期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
Energy-efficient and security-optimized AES hardware design for ubiquitous computing 被引量:2
1
作者 Chen Yicheng Zou Xuecheng Liu Zhenglin Han Yu Zheng Zhaoxia 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期652-658,共7页
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H... Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost. 展开更多
关键词 encryption and decryption power analysis model inhomogeneous S-Boxes ubiquitous computing advanced encryption standard.
下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
2
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 ubiquitous computing identity authentication mechanism D-S Evidence Theory SPKI/SDSI SECURITY
下载PDF
UCIMssp:Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P 被引量:1
3
作者 孙道清 蒲芳 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第4期475-483,共9页
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconne... Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment. 展开更多
关键词 ubiquitous computing identification mechanism UCIMssp SPKI/SDSI Peer-to-Peer security
下载PDF
An Indoor Ubiquitous Computing Environment Based on Location-awareness 被引量:1
4
作者 蒲芳 孙道清 +2 位作者 曹奇英 蔡海滨 李永宁 《Journal of Donghua University(English Edition)》 EI CAS 2006年第4期76-79,共4页
To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IU... To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA. 展开更多
关键词 ubiquitous computing location awareness middleware.
下载PDF
Assessing Level of Ubiquitous Computing Services for Ubiquitous Business Design 被引量:1
5
作者 KWON Ohbyung 《Journal of Electronic Science and Technology of China》 2004年第3期140-145,共6页
We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network'... We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network' business model because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Moreover, immediate access to ideas, goods, and services will be of greater value than the traditional model of permanent and ponderous possession. This paper illustrates how ubiquitous computing technology can be combined with legacy computer-based information systems, along with thoughts on relevant issues of ubiquitous commerce. We also propose a model for how to assess levels of ubiquitous computing services. 展开更多
关键词 ubiquitous computing service AHP ubiquitous business
下载PDF
LUCA:Lightweight Ubiquitous Computing Architecture
6
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2009年第3期300-308,共9页
Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbe... Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbed. The main attention of this paper was providing a compact and realizable method to apply ubiquitous computing into our daily lives under sufficient secure guarantee. At last,the personal intelligent assistant system was presented to show that this architecture was a suitable and realizable security mechanism in solving the ubiquitous computing problems. 展开更多
关键词 ubiquitous computing ARCHITECTURE TRUST AWARENESS privacy protection SECURITY
下载PDF
Ubiquitous Computing in the Library:Indiana State University Library's Experience
7
作者 Ralph B.Gabbard Judith Tribble +1 位作者 Paul Asay Chris Hayes 《现代图书情报技术》 CSSCI 北大核心 2002年第S1期161-167,共7页
1 Introduction New technologies and other developments haye changedthe information seeking behaviors of the academic communityand the general public.Nowhere is this more evident than inthe exponential growth of the Wo... 1 Introduction New technologies and other developments haye changedthe information seeking behaviors of the academic communityand the general public.Nowhere is this more evident than inthe exponential growth of the World Wide Web and cellularphone usage.Responding to these user needs and newtechnologies,libraries are moving from being InformationWarehouses to becoming Information Portals.Full-text。 展开更多
关键词 年刊 连续出版物 ubiquitous Computing in the Library 《现代图书情报技术》 ACCESS PDA CARD USB
下载PDF
Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for Clustered IoT Driven Ubiquitous Computing System
8
作者 Reda Salama Mahmoud Ragab 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2917-2932,共16页
In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(... In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(UCS).The UCS necessitates heterogeneity,management level,and data transmission for distributed users.Simultaneously,security remains a major issue in the IoT-driven UCS.Besides,energy-limited IoT devices need an effective clustering strategy for optimal energy utilization.The recent developments of explainable artificial intelligence(XAI)concepts can be employed to effectively design intrusion detection systems(IDS)for accomplishing security in UCS.In this view,this study designs a novel Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for IoT Driven Ubiquitous Computing System(BXAI-IDCUCS)model.The major intention of the BXAI-IDCUCS model is to accomplish energy efficacy and security in the IoT environment.The BXAI-IDCUCS model initially clusters the IoT nodes using an energy-aware duck swarm optimization(EADSO)algorithm to accomplish this.Besides,deep neural network(DNN)is employed for detecting and classifying intrusions in the IoT network.Lastly,blockchain technology is exploited for secure inter-cluster data transmission processes.To ensure the productive performance of the BXAI-IDCUCS model,a comprehensive experimentation study is applied,and the outcomes are assessed under different aspects.The comparison study emphasized the superiority of the BXAI-IDCUCS model over the current state-of-the-art approaches with a packet delivery ratio of 99.29%,a packet loss rate of 0.71%,a throughput of 92.95 Mbps,energy consumption of 0.0891 mJ,a lifetime of 3529 rounds,and accuracy of 99.38%. 展开更多
关键词 Blockchain internet of things ubiquitous computing explainable artificial intelligence CLUSTERING deep learning
下载PDF
A Work Service Model of the Ubiquitous Environment Collaboration
9
《Journal of Civil Engineering and Architecture》 2012年第1期44-52,共9页
Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computationa... Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computational technology to support office works, have already affected the practice of companies and organizations. Within this context, this study deals with a work service model of the ubiquitous office environments by understanding human behaviors and works in their workspace. We propose a ubiquitous office model considering the correlation between ubiquitous computing technologies and work services in the office. Two attributes are emphasized, collaboration and mobility, as identifiers for categorizing the work types. The types of work services have variations in the amount of communication and the proportion of working outside of the office. The proposed work service model of the ubiquitous office includes territorial and non-territorial services to enable workers in and out of the office to interact with each other effectively. The findings in this paper would be a theoretical basis for embodying an intelligent office which supports office works efficiently. 展开更多
关键词 ubiquitous office work service model ubiquitous computing context awareness collaboration.
