期刊文献+
共找到62篇文章
< 1 2 4 >
每页显示 20 50 100
基于Pervasive Computing技术的外语网络交互模态话语构想 被引量:4
1
作者 周文娟 《现代教育技术》 CSSCI 2011年第6期91-95,共5页
文章以"Pervasive Computing"为技术支撑,以"系统功能语言学"为理论研究框架,以外语教学领域的模态话语研究为表现形式,探索创建多模态视野下的外语网络交互教学模态,即供交际双方或多方信息全球实时传达、同步立... 文章以"Pervasive Computing"为技术支撑,以"系统功能语言学"为理论研究框架,以外语教学领域的模态话语研究为表现形式,探索创建多模态视野下的外语网络交互教学模态,即供交际双方或多方信息全球实时传达、同步立体交互的多模态教学模式。 展开更多
关键词 pervasive COMPUTING 话语语境 网络交互 模态构想
下载PDF
Trust Based Pervasive Computing 被引量:2
2
作者 LI Shiqun Shane Balfe +1 位作者 ZHOU Jianying CHEN Kefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1477-1480,共4页
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC... Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology. 展开更多
关键词 trusted computing pervasive computing pervasive computing security
下载PDF
Dynamic software allocation algorithm for saving power in pervasive computing
3
作者 韩松乔 张申生 +1 位作者 张勇 曹健 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期216-220,共5页
A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communic... A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communication and migration of software components, a power consumption model of component assignments between a mobile device and a server is set up. Also, the mobility of components and the mobility relationships between components are taken into account in software allocation. By using network flow theory, the optimization problem of power conservation is transformed into the optimal bipartition problem of a flow network which can be partitioned by the max-flow rain-cut algorithm. Simulation results show that the proposed algorithm can save si^nificantlv more energy than existing algorithms. 展开更多
关键词 power aware software allocation code mobility graph theory pervasive computing
下载PDF
A Personal Desktop Liquid-Metal Printer as a Pervasive Electronics Manufacturing Tool for Society in the Near Future 被引量:1
4
作者 Jun Yang Yang Yang +2 位作者 Zhizhu He Bowei Chen Jing Liu 《Engineering》 SCIE EI 2015年第4期506-512,共7页
It has long been a dream in the electronics industry to be able to write out electronics directly, as simply as printing a picture onto paper with an offi ce printer. The fi rstever prototype of a liquid-metal printer... It has long been a dream in the electronics industry to be able to write out electronics directly, as simply as printing a picture onto paper with an offi ce printer. The fi rstever prototype of a liquid-metal printer has been invented and demonstrated by our lab, bringing this goal a key step closer. As part of a continuous endeavor, this work is dedicated to significantly extending such technology to the consumer level by making a very practical desktop liquid-metal printer for society in the near future. Through the industrial design and technical optimization of a series of key technical issues such as working reliability, printing resolution, automatic control, human-machine interface design, software, hardware, and integration between software and hardware, a high-quality personal desktop liquid-metal printer that is ready for mass production in industry was fabricated. Its basic features and important technical mechanisms are explained in this paper, along with demonstrations of several possible consumer end-uses for making functional devices such as li ght-emitting diode(LED) displays. This liquid-metal printer is an automatic, easyto-use, and low-cost personal electronics manufacturing tool with many possible applications. This paper discusses important roles that the new machine may play for a group of emerging needs. The prospective future of this cuttingedge technology is outlined, along with a comparative interpretation of several historical printing methods. This desktop liquid-metal printer is expected to become a basic electronics manufacturing tool for a wide variety of emerging practices in the academic realm, in industry, and in education as well as for individual end-users in the near future. 展开更多
关键词 liquid-metal printer printed electronics additive manufacturing MAKER do-it-yourself (DIY) electronics pervasive technology
下载PDF
Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme 被引量:1
5
作者 Geetanjali Rathee Razi Iqbal Adel Khelifi 《Computers, Materials & Continua》 SCIE EI 2021年第8期2755-2769,共15页
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ... Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach. 展开更多
关键词 pervasive computing vehicular networks SECURITY TRUST decision schemes trusted internet of vehicles big data
下载PDF
A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS 被引量:1
6
