Provably Correct Pervasive Computing Environments

被引:14
|
作者
Ranganathan, Anand [1 ]
Campbell, Roy H. [2 ]
机构
[1] IBM TJ Watson Res Ctr, Hawthorne, NY 10532 USA
[2] Univ Illinois, Urbana, IL 61801 USA
关键词
D O I
10.1109/PERCOM.2008.116
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The field of pervasive computing has seen a lot of exciting innovations in the past few years. However there are currently no mechanisms for describing the properties and capabilities of pervasive computing environments in a formal manner This makes it difficult to prove the correctnesss of a pervasive computing environment, i.e. to verify that the environment satisfies certain desired properties. In this paper, we propose a formal model for describing pervasive computing environments based on ambient calculus and the associated ambient logic. The model allows us to state and verify several properties of these environments such as "anywhere anyhow services", "mobility of devices and applications" and "context-aware adaptation". The model allows us to describe the resources present in an environment, the operations that can be performed in the environment, and how users can use the resources in th environment to perform different kinds of activities. As a case study, we shall describe some of the resources and operations supported by the Gaia middleware using this model, and verify an example property of a pervasive computing environment supported by Gaia.
引用
收藏
页码:160 / +
页数:2
相关论文
共 50 条
  • [1] Coordination in pervasive computing environments
    Ferscha, A
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 3 - 9
  • [2] On Modeling for Pervasive Computing Environments
    Campiolo, Rodrigo
    Cremer, Vivian
    Sobral, Joao Bosco M.
    [J]. MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
  • [3] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [4] Pervasive Computing in Classroom Environments and Applications
    Oluwagbemi, Folakemi
    Misra, Sanjay
    Omoregbe, Nicholas
    [J]. 2014 GLOBAL SUMMIT ON COMPUTER & INFORMATION TECHNOLOGY (GSCIT), 2014,
  • [5] A location model for pervasive computing environments
    Satoh, I
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 215 - 224
  • [6] Service discovery in pervasive computing environments
    Zhu, F
    Mutka, MW
    Ni, LM
    [J]. IEEE PERVASIVE COMPUTING, 2005, 4 (04) : 81 - 90
  • [7] On data management in pervasive computing environments
    Perich, F
    Joshi, A
    Finin, T
    Yesha, Y
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (05) : 621 - 634
  • [8] A trust model for pervasive computing environments
    Yin, Shuxin
    Ray, Indrakshi
    Ray, Indrajit
    [J]. 2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 340 - +
  • [9] A trust framework for pervasive computing environments
    Wolfe, Steven T.
    Ahamed, Sheikh I.
    Zulkernine, Mohammad
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 312 - +
  • [10] A Trust Framework for Pervasive Computing Environments
    Xu, Wenshuan
    Xin, Yunwei
    Lu, Guizhang
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2222 - 2225