下载PDF
Ubiquitous Computing: Technological Autonomy or Human Autonomy?
10
作者 Zhu Wenxi Wang Guoyu 《Journal of Philosophy Study》 2018年第5期217-223,共7页
With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For ins... With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For instance, people can use their electronic devices at hand (e.g., Google glasses or Apple watch) to access information they need. However, this '~ubiquitous" service poses challenges to human autonomy. Based on the analysis of the features of pervasive computing, this paper points out the ambiguity between the subject and object of ubiquitous computing and shows technological interventions can affect human autonomy at three levels: technology addiction, the degradation of human capacities, and the reversal of the end and the means caused by the fuzziness of ma^-machine interface. In other words, ubiquitous computing gives people unprecedented convenience, and it also deprives of their freedom. According to Kant's Theory of Freedom, this article reflects on the relationship between the autonomy of technology and that of humankind. 展开更多
关键词 ubiquitous computing technological autonomy human autonomy FREEDOM
下载PDF
Improving Vehicular Mobility in Urban Traffic Using Ubiquitous Computing
11
作者 J. A. Castán S. Ibarra Martínez +3 位作者 J. Laria Menchaca M. G. Treviño Berrones J. Pérez Cobos E. Castán Rocha 《Journal of Computer and Communications》 2016年第10期57-62,共6页
The paper introduces a novel paradigm to use ubiquitous computing in urban traffic control as a methodology to include the benefits of considering physical elements implicated in the environment. This promising idea a... The paper introduces a novel paradigm to use ubiquitous computing in urban traffic control as a methodology to include the benefits of considering physical elements implicated in the environment. This promising idea arises from previous results in the literature, where ubiquitous computing achieves significant and promising results in diverse scenarios. Some works in the state-of- the-art clearly state that traditional traffic light signals are not capable of offering higher service levels when they should control the vehicular mobility because of different constraints. In this sense, the paper proposes an adaptation of the main ideas of ubiquitous computing as a metaphor to facilitate the interaction between users and traffic infrastructures in order to improve the users’ experience on the road. 展开更多
关键词 ubiquitous Computing Urban Traffic Control Intelligent Transport System
下载PDF
Strategic Implications for E-Business Organizations in the Ubiquitous Computing Economy
12
作者 YUM Jihwan KIM Hyoungdo 《Journal of Electronic Science and Technology of China》 2004年第3期33-38,共6页
The ubiquitous economy brings both pros and cons for the organizations. The third space emerged by the development of ubiquitous computing generates new concept of community. The community is tightly coupled with peop... The ubiquitous economy brings both pros and cons for the organizations. The third space emerged by the development of ubiquitous computing generates new concept of community. The community is tightly coupled with people, products, and systems. Organizational strategies need to be reshaped for the changing environment in the third space and community. Organizational structure also needs to change for community serving organization. Community serving concept equipped with the standardized technology will be essential. One of the key technologies, RFID service will play a key role to acknowledge identification and services required. When the needs for sensing the environment increase, technological requirement such as the ubiquitous sensor network (USN) will be critically needed.. 展开更多
关键词 ubiquitous economy ubiquitous computing management strategy
下载PDF
Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home 被引量:1
13
作者 Anusha Vangala Ashok Kumar Das +1 位作者 YoungHo Park Sajjad Shaukat Jamal 《Computers, Materials & Continua》 SCIE EI 2022年第8期3549-3570,共22页
The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by ... The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by the user who is outside the home might sound fancy,but it comes with a lot of potential threats.There can be many attackers who will be trying to take advantage of this.So,there is a need for designing a secure scheme whichwill be able to distinguish among genuine/authorized users of the system and attackers.And knowing about the details of when and what IoT devices are used by the user,the attacker can trace the daily activities of user and can plan an attack accordingly.Thus,the designed security scheme should guarantee confidentiality,anonymity and un-traceability.Most of the schemes proposed in the literature are either non-blockchain based which involves inherent problems of storing data in a single-server or assuming weaker attack models.In this work,we propose a novel scheme based on blockchain technology,assuming a stronger Canetti and Krawczyk(CK)-threat model.Through the formal and informal security,and comparative analysis,we show that the proposed scheme provides a superior security and more functionality features,with less communication cost and comparable computational cost as compared to other competent schemes.Moreover,the blockchain based simulation study on the proposed scheme has been conducted to show its feasibility in real-life application. 展开更多