作者 Yao Lin Kong Xiangwei +2 位作者 Wu Guowei Fan Qingna Lin Chi 《Journal of Electronics(China)》 2010年第1期68-78,共11页
In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other ... In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic. 展开更多
关键词 PRIVACY SECURITY Biometric encryption pervasive Computing Environments(PCEs)
下载PDF
Real-Time Automatic ECG Diagnosis Method Dedicated to Pervasive Cardiac Care 被引量:1
7
作者 Haiying ZHOU Kun-Mean HOU Decheng ZUO 《Wireless Sensor Network》 2009年第4期276-283,共8页
Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to ... Recent developments of the wireless sensor network will revolutionize the way of remote monitoring in dif-ferent domains such as smart home and smart care, particularly remote cardiac care. Thus, it is challenging to propose an energy efficient technique for automatic ECG diagnosis (AED) to be embedded into the wireless sensor. Due to the high resource requirements, classical AED methods are unsuitable for pervasive cardiac care (PCC) applications. This paper proposes an embedded real-time AED algorithm dedicated to PCC sys-tems. This AED algorithm consists of a QRS detector and a rhythm classifier. The QRS detector adopts the linear time-domain statistical and syntactic analysis method and the geometric feature extraction modeling technique. The rhythm classifier employs the self-learning expert system and the confidence interval method. Currently, this AED algorithm has been implemented and evaluated on the PCC system for 30 patients in the Gabriel Monpied hospital (CHRU of Clermont-Ferrand, France) and the MIT-BIH cardiac arrhythmias da-tabase. The overall results show that this energy efficient algorithm provides the same performance as the classical ones. 展开更多
关键词 pervasive CARDIAC Care Automatic ECG Diagnosis QRS detector RHYTHM CLASSIFIER Wireless Sensor Networks
下载PDF
MOBILE PHONE AS PERVASIVE ELECTRONIC MEDIA TO RECORD AND EVALUATE HUMAN GAIT BEHAVIOR
8
作者 QIAN WANG YANG YU +1 位作者 YONGQIANG LV JING LIU 《Journal of Innovative Optical Health Sciences》 SCIE EI CAS 2012年第1期28-35,共8页
Gait recognition has been of great importance for disease diagnosis,rehabilitation assessment,as well as personal identification.Conventional gait analysis generally has to rely heavily on complex,expensive data acqui... Gait recognition has been of great importance for disease diagnosis,rehabilitation assessment,as well as personal identification.Conventional gait analysis generally has to rely heavily on complex,expensive data acquisition and computing apparatus.To significantly simplify the evaluation process the mobile phone,which is one of the most indispensable electronic media in human daily life,was adopted as a pervasive tool for gait study,by using its digital imaging recording and analysis function.The basic procedure to record and quantify the video of human gait was illustrated and demonstrated through conceptual experiments.Potential applications were discussed.Some fundamental and practical issues raised in such flexible technology were pointed out.This method is expected to be widely used in future human analysis. 展开更多
关键词 Gait analysis TELEMEDICINE pervasive medicine low cost medicine
下载PDF
Scenario-based Participatory Design for Pervasive Computing
9
作者 刘志强 丁鹏 盛焕烨 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第2期204-210,共7页
Lots of pervasive computing researchers are working on how to realize the user-centered intelligent pervasive computing environment as Mark Weiser figured out.Task abstraction is the fundamentation of configuration fo... Lots of pervasive computing researchers are working on how to realize the user-centered intelligent pervasive computing environment as Mark Weiser figured out.Task abstraction is the fundamentation of configuration for pervasive application.Based on task-oriented and descriptive properties of scenario,a scenario-based participatory design model was proposed to realize the task abstraction.The design model provided users and domain experts a useful mechanism to build the customized applications by separating system model into domain model and design model.In this design model,domain experts,together with users,stakeholders focus on the logic rules(domain model)and programmers work on the implementation(design model).In order to formalize the model description,a human-agent interaction language to transform users' goals and domain rules into executable scenarios was also discussed.An agent platform-describer used to link design and implementation of scenarios was developed to realize the configuration of applications according to different requirements.The demand bus application showed the design process and the usability of this model. 展开更多
