A location model for pervasive computing environments

被引:40
|
作者
Satoh, I [1 ]
机构
[1] Natl Inst Informat, Chiyoda Ku, Tokyo 1018430, Japan
关键词
D O I
10.1109/PERCOM.2005.3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a world model for location-aware and user-aware services in ubiquitous computing environments. It can be dynamically organized like a tree based on geographical containment, such as user-room-floor-building, and each node in the tree can be constructed as an executable software component. The model is unique to existing approaches because it can be managed by multiple computers in an ad-hoc manner and it can provide a unified view of the locations of not only physical entities and spaces, including users and objects, but also computing devices and services. A prototype implementation of this approach was constructed on a Java-based mobile agent system. This paper presents the rationale, design, implementation, and applications of the prototype system.
引用
收藏
页码:215 / 224
页数:10
相关论文
共 50 条
  • [21] On data management in pervasive computing environments
    Perich, F
    Joshi, A
    Finin, T
    Yesha, Y
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (05) : 621 - 634
  • [22] Service discovery in pervasive computing environments
    Zhu, F
    Mutka, MW
    Ni, LM
    [J]. IEEE PERVASIVE COMPUTING, 2005, 4 (04) : 81 - 90
  • [23] Provably Correct Pervasive Computing Environments
    Ranganathan, Anand
    Campbell, Roy H.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 160 - +
  • [24] A trust framework for pervasive computing environments
    Wolfe, Steven T.
    Ahamed, Sheikh I.
    Zulkernine, Mohammad
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 312 - +
  • [25] A Trust Framework for Pervasive Computing Environments
    Xu, Wenshuan
    Xin, Yunwei
    Lu, Guizhang
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2222 - 2225
  • [26] Agile middleware of pervasive computing environments
    Niemelä, E
    Vaskivuo, T
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 192 - 197
  • [27] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [28] Context management in pervasive computing environments
    Anagnostopoulos, C
    Tsounis, A
    Hadjiefthymiades, S
    [J]. International Conference on Pervasive Services 2005, Proceedings, 2005, : 421 - 424
  • [29] A group supported workflow model and its applications in pervasive computing environments
    He, Wei
    Wang, Haiyang
    Xiao, Zongshui
    Shi, Yuliang
    [J]. 2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 147 - 152
  • [30] Olympus: A high-level programming model for pervasive computing environments
    Ranganathan, A
    Chetan, S
    Al-Muhtadi, J
    Campbell, RH
    Mickunas, MD
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 7 - 16