Provably Correct Pervasive Computing Environments

被引:14
|
作者
Ranganathan, Anand [1 ]
Campbell, Roy H. [2 ]
机构
[1] IBM TJ Watson Res Ctr, Hawthorne, NY 10532 USA
[2] Univ Illinois, Urbana, IL 61801 USA
关键词
D O I
10.1109/PERCOM.2008.116
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The field of pervasive computing has seen a lot of exciting innovations in the past few years. However there are currently no mechanisms for describing the properties and capabilities of pervasive computing environments in a formal manner This makes it difficult to prove the correctnesss of a pervasive computing environment, i.e. to verify that the environment satisfies certain desired properties. In this paper, we propose a formal model for describing pervasive computing environments based on ambient calculus and the associated ambient logic. The model allows us to state and verify several properties of these environments such as "anywhere anyhow services", "mobility of devices and applications" and "context-aware adaptation". The model allows us to describe the resources present in an environment, the operations that can be performed in the environment, and how users can use the resources in th environment to perform different kinds of activities. As a case study, we shall describe some of the resources and operations supported by the Gaia middleware using this model, and verify an example property of a pervasive computing environment supported by Gaia.
引用
收藏
页码:160 / +
页数:2
相关论文
共 50 条
  • [21] Protecting Users' Anonymity in Pervasive Computing Environments
    Pareschi, Linda
    Riboni, Daniele
    Bettini, Claudio
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 11 - 19
  • [22] Advances in security and multimodality for pervasive computing environments
    Park, Jong Hyuk
    Hsu, Ching-Hsien
    Chilamkurti, Naveen
    Denko, Mieso
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 1341 - 1342
  • [23] Understanding identity exposure in pervasive computing environments
    Zhu, Feng
    Carpenter, Sandra
    Kulkarni, Ajinkya
    [J]. PERVASIVE AND MOBILE COMPUTING, 2012, 8 (05) : 777 - 794
  • [24] Collaborative resource discovery in pervasive computing environments
    Al-Jaroodi, Jameela
    Kharhash, Ahlam
    AlDhahiri, Amal
    Shamisi, Asma
    Dhaheri, Aysha
    AlQayedi, Fatima
    Dhaheri, Sheikha
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS: CTS 2008, 2008, : 135 - 141
  • [25] A Context Query Language for Pervasive Computing Environments
    Reichle, Roland
    Wagner, Michael
    Khan, Mohammad Ullah
    Geihs, Kurt
    Valla, Massimo
    Fra, Cristina
    Paspallis, Nearchos
    Papadopoulos, George A.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 434 - +
  • [26] Enabling Personal Privacy for Pervasive Computing Environments
    Baguees, Susana Alcalde
    Zeidler, Andreas
    Klein, Cornel
    Fernandez Valdivielso, Carlos
    Matias, Ignacio R.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (03) : 341 - 371
  • [27] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    [J]. Wireless Networks, 2018, 24 : 139 - 149
  • [28] Bradio: A wireless infrastructure for pervasive computing environments
    Yoshimi, B
    Bolam, GB
    Sukaviriya, N
    Elliott, J
    Carmeli, B
    Morgan, J
    Derby, H
    [J]. CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 309 - 316
  • [29] Unwanted periodic behaviour in pervasive computing environments
    Zamudio, Victor
    Callaghan, Vic
    [J]. INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2006, : 273 - +
  • [30] A Homogeneous Service Framework for Pervasive Computing Environments
    Department of Informatics, University of Fribourg, Chemin du Musée 3, Fribourg
    1700, Switzerland
    [J]. Lect. Notes Informatics (LNI), Proc. - Series Ges. Inform. (GI), (472-491):