Ontology access patterns for pervasive computing environments

被引:0
|
作者
Villanueva, F. J. [1 ]
Villa, D. [1 ]
Barba, J. [1 ]
Rincon, F. [1 ]
Moya, F. [1 ]
Lopez, J. C. [1 ]
机构
[1] Univ Castilla La Mancha, Dept Informat Technol & Syst, E-13071 Ciudad Real, Spain
来源
关键词
Patterns; Pervasive Computing; Ontology; Web Services;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lately, the use of ontologies for semantic description in pervasive systems has been researched and applied in numerous projects. The characteristic of this type of representation for data, services, interfaces, etc. allows the interaction between entities in a pervasive environment and then the development of advanced services. However, pervasive systems include a high number of mobile devices that have to access to several ontology-based information repositories with different representations, interfaces, etc. This fact limits the interaction capacity of mobile devices which have not been designed taking this interaction into account. In this paper we define an access extension for ontology-based pervasive systems that can be automatically generated. Based on the general structure of such systems and on the characteristics of the applications specifically developed to interact with them, we have derived several patterns in order to ease the information lookup and to allow a basic interaction with the system. In this way, we define a set of access patterns based in common structures and interactions. These patterns work in a similar way that design patterns do in software engineering. They are designed independently of the specific ontology implementation and representation. Finally, we present a tool that automatically generates a specific implementation of the defined patterns and we describe a prototype that uses this extension by means of Web Services.
引用
收藏
页码:236 / 244
页数:9
相关论文
共 50 条
  • [1] An ontology for context-aware pervasive computing environments
    Chen, H
    Finin, T
    Joshi, A
    [J]. KNOWLEDGE ENGINEERING REVIEW, 2003, 18 (03): : 197 - 207
  • [2] Uncertainty assessment in access control of pervasive computing environments
    Pashazadeh, Saeid
    Dizaji, Mohammad Zendedel
    Amiri, Ali
    [J]. 2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1174 - 1179
  • [3] Pervasive data access in wireless and mobile computing environments
    Lee, Ken C. K.
    Lee, Wang-Chien
    Madria, Sanjay
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01): : 25 - 44
  • [4] Privacy Enhanced Access Control in Pervasive Computing Environments
    Ren, Kui
    Lou, Wenjing
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
  • [5] Shared ontology for pervasive computing
    Man, JF
    Yang, AM
    Sun, XM
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS: DATA MANAGEMENT ON THE WEB, 2005, 3818 : 64 - 78
  • [6] The SOUPA ontology for pervasive computing
    Chen, H
    Finin, T
    Joshi, A
    [J]. ONTOLOGIES FOR AGENTS: THEORY AND EXPERIENCES, 2005, : 233 - 258
  • [7] User Access of Public Shared Devices in Pervasive Computing Environments
    Jea, David
    Yap, Ian
    Srivastava, Mani
    [J]. 2007 JOINT WORKSHOP ON HIGH CONFIDENCE MEDICAL DEVICES, SOFTWARE AND SYSTEMS AND MEDICAL DEVICE PLUG-AND PLAY INTEROPERABILITY, 2007, : 57 - 63
  • [8] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [9] Context-based secure resource access in pervasive computing environments
    Tripathi, A
    Ahmed, T
    Kulkarni, D
    Kumar, R
    Kashiramka, K
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 159 - 163
  • [10] Ontology mapping in pervasive computing environment
    Kong, CY
    Wang, CL
    Lau, FCM
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 1014 - 1023