• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 57
  • 53
  • 8
  • 5
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 155
  • 155
  • 59
  • 50
  • 48
  • 46
  • 38
  • 26
  • 26
  • 24
  • 23
  • 20
  • 18
  • 18
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Easing software development for pervasive computing environments

Stovall, Andrew Erich 03 June 2010 (has links)
In recent years pervasive computing has enjoyed an amazing growth in both research and commercial fields. Not only have the number of available techniques and tools expanded, but the number of actual deployments has been underwhelming. With this growth however, we are also experiencing a divergence of software interfaces, languages, and techniques. This leads to an understandably confusing landscape which needlessly burdens the development of applications. It is our sincere hope that through the use of specialized interfaces, languages, and tools, we can make pervasive computing environments more approachable and efficient to software developers and thereby increase the utility and value of pervasive computing applications. In this dissertation, we present a new method for creating and managing the long-term conversations between peers in pervasive computing environments. The Application Sessions Model formally describes these conversations and specifies techniques for managing them over their lifetimes. In addition to these descriptions, this dissertation presents a prototype implementation of the model and results from its use for realistic scenarios. To address the Application Sessions Model's unique needs for resource discovery in pervasive computing environments, we also present the Evolving Tuples Model. This model is also formally defined in this dissertation and practical examples are used to clarify its features. A prototype for both sensor hardware and software simulation of this model is described along with results characterizing the behavior of the model. The models, prototypes, and evaluations of both models presented here form the basis of a new and interesting line of research into support structures for pervasive computing application development. / text
82

Context Awareness & Pervasive Computing: Arquitectura lógica de un sistema perceptivo al contexto de un usuario

Barrientos, Alfredo, Calderón, Julissa E., Mujica, Stephanie 07 1900 (has links)
Los Sistemas Perceptivos del Contexto son capaces de reconocer y anticipar proactivamente a necesidades próximas del usuario teniendo en cuenta intereses, ubicación y proximidad, incluso sin necesidad de comunicárselo de manera explícita. Esto gracias al aprovechamiento de las redes sociales como la herramienta de “Inteligencia de Negocios” que permitirá no sólo conectar a los consumidores con las marcas sino también para entender a los clientes finales y con ello desarrollar productos y servicios especializados. Context Awareness se apoya de los Sistemas de Posicionamiento Global (GSP) quienes facilitan servicios basados en la ubicación del usuario para la creación de soluciones contextuales. Diversas arquitecturas son propuestas para el desarrollo de soluciones contextuales sin embargo carecen de ubicuidad, lo que limita la aplicabilidad de las mismas. Este estudio propone una arquitectura lógica para un Sistema Perceptivo del Contexto que permita agilizar la fase de desarrollo reflejando los niveles de dependencia entre componentes hardware y software. A modo validación se proponen escenarios aplicativos que consumen los servicios y dominios propuestos en la arquitectura con ayuda del procesamiento de los sensores y dispositivos inteligentes del mercado móvil. De esta manera, el estudio mejora el desarrollo de los Sistemas Inteligentes. / Los Sistemas Perceptivos del Contexto son capaces de reconocer y anticipar proactivamente a necesidades próximas del usuario teniendo en cuenta intereses, ubicación y proximidad, incluso sin necesidad de comunicárselo de manera explícita. Esto gracias al aprovechamiento de las redes sociales como la herramienta de “Inteligencia de Negocios” que permitirá no sólo conectar a los consumidores con las marcas sino también para entender a los clientes finales y con ello desarrollar productos y servicios especializados. Context Awareness se apoya de los Sistemas de Posicionamiento Global (GSP) quienes facilitan servicios basados en la ubicación del usuario para la creación de soluciones contextuales. Diversas arquitecturas son propuestas para el desarrollo de soluciones contextuales sin embargo carecen de ubicuidad, lo que limita la aplicabilidad de las mismas. Este estudio propone una arquitectura lógica para un Sistema Perceptivo del Contexto que permita agilizar la fase de desarrollo reflejando los niveles de dependencia entre componentes hardware y software. A modo validación se proponen escenarios aplicativos que consumen los servicios y dominios propuestos en la arquitectura con ayuda del procesamiento de los sensores y dispositivos inteligentes del mercado móvil. De esta manera, el estudio mejora el desarrollo de los Sistemas Inteligentes.
83

