• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 62
  • 28
  • 4
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 116
  • 116
  • 48
  • 38
  • 31
  • 24
  • 23
  • 23
  • 22
  • 21
  • 19
  • 17
  • 17
  • 17
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Delegation, Arbitration and High-Level Service Discovery as Key Elements of a Software Infrastructure for Pervasive Computing

Gajos, Krzysztof, Shrobe, Howard 1 June 2003 (has links)
The dream of pervasive computing is slowly becoming a reality. A number of projects around the world are constantly contributing ideas and solutions that are bound to change the way we interact with our environments and with one another. An essential component of the future is a software infrastructure that is capable of supporting interactions on scales ranging from a single physical space to intercontinental collaborations. Such infrastructure must help applications adapt to very diverse environments and must protect people's privacy and respect their personal preferences. In this paper we indicate a number of limitations present in the software infrastructures proposed so far (including our previous work). We then describe the framework for building an infrastructure that satisfies the abovementioned criteria. This framework hinges on the concepts of delegation, arbitration and high-level service discovery. Components of our own implementation of such an infrastructure are presented.
2

The Research on Personal Workflow Systems in Support of Pervasive Computing

Chen, Ya-Fang 9 July 2001 (has links)
Wireless devices and their services are becoming increasingly important for many people¡¦s lives. The services provided by these mobile devices enable users to work without space or time limitation. However, while these applications allow users to record and retrieve information about tasks and data, the relationships between tasks and data are left out. However, we have observed that many of people¡¦s daily activities are not independent, and they are likely to be process-oriented. In this thesis, we develop a personal workflow model that is used to capture the requirements of personal processes. This model also includes a set of primitive operations that can be used to express queries on personal processes. The algebraic properties about these operations and how to optimize queries comprised of these operations are studied. Based on these operations, we propose an SQL-like query language to ease users¡¦ query expressions. Besides, to actively remind the mobilers the right things to do at the right place and the right time, we propose a rule model that resembles event-condition-action (ECA) rules proposed for active database systems. All of the proposed features except for the rule model are implemented on Palm Pilot PDAs.
3

An Adaptable Context-Management Framework for Pervasive Computing

Zebedee, Jared A. 9 September 2008 (has links)
Pervasive Computing presents an exciting realm where intelligent devices interact within the background of our environments to create a more intuitive experience for their human users. We demonstrate enabling context-awareness through our creation of a standardized context-management framework. Our framework moves towards device intelligence by supporting context-awareness. Context-awareness is what gives devices the ability to understand and exchange information about each other. Context information is used to determine device purpose, capabilities, location, current state, and other properties. Several elements are required in order to achieve context-awareness, including a suitable ontology, a context model, and a middleware platform upon which to implement the context model. In this work, a complete context-management framework is presented and evaluated. We propose our own ontology specification and context model, and implement a middleware using the Web Services Distributed Management (WSDM) interoperability standard. Thesis (Master, Computing) -- Queen's University, 2008-09-09 14:51:30.242
4

An agent-based service-oriented approach to evolving legacy software systems into a pervasive computing environment

Liu, Ruimin 2010 (has links)
This thesis focuses on an Agent-Based Service-Oriented approach to evolving legacy system into a Pervasive Computing environment. The methodology consists of multiple phases: using reverse engineering techniques to comprehend and decompose legacy systems, employing XML and Web Services to transform and represent a legacy system as pervasive services, and integrating these pervasive services into pervasive computing environments with agent based integration technology. A legacy intelligent building system is used as a case study for experiments with the approach, which demonstrates that the proposed approach has the ability to evolve legacy systems into pervasive service environments seamlessly. Conclusion is drawn based on analysis and further research directions are also discussed.
5