关键词 Internet of things(IoT) smart home ubiquitous computing blockchain SECURITY
下载PDF
Interactive navigation system in smart phone with vibration feedback 被引量:1
14
作者 YU He GU Wen-zhao +5 位作者 SUN Ming-hui QIN Gui-he WANG Li-min PAN Zhi-geng ZHAO Wei SUN Xiao-ying 《Journal of Beijing Institute of Technology》 EI CAS 2016年第3期375-381,共7页
The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous co... The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous computing.And it's an important way to ease the traffic congestion of the city.Intelligent navigation system is an important embodiment of intelligent transportation.So far,there have been many kinds of traditional vehicle navigation systems.But when they are in use,drivers will pay extra attention to get the path information through the visual and auditory cues.It's dangerous for drivers when they drive.At the same time,with the development of science and technology,mobile navigation system has been widely used.The mobile navigation system is a comprehensive system which relates to the field of mobile communication and GPS.The objective of this paper is to develop a smart phone and interaction navigation system based on the feedback of vibration and micro programmed control unit(MCU)control system.When drivers are in the driving process,the new navigation system can avoid the same sense of multiple tasks,which makes each sensory focus on only one independent task.Through the analysis,the system is demonstrated to improve the driving safety. 展开更多
关键词 vibration feedback smart navigation Android platform ubiquitous computing
下载PDF
Context-aware Workflow Model for Supporting Composite Workflows 被引量:1
15
作者 Jong-sun CHOI Jae-young CHOI Yong-yun CHO 《Journal of Measurement Science and Instrumentation》 CAS 2010年第2期161-165,共5页
In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workf... In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workflows in order to get mare large-scale or complicated workflow. They only provide a simple workflow model, not a composite workflow model. In this paper, the autorhs propose a context-aware workflow model to support composite workflows by expanding the patterns of the existing context-aware wrY:flows, which support the basic woddlow patterns. The suggested workflow model of. fers composite workflow patterns for a context-aware workflow, which consists of various flow patterns, such as simple, split, parallel flows, and subflow. With the suggested model, the model can easily reuse few of existing workflows to make a new workflow. As a result, it can save the development efforts and time of context-aware workflows and increase the workflow reusability. Therefore, the suggested model is expected to make it easy to develop applications related to context-aware workflow services on ubiquitous computing environments. 展开更多
关键词 ubiquitous computing context-aware workfiow workflow model multiple workflows
下载PDF
Enhancing the Prediction of User Satisfaction with Metaverse Service Through Machine Learning
16
作者 Seon Hong Lee Haein Lee Jang Hyun Kim 《Computers, Materials & Continua》 SCIE EI 2022年第9期4983-4997,共15页
Metaverse is one of the main technologies in the daily lives of several people,such as education,tour systems,and mobile application services.Particularly,the number of users of mobile metaverse applications is increa... Metaverse is one of the main technologies in the daily lives of several people,such as education,tour systems,and mobile application services.Particularly,the number of users of mobile metaverse applications is increasing owing to the merit of accessibility everywhere.To provide an improved service,it is important to analyze online reviews that contain user satisfaction.Several previous studies have utilized traditional methods,such as the structural equation model(SEM)and technology acceptance method(TAM)for exploring user satisfaction,using limited survey data.These methods may not be appropriate for analyzing the users of mobile applications.To overcome this limitation,several researchers perform user experience analysis through online reviews and star ratings.However,some online reviews occasionally have inconsistencies between the star rating and the sentiment of the text.This variation disturbs the performance of machine learning.To alleviate the inconsistencies,Valence Aware Dictionary and sEntiment Reasoner(VADER),which is a sentiment classifier based on lexicon,is introduced.The current study aims to build a more accurate sentiment classifier based on machine learning with VADER.In this study,five sentiment classifiers are used,such as Naïve Bayes,K-Nearest Neighbors(KNN),Logistic Regression,Light Gradient Boosting Machine(LightGBM),and Categorical boosting algorithm(Catboost)with three embedding methods(Bag-of-Words(BoW),Term Frequency-Inverse Document Frequency(TF-IDF),Word2Vec).The results show that classifiers that apply VADER outperform those that do not apply VADER,excluding one classifier(Logistic Regression with Word2Vec).Moreover,LightGBM with TF-IDF has the highest accuracy 88.68%among other models. 展开更多
关键词 Metaverse ubiquitous computing user satisfaction online review big data VADER machine learning natural language processing
下载PDF
A CAWL handler for context-aware composite workflow services
17
作者 Yongseong Cho Jongsun Choi Jaeyoung Choi 《Journal of Measurement Science and Instrumentation》 CAS 2013年第4期370-375,共6页