Intégration de politiques de sécurité dans les systèmes ubiquitaires / Embedding security policies into pervasive computing systems

Liu, Pengfei 17 January 2013 (has links)
Lors du développement des applications ubiquitaires, il est essentiel de définir des politiques de sécurité et de développerdes mécanismes de sécurité pour assurer la confidentialité et l’intégrité des applications. De nombreux langages de spécification de politiques se concentrent uniquement sur leur puissance d’expression. Les défis émergents dans les systèmes ubiquitaires ne peuvent pas être résolus par ces approches. Par exemple, la sensibilité au contexte est un élément central des systèmes ubiquitaires. Les approches existantes tiennent rarement compte des informations contextuelles dans leurs langages. Cette thèse propose une approche générative pour spécifier et implanter les politiques de sécurité dans les applications ubiquitaires. Pour définir une politique de sécurité, nous proposons un langage de spécification qui tient compte des informations contextuelles. Il permet aux développeurs de spécifier les règles de la politique et les entités requises (e.g. la description spatiale, les rôles, le contexte). Les politiques sont implémentés par des systèmes de réécriture, ce qui offre une grande puissance de vérification. Pour appliquer une politique, nous proposons une architecture qui intègre les concepts importants des politiques de sécurité (sujet, contexte, objet) dans des applications ubiquitaires. Pour mettre en oeuvre notre approche, nous avons enrichi une approche existante pour le développement des applications ubiquitaires. La spécification de la politique de sécurité et la description de l’application ubiquitaire enrichie sont utilisées pour générer un canevas de programmation qui facilite l’implémentation des mécanismes de sécurité, tout en séparant les aspects sécurités de la logique applicative. / When developing pervasive computing applications, it is critical to specify security policies and develop security mechanisms to ensure the confidentiality and integrity of the applications. Numerous policy specification languages only focus on their expressive power. The emerging challenges in pervasive computing systems can not be fulfilled by these approaches. For instance, context awareness is a central aspect of pervasive computing systems. Existing approaches rarely consider context information in their language.This thesis proposes a generative approach dedicated to specifying and enforcing security policies in pervasive computingapplications. To specify a policy, we propose a context-aware policy specification language which helps developers to specify policy rules and required entities (e.g. spatial description, roles, context information). Policies are implemented by term rewriting systems which offers great verification power. To enforce a policy, we propose an architecture that embeds important concepts of security policies (subject, object, security related context) into pervasive computing applications. To apply our approach, we enriched an existing approach which is dedicated to develop pervasive computing applications. Based on the policy specification and the enriched pervasive computing application descriptions, a dedicated programming framework is generated. This framework guides the implementation and raises the level of abstraction which can reduce the workloads of developers.
84

Abordagem semântica aplicada ao gerenciamento de dados em redes de sensores sem fio. / Semantic approach to the management of data from the wireless sensor network.

Paredes Aguilar, Jenny Crescencia 07 July 2008 (has links)
Nos últimos anos, o volume de dados e de informações disponíveis pelas RSSF cresceu consideravelmente por ser uma tecnologia que permite o desenvolvimento de aplicações em diversos tipos de ambientes (pervasivos, ubíquos, ambientes controlados e de difícil acesso), fazendo com que a preocupação em gerenciar esse conteúdo se tornasse maior. Dentre as propostas apresentadas, um grande número utiliza ontologias como forma de organizar e categorizar dados; existem duas questões chaves na gerência de dados nas redes de sensores sem fio: o armazenamento de dados e o processamento da consulta. O presente trabalho propõe uma abordagem semântica para o gerenciamento dos dados dinâmicos e estáticos da rede, oferecendo um serviço de metadados sobre as RSSF e suas aplicações; esta técnica baseia-se na construção de ontologias que permitem escalabilidade, incremento de eficiência das atividades do ambiente e reusabilidade. Verificou-se mediante testes realizados baseados em consultas sobre a ontologia que o modelo proposto é apropriado, e que a busca baseada em semântica resulta na obtenção de dados das RSSF de forma mais adequada, quanto comparada com as abordagens tradicionais. / In the recent years, the volume of data available from wireless sensor networks (WSN) has increased considerably. WSN is a technology that allows the development of applications in various types of environments (pervasives, Ubiquitous, controlled and with difficult access environment), doing that concern for content managing is greater. Among the proposals, many use ontologies as a way to organize and categorize data; there are two key issues in data management in WSN: data storage and query processing. The present work proposes a semantic approach to the management of dynamic and static data from the network, providing a metadata service on WSN and its applications; this technique is based on the construction of ontologies that allows scalability, enhancement of efficiency in the activities of the environment and reusability. It was verified by means of tests based on querys on the ontology that the proposed model is appropriate, and that the search based on semantics provided retrieval of data from WSN more adequately, as compared with traditional approaches.
85

Abordagem semântica aplicada ao gerenciamento de dados em redes de sensores sem fio. / Semantic approach to the management of data from the wireless sensor network.

