Adaptation of composite services in pervasive computing environments

被引:6
|
作者
Funk, Caroline [1 ]
Schultheis, Amelia [1 ]
Linnhoff-Popien, Claudia [1 ]
Mitic, Jelena [2 ]
Kuhmuench, Christoph [2 ]
机构
[1] Univ Munich, Mobile & Distributed Syst Grp, D-80539 Munich, Germany
[2] Siemens AG Corp Technol Software & Engn, Munich, Germany
关键词
D O I
10.1109/PERSER.2007.4283922
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Pervasive Computing is characterized by an automatic adaptation of services to the user's situation. To achieve this we compose services from atomic services taking ambient information into account. Due to changing availability of services because of e.g. user mobility an initial composition is not sufficient but an adaptation during runtime is also necessary. Within our architecture we manage one or more composite services. Decisions regarding their adaptation are made taking requirements from all composite services into account. This is not easy as each composite service may have different goals. In this paper, we present the results of an analysis of pervasive application scenarios. Based on the analysis we developed a two-level decision system for adaptation decisions: on the composite service level decisions are made using linear programming, on the system level using rule based control. The implementation is integrated in our existing service composition architecture.
引用
下载
收藏
页码:242 / +
页数:2
相关论文
共 50 条
  • [41] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33
  • [42] Ontology access patterns for pervasive computing environments
    Villanueva, F. J.
    Villa, D.
    Barba, J.
    Rincon, F.
    Moya, F.
    Lopez, J. C.
    AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244
  • [43] Protecting Users' Anonymity in Pervasive Computing Environments
    Pareschi, Linda
    Riboni, Daniele
    Bettini, Claudio
    2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 11 - 19
  • [44] On experiments with a transport protocol for pervasive computing environments
    Avancha, S
    Korolev, V
    Joshi, A
    Finin, T
    Yesha, Y
    COMPUTER NETWORKS, 2002, 40 (04) : 515 - 535
  • [45] Advances in security and multimodality for pervasive computing environments
    Park, Jong Hyuk
    Hsu, Ching-Hsien
    Chilamkurti, Naveen
    Denko, Mieso
    TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 1341 - 1342
  • [46] A Hybrid CARV Architecture for Pervasive Computing Environments
    Kim, SoonGohn
    Ko, Eung Nam
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2008, 15 : 380 - +
  • [47] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [48] Collaborative resource discovery in pervasive computing environments
    Al-Jaroodi, Jameela
    Kharhash, Ahlam
    AlDhahiri, Amal
    Shamisi, Asma
    Dhaheri, Aysha
    AlQayedi, Fatima
    Dhaheri, Sheikha
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS: CTS 2008, 2008, : 135 - 141
  • [49] Understanding identity exposure in pervasive computing environments
    Zhu, Feng
    Carpenter, Sandra
    Kulkarni, Ajinkya
    PERVASIVE AND MOBILE COMPUTING, 2012, 8 (05) : 777 - 794
  • [50] A Context Query Language for Pervasive Computing Environments
    Reichle, Roland
    Wagner, Michael
    Khan, Mohammad Ullah
    Geihs, Kurt
    Valla, Massimo
    Fra, Cristina
    Paspallis, Nearchos
    Papadopoulos, George A.
    2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 434 - +