Towards summarized representation of time series data in pervasive computing systems

被引:0
|
作者
Rasheed, Faraz [1 ]
Lee, Youngkoo [1 ]
Lee, Sungyoung [1 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Suwon 446701, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ubiquitous computing systems are connected with a number of sensors and devices immersed in the environment, spread throughout providing proactive context aware services to users. These systems continuously receive tremendous amount of information about their environment, users and devices. Such a huge amount of information deserves special techniques for efficient modeling, storage and retrieval. In this paper we propose the modeling of context information as time series and applying the time series approximation techniques to reduce the storage space requirements and for faster query processing. We applied an algorithm based on non-linear interpolation to approximate such data and evaluated the approximation error, storage space requirements and query processing time.
引用
下载
收藏
页码:658 / 668
页数:11
相关论文
共 50 条
  • [31] Towards Fault Tolerance of Reservoir Computing in Time Series Prediction
    Sun, Xiaochuan
    Gao, Jiahui
    Wang, Yu
    INFORMATION, 2023, 14 (05)
  • [32] DYNAMIC REPRESENTATION OF MULTIVARIATE TIME-SERIES DATA
    MEZRICH, JJ
    FRYSINGER, S
    SLIVANOVSKI, R
    JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 1984, 79 (385) : 34 - 40
  • [33] Symbolic Time Series Representation for Stream Data Processing
    Sevcech, Jakub
    Bielikova, Maria
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 2, 2015, : 217 - 222
  • [34] STOCHASTIC TIME-SERIES REPRESENTATION OF WAVE DATA
    SCHEFFNER, NW
    BORGMAN, LE
    JOURNAL OF WATERWAY PORT COASTAL AND OCEAN ENGINEERING-ASCE, 1992, 118 (04): : 337 - 351
  • [35] Towards context constrained authorisation for pervasive grid computing
    Chin, J. S.
    Zhang, N.
    Nenadic, A.
    Yao, L.
    Brooke, J. M.
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 721 - +
  • [36] Towards an intrusion detection system for pervasive computing environments
    Kannadiga, P
    Zulkernine, M
    Ahamed, SI
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 277 - 282
  • [37] Towards pervasive computing in health care – A literature review
    Carsten Orwat
    Andreas Graefe
    Timm Faulwasser
    BMC Medical Informatics and Decision Making, 8
  • [38] Towards socially aware pervasive computing: A turntaking approach
    Kurvinen, E
    Oulasvirta, A
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2004, : 346 - 350
  • [39] Towards self-optimization of a pervasive computing task
    Hina, Manolo Dulva
    Ramdane-Cherif, Amar
    Sicat, Marietta S.
    Vargas, Rodolfo S.
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 1057 - 1063
  • [40] Safeguarding personal data using trusted computing in pervasive computing
    Hohl, A
    Zugenmaier, A
    PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 147 - 155