Jenny Crescencia Paredes Aguilar 07 July 2008 (has links)
Nos últimos anos, o volume de dados e de informações disponíveis pelas RSSF cresceu consideravelmente por ser uma tecnologia que permite o desenvolvimento de aplicações em diversos tipos de ambientes (pervasivos, ubíquos, ambientes controlados e de difícil acesso), fazendo com que a preocupação em gerenciar esse conteúdo se tornasse maior. Dentre as propostas apresentadas, um grande número utiliza ontologias como forma de organizar e categorizar dados; existem duas questões chaves na gerência de dados nas redes de sensores sem fio: o armazenamento de dados e o processamento da consulta. O presente trabalho propõe uma abordagem semântica para o gerenciamento dos dados dinâmicos e estáticos da rede, oferecendo um serviço de metadados sobre as RSSF e suas aplicações; esta técnica baseia-se na construção de ontologias que permitem escalabilidade, incremento de eficiência das atividades do ambiente e reusabilidade. Verificou-se mediante testes realizados baseados em consultas sobre a ontologia que o modelo proposto é apropriado, e que a busca baseada em semântica resulta na obtenção de dados das RSSF de forma mais adequada, quanto comparada com as abordagens tradicionais. / In the recent years, the volume of data available from wireless sensor networks (WSN) has increased considerably. WSN is a technology that allows the development of applications in various types of environments (pervasives, Ubiquitous, controlled and with difficult access environment), doing that concern for content managing is greater. Among the proposals, many use ontologies as a way to organize and categorize data; there are two key issues in data management in WSN: data storage and query processing. The present work proposes a semantic approach to the management of dynamic and static data from the network, providing a metadata service on WSN and its applications; this technique is based on the construction of ontologies that allows scalability, enhancement of efficiency in the activities of the environment and reusability. It was verified by means of tests based on querys on the ontology that the proposed model is appropriate, and that the search based on semantics provided retrieval of data from WSN more adequately, as compared with traditional approaches.
86

Distributed and adaptive approaches for ubiquitous and pervasive computing / Approches distribuées et adaptatives pour la mise en oeuvre de l’ubiquité numérique et l’informatique diffuse.

