A location model for pervasive computing environments

被引:40
|
作者
Satoh, I [1 ]
机构
[1] Natl Inst Informat, Chiyoda Ku, Tokyo 1018430, Japan
关键词
D O I
10.1109/PERCOM.2005.3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a world model for location-aware and user-aware services in ubiquitous computing environments. It can be dynamically organized like a tree based on geographical containment, such as user-room-floor-building, and each node in the tree can be constructed as an executable software component. The model is unique to existing approaches because it can be managed by multiple computers in an ad-hoc manner and it can provide a unified view of the locations of not only physical entities and spaces, including users and objects, but also computing devices and services. A prototype implementation of this approach was constructed on a Java-based mobile agent system. This paper presents the rationale, design, implementation, and applications of the prototype system.
引用
收藏
页码:215 / 224
页数:10
相关论文
共 50 条
  • [41] Collaborative resource discovery in pervasive computing environments
    Al-Jaroodi, Jameela
    Kharhash, Ahlam
    AlDhahiri, Amal
    Shamisi, Asma
    Dhaheri, Aysha
    AlQayedi, Fatima
    Dhaheri, Sheikha
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS: CTS 2008, 2008, : 135 - 141
  • [42] A Context Query Language for Pervasive Computing Environments
    Reichle, Roland
    Wagner, Michael
    Khan, Mohammad Ullah
    Geihs, Kurt
    Valla, Massimo
    Fra, Cristina
    Paspallis, Nearchos
    Papadopoulos, George A.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 434 - +
  • [43] Understanding identity exposure in pervasive computing environments
    Zhu, Feng
    Carpenter, Sandra
    Kulkarni, Ajinkya
    [J]. PERVASIVE AND MOBILE COMPUTING, 2012, 8 (05) : 777 - 794
  • [44] Bradio: A wireless infrastructure for pervasive computing environments
    Yoshimi, B
    Bolam, GB
    Sukaviriya, N
    Elliott, J
    Carmeli, B
    Morgan, J
    Derby, H
    [J]. CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 309 - 316
  • [45] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    [J]. Wireless Networks, 2018, 24 : 139 - 149
  • [46] Enabling Personal Privacy for Pervasive Computing Environments
    Baguees, Susana Alcalde
    Zeidler, Andreas
    Klein, Cornel
    Fernandez Valdivielso, Carlos
    Matias, Ignacio R.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (03) : 341 - 371
  • [47] Model-Driven Engineering of Planning and Optimisation Algorithms for Pervasive Computing Environments
    Harrington, Anthony
    Cahill, Vinny
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2011), 2011, : 172 - 180
  • [48] Adaptation of composite services in pervasive computing environments
    Funk, Caroline
    Schultheis, Amelia
    Linnhoff-Popien, Claudia
    Mitic, Jelena
    Kuhmuench, Christoph
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 242 - +
  • [49] Learning automation policies for pervasive computing environments
    Ziebart, BD
    Roth, D
    Campbell, RH
    Dey, AK
    [J]. ICAC 2005: SECOND INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2005, : 193 - 203
  • [50] Unwanted periodic behaviour in pervasive computing environments
    Zamudio, Victor
    Callaghan, Vic
    [J]. INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2006, : 273 - +