A common model for ubiquitous computing

Blackstock, Michael Anthony 2008 (has links)
Ubiquitous computing (ubicomp) is a compelling vision for how people will interact with multiple computer systems in the course of their daily lives. To date, practitioners have created a variety of infrastructures, middleware and toolkits to provide the flexibility, ease of programming and the necessary coordination of distributed software and hardware components in physical spaces. However, to-date no one approach has been adopted as a default or de-facto standard. Consequently the field risks losing momentum as fragmentation occurs. In particular, the goal of ubiquitous deployments may stall as groups deploy and trial incompatible point solutions in specific locations. In their defense, researchers in the field argue that it is too early to standardize and that room is needed to explore specialized domain-specific solutions. In the absence of an agreed upon set of standards, we argue that the community must consider a methodology that allows systems to evolve and specialize, while at the same time allowing the development of portable applications and integrated deployments that work between between sites. To address this we studied the programming models of many commercial and research ubicomp systems. Through this survey we gained an understanding of the shared abstractions required in a core programming model suitable for both application portability and systems integration. Based on this study we designed an extensible core model called the Ubicomp Common Model (UCM) to describe a representative sample of ubiquitous systems to date. The UCM is instantiated in a flexible and extensible platform called the Ubicomp Integration Framework (UIF) to adapt ubicomp systems to this model. Through application development and integration experience with a composite campus environment, we provide strong evidence that this model is adequate for application development and that the complexity of developing adapters to several representative systems is not onerous. The performance overhead introduced by introducing the centralized UIF between applications and an integrated system is reasonable. Through careful analysis and the use of well understood approaches to integration, this thesis demonstrates the value of our methodology that directly leverages the significant contributions of past research in our quest for ubicomp application and systems interoperability.
6

The Weakly Identifying System for Doorway Monitoring

Jenkins, Christopher James 2007 (has links)
The System Architecture for Tracking Individuals (SAFTI) is an indoor person location tracking system designed for use in the field of pervasive computing. SAFTI provides location tracking in environments where cameras are too privacy invasive, where tracking devices are too costly, insecure or inconvenient, and where usability is a high priority. While many location tracking systems satisfy each of these constraints individually, SAFTI satisfies all three constraints simultaneously. Upon entering and exiting SAFTI buildings, users submit identification credentials. Once inside the building, using SAFTI is effortless - simply passing through doorways is sufficient for supplying SAFTI with the information it needs to perform location tracking. An integral part of SAFTI is the Weakly Identifying System for Doorway Monitoring (WISDOM). These instrumented doorways contain a variety of infrared, ultrasonic and pressure sensors that detect the direction of passage and measure each user's body size and shape. We quantify the measurement and identification accuracy of WISDOM by analyzing data collected from a user study containing 530 passes through a WISDOM prototype from 10 different subjects. We combine the results from WISDOM with large publicly available anthropometric databases to evaluate how accurately SAFTI performs location tracking with respect to building size, density of occupants, and matching algorithm used. Dissertation
7

A common model for ubiquitous computing

Blackstock, Michael Anthony 2008 (has links)
Ubiquitous computing (ubicomp) is a compelling vision for how people will interact with multiple computer systems in the course of their daily lives. To date, practitioners have created a variety of infrastructures, middleware and toolkits to provide the flexibility, ease of programming and the necessary coordination of distributed software and hardware components in physical spaces. However, to-date no one approach has been adopted as a default or de-facto standard. Consequently the field risks losing momentum as fragmentation occurs. In particular, the goal of ubiquitous deployments may stall as groups deploy and trial incompatible point solutions in specific locations. In their defense, researchers in the field argue that it is too early to standardize and that room is needed to explore specialized domain-specific solutions. In the absence of an agreed upon set of standards, we argue that the community must consider a methodology that allows systems to evolve and specialize, while at the same time allowing the development of portable applications and integrated deployments that work between between sites. To address this we studied the programming models of many commercial and research ubicomp systems. Through this survey we gained an understanding of the shared abstractions required in a core programming model suitable for both application portability and systems integration. Based on this study we designed an extensible core model called the Ubicomp Common Model (UCM) to describe a representative sample of ubiquitous systems to date. The UCM is instantiated in a flexible and extensible platform called the Ubicomp Integration Framework (UIF) to adapt ubicomp systems to this model. Through application development and integration experience with a composite campus environment, we provide strong evidence that this model is adequate for application development and that the complexity of developing adapters to several representative systems is not onerous. The performance overhead introduced by introducing the centralized UIF between applications and an integrated system is reasonable. Through careful analysis and the use of well understood approaches to integration, this thesis demonstrates the value of our methodology that directly leverages the significant contributions of past research in our quest for ubicomp application and systems interoperability.
8