Arabi Agha, Ihab 07 November 2018 (has links)
Le paradigme d'émergence spontanée de services (Spontaneous Emergence Paradigm, SEP) pour la mise en œuvre de l’informatique omniprésente ou diffuse (pervasive computing), consiste à fournir des services aux utilisateurs en fonction de leur environnement ad hoc. Ce paradigme a prouvé son efficacité et son adéquation aux applications distribuées sensibles au contexte. Ce travail se concentre sur deux aspects liés à la mise en œuvre des services SEP. Le premier se distingue de ce qui est proposé dans la littérature, par une approche physiologique de « Dead Reckoning » (Physiological Pedestrian Dead Reckoning Approach, PDR), qui permet de corriger les erreurs de positionnement à partir de données physiologiques comme la fréquence cardiaque et la vitesse de déplacement. Cette approche utilise des modèles stochastiques, qui reposent sur la distribution des probabilités des fréquences cardiaques précédemment collectées par rapport à la vitesse de déplacement de l’utilisateur (par exemple, par apprentissage via une marche sur un tapis roulant). Le modèle proposé permet ainsi d’ajuster les vitesses lues dans n’importe quel futur système PDR. Le deuxième aspect de cette recherche concerne la détection de réseaux d’affinités (Social Relationship Detection framework, SRD). Cette approche propose d’explorer le niveau d’affinité entre personnes en fonction de leur connexions et interactions selon plusieurs conditions. Ces connexions à des bornes WAP (Wireless Access Point), par rapport à chaque condition, sont consolidées pour former des distributions de probabilités. Par la suite, ces distributions de probabilités sont introduites dans un réseau de neurones (back propagation neural network) pour détecter et déterminer les affinités entre utilisateurs. Cette approche permet une prise de décision adaptative à chaque connexion au WAP et selon le comportement de l’utilisateur, contrairement aux approches classiques reposant uniquement sur une connaissance globale au préalable de la convergence des attributs des utilisateurs concernés. / Service Emergence Paradigm (SEP), based on a pervasive computing approach, consists of providing services to users within intended applications, transparently from their intentions, relatively to their needs, and regardless of the time and devices used. This considered paradigm has been proved sufficiently in applications that have context awareness schemes and various working threads. This research focuses on two aspects for providing SEP services. This first aspect is to implement a Physiological Pedestrian Dead Reckoning Approach (PPDR) that corrects position errors in pedestrian dead reckoning systems based on the heart rate parameter. This approach uses specific stochastic models that rely on probability distributions of previously collected heart rate values with respect to their velocities of a user during a treadmill walk. The reason behind this collection is to form a pattern that contributes in adjusting currently read velocities in any future PDR system. The second aspect of this research is the Social Relationship Detection framework (SRD). This approach proposes a mean for exploring the level of relationship between people by observing the network connection pattern of each person over several conditions. These connections, with respect to each condition, are consolidated to form a set that holds different probability distributions. These distributions are formed based on the users’ Wireless Access Point (WAP) connection establishment routine. Afterwards, the distributions of the probabilities are fed into a trained back propagation neural network to detect the level of relationship between candidate users for forthcoming friendship recommendations. This approach is elaborated in a technique that achieves intelligent decision-making whenever the connection pattern to the WAP and the user behavior are changing with time. It is also distinguished from other classical approaches that rely solely on prior knowledge of the convergence of the users’ attributes.
87

Distributed Support for Intelligent Environments

Mantoro, Teddy, teddy.mantoro@anu.edu.au January 2006 (has links)
This thesis describes research on methods for Ubiquitous/Pervasive Computing to better suit users in an Intelligent Environment. The approach is to create and equip a computing environment, such as our Active Office, with technologies that can identify user needs and meet these need in a timely, efficient and unobtrusive manner.¶ The critical issues in the Intelligent Environment are how to enable transparent, distributed computing to allow continued operation across changing circumstances and how to exploit the changing environment so that it is aware of the context of user location, the collection of nearby people and objects, accessible devices and changes to those objects over time.¶ Since the Intelligent Environment is an environment with rapid and rich computing processing, the distributed context processing architecture (DiCPA) was developed to manage and respond to rapidly changing aggregation of sensor data. This architecture is a scalable distributed context processing architecture that provides: 1. continued operation across changing circumstances for users, 2. the collection of nearby people and objects, 3. accessible devices and 4. the changes to those objects over time in the environment. The DiCPA approach focuses on how the Intelligent Environment provides context information for user location, user mobility and the user activity model. Users are assumed mobile within the Intelligent Environment and can rapidly change their access to relevant information and the availability of communications and computational resources.¶ Context-Aware Computing is a new approach in software engineering for Intelligent Environment. It is an approach in the design and construction of a context-aware application that exploits rapid changes in access to relevant information and the availability of communication and computing resources in the mobile computing environment. The goal of Context-Aware Computing is to make user interaction with the computer easier in the smart environment where technology is spread throughout (pervasive), computers are everywhere at the same time (ubiquitous) and technology is embedded (ambient) in the environment. Context-aware applications need not be difficult, tedious or require the acquisition of new skills on the part of the user. They should be safe, easy, simple to use and should enable new functionality without the need to learn new technology. They should provide relevant information and a simple way for a user to manage.¶ The Intelligent Environment requires a context-aware application to improve its efficiency and to increase productivity and enjoyment for the user. The context awareness mechanism has four fundamental cores i.e. identity (who), activity (what), location (where) and timestamp (when). Based on DiCPA architecture, the model of user location (where), user mobility (where), user activity (what) and Intelligent Environment response (what) were developed. Prototypes were also developed to proof the Context-Aware Computing concept in the Intelligent Environment.¶ An Intelligent Environment uses the multi-disciplinary area of Context-Aware Computing, which combines technology, computer systems, models and reasoning, social aspects, and user support. A “good quality” project for Context-Aware Computing requires core content and provides iterative evaluation processes, which has two types of iteration: design and product iteration of the evaluation. The aim of the development of an evaluation program in Context-Aware Computing is to determine what to test, how to test and the appropriate metrics to use. This work presents the metrics for a good quality project in the Context-Aware Computing area, which is followed by the evaluation of the prototypes of this work.
88

