On data management in pervasive computing environments

被引:46
|
作者
Perich, F [1 ]
Joshi, A [1 ]
Finin, T [1 ]
Yesha, Y [1 ]
机构
[1] Univ Maryland, Baltimore, MD 21250 USA
基金
美国国家科学基金会;
关键词
mobile data management; pervasive computing environments; data and knowledge representation; profile-driven caching algorithm; profile driven data management; data-centric routing algorithm;
D O I
10.1109/TKDE.2004.1277823
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a framework to address new data management challenges introduced by data-intensive, pervasive computing environments. These challenges include a spatio-temporal variation of data and data source availability, lack of a global catalog and schema, and no guarantee of reconnection among peers due to the serendipitous nature of the environment. An important aspect of our solution is to treat devices as semiautonomous peers guided in their interactions by profiles and context. The profiles are grounded in a semantically rich language and represent information about users, devices, and data described in terms of "beliefs," "desires," and "intentions." We present a prototype implementation of this framework over combined Bluetooth and Ad Hoc 802.11 networks and present experimental and simulation results that validate our approach and measure system performance.
引用
收藏
页码:621 / 634
页数:14
相关论文
共 50 条
  • [41] Collaborative resource discovery in pervasive computing environments
    Al-Jaroodi, Jameela
    Kharhash, Ahlam
    AlDhahiri, Amal
    Shamisi, Asma
    Dhaheri, Aysha
    AlQayedi, Fatima
    Dhaheri, Sheikha
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS: CTS 2008, 2008, : 135 - 141
  • [42] A Context Query Language for Pervasive Computing Environments
    Reichle, Roland
    Wagner, Michael
    Khan, Mohammad Ullah
    Geihs, Kurt
    Valla, Massimo
    Fra, Cristina
    Paspallis, Nearchos
    Papadopoulos, George A.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 434 - +
  • [43] Enabling Personal Privacy for Pervasive Computing Environments
    Baguees, Susana Alcalde
    Zeidler, Andreas
    Klein, Cornel
    Fernandez Valdivielso, Carlos
    Matias, Ignacio R.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (03) : 341 - 371
  • [44] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    [J]. Wireless Networks, 2018, 24 : 139 - 149
  • [45] Bradio: A wireless infrastructure for pervasive computing environments
    Yoshimi, B
    Bolam, GB
    Sukaviriya, N
    Elliott, J
    Carmeli, B
    Morgan, J
    Derby, H
    [J]. CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 309 - 316
  • [46] Unwanted periodic behaviour in pervasive computing environments
    Zamudio, Victor
    Callaghan, Vic
    [J]. INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2006, : 273 - +
  • [47] A Homogeneous Service Framework for Pervasive Computing Environments
    Department of Informatics, University of Fribourg, Chemin du Musée 3, Fribourg
    1700, Switzerland
    [J]. Lect. Notes Informatics (LNI), Proc. - Series Ges. Inform. (GI), (472-491):
  • [48] Adaptation of composite services in pervasive computing environments
    Funk, Caroline
    Schultheis, Amelia
    Linnhoff-Popien, Claudia
    Mitic, Jelena
    Kuhmuench, Christoph
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 242 - +
  • [49] Learning automation policies for pervasive computing environments
    Ziebart, BD
    Roth, D
    Campbell, RH
    Dey, AK
    [J]. ICAC 2005: SECOND INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2005, : 193 - 203
  • [50] Applying pervasive computing in an architecture for homecare environments
    Freitas, Leandro O.
    Librelotto, Giovani R.
    Pereira, Henrique G. G.
    Kasper, Jeferson
    Martini, Ricardo G.
    Mozzaquatro, Bruno
    Pereira, Rafael T.
    [J]. 2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 685 - 692