:261 / 268
页数:8
相关论文
共 50 条
  • [31] Bus Metered Fare System in Pervasive Computing Environment
    Liu, Wenjuan
    Fu, Xiufen
    Ouyang, Shaocong
    Teng, Shaohua
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 230 - 235
  • [32] Extended Isotope Programming Model for Pervasive Computing Environment
    Zhang Junbin
    Qi Yong
    Hou Di
    Xi Min
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 94 - 101
  • [33] CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment
    Ahene, Emmanuel
    Guan, Yuanfeng
    Zhang, Zhiwei
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 67 - 83
  • [34] Method for network data collection and processing in the pervasive computing environment
    School of Computer Science and Technology, Jilin University, Changchun 130012, China
    Ruan Jian Xue Bao, 2006, SUPPL. (219-224):
  • [35] Fault Tolerant Content Adaptation for a Dynamic Pervasive Computing Environment
    Fawaz, Yaser
    Bognanni, Carlo
    Scuturici, Vasile-Marian
    Brunie, Lionel
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2055 - 2060
  • [36] Context-aware design agents in pervasive computing environment
    Liu, Hong
    Liu, Xiyu
    Duan, Huichuan
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 111 - +
  • [37] An Adaptive Framework for Trust based Security in Pervasive Computing Environment
    Iltaf, Naima
    Ghafoor, Abdul
    Hussain, Khtar
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 624 - 628
  • [38] Research of architecture for digital campus LBS in Pervasive Computing Environment
    Ren, Weizheng
    Deng, Zhongliang
    Xu, Lianming
    Zhu, Yujia
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 475 - 480
  • [39] A developing approach of information acquisition system in pervasive computing environment
    Lin, Jinjiao
    Song, Chengxiang
    Wang, Haiyang
    2006 IEEE International Conference on Information Acquisition, Vols 1 and 2, Conference Proceedings, 2006, : 840 - 844
  • [40] An omnipresent formal trust model (FTM) for pervasive computing environment
    Haque, Munirul M.
    Ahamed, Sheikh I.
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 49 - +