关键词 pervasive computing scenario-based design participatory design configurable architecture
下载PDF
Super-service-oriented Architecture in Large-scale Pervasive Computing Environments
10
作者 蔡学明 贺樑 段新娥 《Journal of Donghua University(English Edition)》 EI CAS 2008年第3期269-272,共4页
This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment ... This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment is apt to result in notable service isomorphs. And moreover, as the environment cannot assure the stability of network communication and device services, the situation gets worse. Therefore, it becomes urgent to simplify user operations and let them take full and highly efficient advantage of the environments. Super-Service-Odented Architecture (SSOA) is an Serrice-Otiented Architecture (SOA)-based architecture for service management and organization in peryasive environments. With combining one kind of isomorphic services into a super service, SSOA provides better scalability and quick, convenient service invocations. Also, the complexity and instability of services, and network types are transparent, and system performance is highly promoted under the architecture. 展开更多
关键词 SSOA SOA super services pervasive computing isomor phism
下载PDF
Pervasive Computing Location-aware Model Based on Ontology
11
作者 蒲芳 蔡海滨 +2 位作者 曹奇英 孙道清 李彤 《Journal of Donghua University(English Edition)》 EI CAS 2008年第3期277-281,共5页
In order to integrate heterogeneous location-aware systems into pervasive computing environment,a novel pervasive computing location-aware model based on ontology is presented.A location-aware model ontology(LMO)is co... In order to integrate heterogeneous location-aware systems into pervasive computing environment,a novel pervasive computing location-aware model based on ontology is presented.A location-aware model ontology(LMO)is constructed.The location-aware model has the capabilities of sharing knowledge,reasoning and adjusting the usage policies of services dynamically through a unified semantic location manner.At last,the work process of our proposed location-aware model is explained by an application scenario. 展开更多
关键词 pervasive computing location-aware model ONTOLOGY
下载PDF
Solving the Challenges of Pervasive Computing
12
作者 Syed Muqsit Shaheed Jalil Abbas +1 位作者 Asif Shabbir Fayyaz Khalid 《Journal of Computer and Communications》 2015年第9期41-50,共10页
Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, communications, intellectual properties, information securities, data presentations and web dis-plays to make attraction for ... Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, communications, intellectual properties, information securities, data presentations and web dis-plays to make attraction for human interaction. Pervasive systems have a broad range of applica-tions but it is relatively challenging for pervasive applications to meet emergence into existing physical environment and newly built structure requirements. Due to their interaction to gather information and change the environment via activating devices independently is highlighted. Se-curity of the pervasive devices and applications which control our activities has primary importance and will be destroyed, if the pervasive system operations are not secure. There is a need to improve the security measures for data to travel rapidly, unbroken, unchanged and invisible by deceptive recipients. Pervasive Computing allows users to get information and services access anytime and anywhere but need to discuss issues and solutions to deliver secure information with privacy and trust. Possible solutions for these challenges of Pervasive Computing interaction between human are emphasized. A collection of papers and articles have been collected in order to investigate the previous study of Pervasive Computing interaction and its challenges. Is it possible for us to understand what the scientific world will be close to generate new avenues? Expectations of future bring new openings for user interaction with systems, data, information and the environments in which they live, work and play. 展开更多
关键词 pervasive Computing INTERACTION Human Computer INTERACTION CHALLENGES Security TRUST PRIVACY
下载PDF
Wireless Body Area Networks for Pervasive Healthcare and Smart Environments
13
作者 Victor C.M.Leung Hongke Zhang 《ZTE Communications》 2014年第3期1-2,共2页
Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, a... Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, and body position to be continuously monitored. 展开更多
关键词 WBAN BODY LEACH Wireless Body Area Networks for pervasive Healthcare and Smart Environments
下载PDF
Attention-Deficit/Hyperactivity Disorder in Adults with High-Functioning Pervasive Developmental Disorders in Japan
14
作者 Yasuko Takanashi Hirobumi Mashiko +9 位作者 Hirohide Yokokawa Yoko Kawasaki Shuntaro Itagaki Hiromichi Ishikawa Norihiro Miyashita Yasuaki Hayashi Asako Kudo Kentaro Oga Rieko Matsuura Shin-Ichi Niwa 《Open Journal of Psychiatry》 2014年第4期372-380,共9页
Aims: This study was designed to verify the proportion of Japanese adults with pervasive developmental disorder (PDD) who met the diagnostic criteria (other than E) for attention-deficit/hyperactivity disorder (ADHD) ... Aims: This study was designed to verify the proportion of Japanese adults with pervasive developmental disorder (PDD) who met the diagnostic criteria (other than E) for attention-deficit/hyperactivity disorder (ADHD) in the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR). Furthermore, we examined to what extent adults with PDD think that they exhibit ADHD symptoms. Methods: We developed an original Japanese self-report questionnaire to determine the presence or absence of 18 symptoms from the diagnostic criteria for ADHD in the DSM-IV-TR. We administered the questionnaire to 64 adults with high-functioning PDD (45 men and 19 women) and 21 adults with ADHD (10 men and 11 women), aged 18 to 59 years, with a full-scale intelligence quotient ≥75. Target patients were evaluated for ADHD by their psychiatrists. Results: Twenty-nine (45.3%) adults with PDD also had ADHD. The percentage of these adults who had over six perceived inattention symptoms from the DSM-IV-TR was 96.6%. The percentage of these adults who had over six perceived hyperactivity-impulsivity symptoms was 65.5%. Thirty-five (55.6%) adults with PDD responded that they were aware of having ADHD symptoms at the level of the relevant diagnostic criteria. Conclusions: The present study is the first to examine the frequency of objective and perceived ADHD symptoms in adults with PDD in Japan. Our results show that both objective and perceived ADHD symptoms frequently appear in a large number of adults with PDD. This suggests that it is necessary to attend to concomitant ADHD symptoms in the medical care of adults with PDD. 展开更多
关键词 ADULTS Attention-Deficit/Hyperactivity Disorder (ADHD) High-Functioning pervasive Developmental Disorders (PDD) SELF-REPORT
下载PDF
PERCEPOLIS: Pervasive Cyberinfrastructure for Personalized Learning and Instructional Support
15
作者 Ali R. Hurson Sahra Sedigh 《Intelligent Information Management》 2010年第10期586-596,共11页
This paper describes PERCEPOLIS, an educational platform that leverages technological advances, in particular in pervasive computing, to facilitate personalized learning in higher education, while supporting a network... This paper describes PERCEPOLIS, an educational platform that leverages technological advances, in particular in pervasive computing, to facilitate personalized learning in higher education, while supporting a networked curricular model. Fundamental to PERCEPOLIS is the modular approach to course development. Blended instruction, where students are responsible for perusing certain learning objects outside of class, used in conjunction with the cyberinfrastructure will allow the focus of face-to-face meetings to shift from lecture to active learning, interactive problem-solving, and reflective instructional tasks. The novelty of PERCEPOLIS lies in its ability to leverage pervasive and ubiquitous computing and communication through the use of intelligent software agents that use a student’s academic profile and interests, as well as supplemental information such as his or her learning style, to customize course content. Assessments that gauge the student’s mastery of concepts are used to allow self-paced progression through the course. Furthermore, the cyberinfrastructure facilitates the collection of data on student performance and learning at a resolution that far exceeds what is currently available. We believe that such an infrastructure will accelerate the acquisition of knowledge and skills critical to professional engineering practice, while facilitating the study of how this acquisition comes about, yielding insights that may lead to significant changes in pedagogy. 展开更多
关键词 LEARNING Technology PERSONALIZED LEARNING CYBERINFRASTRUCTURE pervasive Computing.
