Location-detection strategies in pervasive computing environments

被引:2
|
作者
Fischmeister, S [1 ]
Menkhaus, G [1 ]
Stumpfl, A [1 ]
机构
[1] Salzburg Univ, Software Res Lab, A-5020 Salzburg, Austria
关键词
D O I
10.1109/PERCOM.2003.1192750
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for moving users, objects, and devices. Their growing number has strong implications on the bandwidth of wireless and wired networks. Network bandwidth becomes a scare resource and its efficient use is crucial for the quality of service in pervasive computing. In this article we study process models for detecting location changes of moving objects and their effect on the network bandwidth. We simulate a scenario of 104 moving objects for a period of 107 time cycles while monitoring the quality of service with respect to network bandwidth for different location detection strategies. The simulation shows that the class of strategies implementing a synchronous model offers better quality of service than the timed model. We conclude the article with a set of guidelines for the application of the strategies we have investigated.
引用
收藏
页码:273 / 278
页数:6
相关论文
共 50 条
  • [1] A location model for pervasive computing environments
    Satoh, I
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 215 - 224
  • [2] Error modeling in RE-based location detection (EMLD) for pervasive computing environments
    Swami, Niraj
    Ahamed, Sheikh I.
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 783 - +
  • [3] Context and location-aware encryption for pervasive computing environments
    Al-Muhtadi, J
    Hill, R
    Campbell, R
    Mickunas, MD
    [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 283 - +
  • [4] Towards an intrusion detection system for pervasive computing environments
    Kannadiga, P
    Zulkernine, M
    Ahamed, SI
    [J]. ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 277 - 282
  • [5] Location privacy in pervasive computing
    Beresford, AR
    Stajano, F
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 46 - 55
  • [6] Runtime Detection of the Concurrency Property in Asynchronous Pervasive Computing Environments
    Huang, Yu
    Yang, Yiling
    Cao, Jiannong
    Ma, Xiaoxing
    Tao, Xianping
    Lu, Jian
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (04) : 744 - 750
  • [7] Coordination in pervasive computing environments
    Ferscha, A
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 3 - 9
  • [8] On Modeling for Pervasive Computing Environments
    Campiolo, Rodrigo
    Cremer, Vivian
    Sobral, Joao Bosco M.
    [J]. MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
  • [9] AGAPE: a location-aware group membership middleware for pervasive computing environments
    Bottazzi, D
    Corradi, A
    Montanari, R
    [J]. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 1185 - 1192
  • [10] Identity location decoupling in pervasive computing
    Herborn, S
    Boreli, R
    Seneviratne, A
    [J]. AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 610 - 615