iShadow: Yet Another Pervasive Computing Environment

被引:2
|
作者
Zhang, Daqiang [1 ]
Guan, Hu [1 ]
Zhou, Jingyu [1 ]
Tang, Feilong [1 ]
Guo, Minyi [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200240, Peoples R China
关键词
D O I
10.1109/ISPA.2008.133
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Previous architectures of pervasive computing are customized for specific types of applications. In this paper we propose a new architecture named iShadow, which facilitates the design and implementation of generic applications in pervasive computing environment. iShadow gracefully integrates physical spaces and human attention, and provides fundamental and flexible support to construct pervasive applications rapidly. Significant differences of iShadow from previous works are lightweight user-shadow model, scalable resource discovery and potent context inference mechanism. Our prototypes demonstrate that the iShadow architecture is robust, feasible and effective for pervasive applications.
引用
收藏
页码:261 / 268
页数:8
相关论文
共 50 条
  • [41] Scalable multimedia delivery with QoS management in pervasive computing environment
    Zhang, Hongguang
    Hang Nguyen
    Martinez Gracia, Eduardo
    Tudela Solano, Pedro Antonio
    Zhang, Daqing
    Crespi, Noel
    Guo, Bin
    JOURNAL OF SUPERCOMPUTING, 2013, 65 (01): : 317 - 335
  • [42] Composing software services in the pervasive computing environment: Languages or APIs?
    Robinson, Jon
    Wakeman, Ian
    Chalmers, Dan
    PERVASIVE AND MOBILE COMPUTING, 2008, 4 (04) : 481 - 505
  • [43] User preference learning for multimedia personalization in pervasive computing environment
    Yu, ZW
    Zhang, DQ
    Zhou, XS
    Li, CD
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 236 - 242
  • [44] An Effective Model for Indirect Trust Computation in Pervasive Computing Environment
    Iltaf, Naima
    Ghafoor, Abdul
    Zia, Usman
    Hussain, Mukhtar
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (03) : 1689 - 1713
  • [45] An inter-domain authentication scheme for pervasive computing environment
    Yao, Lin
    Wang, Lei
    Kong, Xiangwei
    Wu, Guowei
    Xia, Feng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 234 - 244
  • [46] Design and implementation of speech interaction system in pervasive computing environment
    Jiang, Li-Fen
    Lu, Gui-Zhang
    Xin, Yun-Wei
    Li, Zhang-n Li
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 4365 - +
  • [47] Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing
    Babbitt, Ryan
    Yang, Hen-I
    Wong, Johnny
    Chang, Carl
    AMBIENT ASSISTIVE HEALTH AND WELLNESS MANAGEMENT IN THE HEART OF THE CITY, PROCEEDING, 2009, 5597 : 166 - 173
  • [48] Impact of QoS routing metrics for MANETs in the pervasive computing environment
    Abdullah, Jiwa
    Parish, David
    2007 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2007, : 508 - 512
  • [49] A framework for personal mobile agents in wireless pervasive computing environment
    Ulema, A.
    Waldman, M.
    Kozbe, B.
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 107 - +
  • [50] The research of quality of experience evaluation method in pervasive computing environment
    Liu Li-yuan
    Zhou Wen-an
    Song Jun-de
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 178 - +