MobiShare : mobile computing with no strings attached

Castillo, Jason Moses 2013 (has links)
In today’s world, technology is growing at a fast rate compared at other times. Sales have increased in the smart phone market, which has created new opportunities in pervasive computing. In pervasive computing, nodes enter and leave a network at any time. Within the network, nodes can transfer data to other nodes. The information is not retained in any static location such as a server. The mobile infrastructure requires a way to handle all the information in a dynamic way. The use of a centralized server in a mobile environment creates deterioration in the performance of obtaining information. The main goal of this paper is to provide data persistence using a “substrate” that is inherently not persistent. The data will be stored within the network for availability to all users. Saving data within a network would provide a means to obtain any type of information without relying on the source of where the data came from in the network. Users would also be able to continue downloading where they left off when they return to the network. Consider an environment where people can share music or books. For example, say that John Doe was searching for a particular song to download and in the network Jane has the song that was requested. John decides to download the song without knowing that it is from Jane. Then John decides to leave the network and the download stops. Whenever John rejoins the network the download of his song will continue where he left off, and his ability to access the information will not depend whether or not Jane is present in the network. John may retrieve the file from any other user who has the exact same file. The requested information that the user queries in a search engine will be stored as a metadata within the network, either by other nodes or a temporary server. This allows data to be obtained without relying on the "main user" or creator of the data to be present in the network. The users would also be able to retrieve the data at multiple times. text
9

Improving the Selection of Surrogates During the Cold-Start Phase of a Cyber Foraging Application to Increase Application Performance

Kowalczk, Brian 31 August 2014 (has links)
Mobile devices are generally less powerful and more resource constrained than their desktop counterparts are, yet many of the applications that are of the most value to users of mobile devices are resource intensive and difficult to support on a mobile device. Applications such as games, video playback, image processing, voice recognition, and facial recognition are resource intensive and often exceed the limits of mobile devices. Cyber foraging is an approach that allows a mobile device to discover and utilize surrogate devices present in the local environment to augment the capabilities of the mobile device. Cyber foraging has been shown to be beneficial in augmenting the capabilities of mobile devices to conserve power, increase performance, and increase the fidelity of applications. The cyber foraging scheduler determines what operation to execute remotely and what surrogate to use to execute the operation. Virtually all cyber foraging schedulers in use today utilize historical data in the scheduling algorithm. If historical data about a surrogate is unavailable, execution history must be generated before the scheduler's algorithm can utilize the surrogate. The period between the arrival time of a surrogate and when historical data become available is called the cold-start state. The cold-start state delays the utilization of potentially beneficial surrogates and can degrade system performance. The major contribution of this research was the extension of a historical-based prediction algorithm into a low-overhead estimation-enhanced algorithm that eliminated the cold-start state. This new algorithm performed better than the historical and random scheduling algorithms in every operational scenario. The four operational scenarios simulated typical use-cases for a mobile device. The scenarios simulated an unconnected environment, an environment where every surrogate was available, an environment where all surrogates were initially unavailable and surrogates joined the system slowly over time, and an environment where surrogates randomly and quickly joined and departed the system. One future research possibility is to extend the heuristic to include storage system I/O performance. Additional extensions include accounting for architectural differences between CPUs and the utilization of Bayesian estimates to provide metrics based upon performance specifications rather than direct
10

A common model for ubiquitous computing

Blackstock, Michael Anthony 2008 (has links)
Ubiquitous computing (ubicomp) is a compelling vision for how people will interact with multiple computer systems in the course of their daily lives. To date, practitioners have created a variety of infrastructures, middleware and toolkits to provide the flexibility, ease of programming and the necessary coordination of distributed software and hardware components in physical spaces. However, to-date no one approach has been adopted as a default or de-facto standard. Consequently the field risks losing momentum as fragmentation occurs. In particular, the goal of ubiquitous deployments may stall as groups deploy and trial incompatible point solutions in specific locations. In their defense, researchers in the field argue that it is too early to standardize and that room is needed to explore specialized domain-specific solutions. In the absence of an agreed upon set of standards, we argue that the community must consider a methodology that allows systems to evolve and specialize, while at the same time allowing the development of portable applications and integrated deployments that work between between sites. To address this we studied the programming models of many commercial and research ubicomp systems. Through this survey we gained an understanding of the shared abstractions required in a core programming model suitable for both application portability and systems integration. Based on this study we designed an extensible core model called the Ubicomp Common Model (UCM) to describe a representative sample of ubiquitous systems to date. The UCM is instantiated in a flexible and extensible platform called the Ubicomp Integration Framework (UIF) to adapt ubicomp systems to this model. Through application development and integration experience with a composite campus environment, we provide strong evidence that this model is adequate for application development and that the complexity of developing adapters to several representative systems is not onerous. The performance overhead introduced by introducing the centralized UIF between applications and an integrated system is reasonable. Through careful analysis and the use of well understood approaches to integration, this thesis demonstrates the value of our methodology that directly leverages the significant contributions of past research in our quest for ubicomp application and systems interoperability. Science, Faculty of Computer Science, Department of Graduate

Page generated in 0.0865 seconds