In distributed computing environment,workflow technologies have been continuously developed.Recently,there is an attempt to apply these technologies to context-aware services in ubiquitous computing environment.The mi... In distributed computing environment,workflow technologies have been continuously developed.Recently,there is an attempt to apply these technologies to context-aware services in ubiquitous computing environment.The middleware,which offers services in such environments,should support the automation services suited for the user using various types of situational information around the user.In this paper,based on context-aware workflow language(CAWL),we propose a CAWL based composite workflow handler for supporting composite workflow services,which can integrate more than two service flows and handle them.The test results shows that the proposed CAWL handler can provide the user with the composite workflow services to cope with various demands on a basis of a scenario document founded on CAWL. 展开更多
关键词 ubiquitous computing CONTEXT-AWARE composite workflow context-aware workflow language (CAWL) handlerDocument code:AArticle ID:1674-8042(2013)04-0370-06
下载PDF
Experience-Based Access Control in UbiComp: A New Paradigm
18
作者 Nalini A. Mhetre Arvind V. Deshpande Parikshit N. Mahalle 《Journal of Computer and Communications》 2022年第1期133-157,共25页
Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and co... Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and computing capabilities in everyday objects to make them effectively communicate, share resources, and perform useful tasks. The safety of resources is a serious problem. As a result, authorization and access control in UbiComp is a significant challenge. Our work presents experience as an outcome of history (HI), reliability (RL), transitivity (TR), and Ubiquity (UB). This experience model is easily adaptable to a variety of self-regulating context-aware access control systems. This paper proposes a framework for Experience-Based Access Control (EX-BAC) with all major services provided by the model. EX-BAC extends attribute-based access control. It uses logical device type and experience as context parameters for policy design. When compared with the state-of-the-art, EX-BAC is efficient with respect to response time. 展开更多
关键词 Access Control Experience-Based Access Control Experience Model History Reliability TRANSITIVITY ubiquitous Computing Ubiquity
下载PDF
Intermediate Common Model—The Solution to Separate Concerns and Responsiveness in Dynamic Context-Aware System
19
作者 Gaetan Rey The Can Do +2 位作者 Jean-Yves Tigli Stéphane Lavirotte Nhan Le Thanh 《Journal of Computer and Communications》 2017年第4期44-59,共16页
Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper... Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper provides a new architecture for context management that tries to solve both problems. This approach is also based on the analysis and synthesis of context-aware frameworks proposed in literature. Our solution is focus on a separation of contextual concerns at the design phase and preserves it as much as possible at runtime. For this, we introduce the notion of independent views that allow designers to focus on their domain of expertise. At runtime, the architecture is splitted in 2 independent levels of adaptation. The highest is in charge of current context identification and manages each view independently. The lowest handles the adaptation of the application according to the rules granted by the previous level. 展开更多
关键词 MIDDLEWARE ubiquitous Computing Context-Aware System Software Composition Software Architecture
下载PDF
Adaptive service configuration approach for quality of service management in ubiquitous computing environments 被引量:1
20
作者 Yong ZHANG Shen-sheng ZHANG Song-qiao HAN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第7期964-975,共12页
Mobility and resource-limitedness pose challenging issues to service configuration for quality of service (QoS) management in ubiquitous computing environments. Previous configuration approaches, such as static resour... Mobility and resource-limitedness pose challenging issues to service configuration for quality of service (QoS) management in ubiquitous computing environments. Previous configuration approaches, such as static resource reservation, dynamic resource allocation and single service composition are not valid in the environments. In this study, we present an adaptive service configuration approach. Firstly, we reduce the dynamic configuration process to a control model which aims to achieve the variation of critical QoS on minimal level with less resource cost. Secondly, to deal with different QoS variations, we design two configuration strategies—service chain reconfiguration and QoS parameter adjustment—and implement them based on fuzzy logic control theory. Finally, a configuration algorithm is developed to flexibly employ the two configuration strategies in tune with the error of critical QoS in configuration process. The results of simulation experiments suggest that our approach outper- forms existing configuration approaches in both QoS improvement and resource utilization. 展开更多
关键词 Service configuration ubiquitous computing (UbiComp) Quality of service (QoS) Fuzzy logic control
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部