下载PDF
A Survey of Pervasive Services
16
作者 Liao Jianxin (State Key Lab of Network and Switch Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2008年第1期29-32,共4页
With the technological advances and market development, telecommunications networks and the Internet are converging into one universal network; meanwhile, the services provided by these two kinds of networks are integ... With the technological advances and market development, telecommunications networks and the Internet are converging into one universal network; meanwhile, the services provided by these two kinds of networks are integrating. Pervasive services will meet demands and expectations from all aspects. The topic has become a favorite for research in Beyond Third Generation (B3G), Next Generation Network (NGN) and Next Generation Internet (NGI) fields. The concept of the pervasive services comes from pervasive computation and B3G. Their features include pervasiveness, mobility, transparency, QoS-guarantee, customization, adaptiveness, push, security, easiness, variety and time-to-market. 3GPP, OMA and the B3G research program of the European Union (EU) have conducted a lot of research work about the different features of pervasive services. The current hot topics in the pervasive services research include context awareness and service enabling. 展开更多
关键词 GPP A Survey of pervasive Services
下载PDF
Pervasive Services in New-generation Internet:Mechanisms and Key Technologies
17
作者 Zhang Hongke, Yang Dong, Dong Ping (Next Generation Internet Research Center, School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China) 《ZTE Communications》 2008年第1期39-44,共6页
The original infrastructure of the Internet can no longer meet personalized and diversified demands of current increasing network subscribers. It has exposed many defects and shortcomings. For examples, the mechanism ... The original infrastructure of the Internet can no longer meet personalized and diversified demands of current increasing network subscribers. It has exposed many defects and shortcomings. For examples, the mechanism of using ports to distinguish services is inflexible and dangerous with the emergence of various services; the current Internet architecture does not make use of the close relationship between network resources and services, but simultaneously maintains two processing systems for the resources and services respectively, wasting both subscribers’ time and network resources; the Internet class of services granularity is not fine enough, failing to meet personalized and diversified user demands. In order to solve these problems, this paper discusses the mechanisms and key technologies for pervasive services in the new-generation Internet. The paper focuses on the definition, classification and identifier design of personalized and diversified user services. The service identifier design fulfills the unified identifier and processing of various network services, discovers the close relationship between services and resources, and can offer personalized and diversified services according to users’ demands. 展开更多
关键词 pervasive Services in New-generation Internet FIGURE
下载PDF
Policy Based Self-Adaptive Scheme in Pervasive Computing
18
作者 Jian Quan OUYANG Dian Xi SHI +2 位作者 Bo DING Jin FENG Huai Min WANG 《Wireless Sensor Network》 2009年第1期48-55,共8页
Nowadays, application systems in pervasive computing have to be self-adaptive, which means adapting themselves to dynamic environments. Our aim is to enable systematic development of self-adaptive compo-nent-based app... Nowadays, application systems in pervasive computing have to be self-adaptive, which means adapting themselves to dynamic environments. Our aim is to enable systematic development of self-adaptive compo-nent-based applications. The paper first introduces a novel policy based framework for self-adaptive scheme in pervasive computing. Then the proposed policy ontology and policy language are well expressive and eas-ily extensible to support the design of policy which is based on the Separation of Concerns principle. Fur-thermore, the context-driven event channel decouples the communication between the suppliers and con-sumers for asynchronous communication. The proposed framework can provide both a domain-independent and a flexible self-adaptation solution. 展开更多
关键词 POLICY ONTOLOGY SELF-ADAPTIVE POLICY LANGUAGE pervasive Computing
下载PDF
The Dalai's Pervasive Act Condemned
19
作者 NGOLZHUB 《China's Tibet》 1995年第5期18-18,共1页
The Dalai's Pervasive Act CondemnedTheDalai'sPervasiveActCondemned¥NGOLZHUBWhentheTibetanpeopleareworkinghar... The Dalai's Pervasive Act CondemnedTheDalai'sPervasiveActCondemned¥NGOLZHUBWhentheTibetanpeopleareworkinghardtobuilduptheirec... 展开更多
关键词 ACT The Dalai’s pervasive Act Condemned
下载PDF
A Solution of Data Inconsistencies in Data Integration——Designed for Pervasive Computing Environment 被引量:1
20
作者 王欣 黄林鹏 +2 位作者 章义 徐小辉 陈俊清 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第3期499-508,共10页
New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with incons... New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with inconsistencies is one of the important problems in data integration. In this paper we motivate the problem of data inconsistency solution for data integration in pervasive environments. We define data qualit~ criteria and expense quality criteria for data sources to solve data inconsistency. In our solution, firstly, data sources needing high expense to obtain data from them are discarded by using expense quality criteria and utility function. Since it is difficult to obtain the actual quality of data sources in pervasive computing environment, we introduce fuzzy multi-attribute group decision making approach to selecting the appropriate data sources. The experimental results show that our solution has ideal effectiveness. 展开更多
关键词 pervasive computing data integration data inconsistency group decision making history credibility
原文传递
上一页 1 2 4 下一页 到第
使用帮助 返回顶部