Ajouter de l'information spatiale aux modèles de composant logiciel - l'effet de localisation

HASSAN, Ali 25 September 2012 (has links) (PDF)
Highly distributed environments (HDEs) are deployment environments that include powerful and robust machines in addition to resource-constrained and mobile devices such as laptops, personal digital assistants (or PDAs), smart-phones, GPS devices, sensors, etc. Developing software for HDEs is fundamentally different from the software development for central systems and stable distributed systems. This argument is discussed deeply and in-details throughout this dissertation. HDE applications are challenged by two problems: unreliable networks, and heterogeneity of hardware and software. Both challenges need careful handling, where the system must continue functioning and delivering the expected QoS. This dissertation is a direct response to the mentioned challenges of HDEs. The contribution of this dissertation is the cloud component model and its related formal language and tools. This is the general title. However, and to make this contribution clear, we prefer to present it in the following detailed form: (1) We propose a paradigm shift from distribution transparency to localization acknowledgment being the first class concern. (2) To achieve the above mentioned objective, we propose a novel component model called cloud component (CC). (3) In this dissertation we propose a new approach to assemble CCs using systematic methodology that maintains the properties of CC model. (4) Cloud component development process and cloud component based systems development process. (5) Location modeling and advanced localization for HDEs are the pivotal key in our contribution. (6) Formal language to model single CC, CC assembly, CC development process, and CC based systems. (7) We finally present our fully-developed supporting tools: the cloud component management system CCMS, and the Registry utility. To respond to the challenges posed by HDEs, and to maintain expected software quality at the user endpoint, we think we need to pass a ¿paradigm shift¿ from the way software is designed and implemented currently to our new vision that this dissertation is devoted to. This is a paradigm shift from distribution transparency to localization acknowledgment being the first class concern. The contribution in this thesis has several faces as explained above, but still, these faces are cohesive. Each of these faces form a partial contribution, however, this partial contribution does not mean anything if isolated from the overall proposal. Moreover, the merit of the overall proposal can not be grasped by reading one partial contribution. The merit of the proposal is evident only if all parts of this work are cohesively organized. Finally, we claim that our proposal spans the entire software development process for HDEs, from requirements to deployment and runtime management.
89

Arquitectura de descubrimiento de servicios en MANET basada en dispositivos de capacidades superiores liderando clusters

Wister Ovando, Miguel Antonio 25 September 2008 (has links)
This thesis introduces LIFT, a combination of a cluster-based approach with a cross-layer scheme in order to discover services in MANET. In this proposal, High Capability Devices (HCD) are differentiated from Limited Capability Devices (LCD). HCD are set up as the cluster leaders in each cluster so as to perform most of the service discovery activities. Thus, LIFT manages local traffic instead of global traffic. Consequently, messages, energy, computing processes, and bandwidth were reduced due to the optimum usage of network resources. In order to know if LIFT achieves its goal to minimize resources, we have compared LIFT with another well-known solution (AODV-SD) in terms of control message overhead, energy consumption, PDR, throughput, hop count average, NRL, end-to-end delay, and service acquisition time. After carrying out many trials and simulations, LIFT improved previous results in the area. / La tesis presenta a LIFT, una solución para descubrir servicios en MANET que combina un enfoque basado en cluster con un esquema cross-layer. En esta propuesta se diferencian los dispositivos de capacidades superiores (HCD) de los dispositivos de capacidades limitadas (LCD). Los HCD se establecen como líderes en cada cluster para ejecutar la mayoría de las actividades de descubrimiento de servicios. De esta forma, LIFT maneja tráfico local en vez de tráfico global. Por tanto, se reduce el consumo de mensajes, energía y cómputo al hacer uso óptimo de los recursos de la red. Para saber si LIFT logra el objetivo de minimizar recursos, lo hemos comparado contra otra solución (AODV-SD) en aspectos como sobrecarga de paquetes de control, consumo de energía, PDR, throughput, promedio de saltos, NRL, retardo extremo a extremo y tiempo de adquisición de servicios. Después de muchas pruebas y simulaciones, LIFT mejora resultados anteriores en este campo
90

The Impress Context Store: A Coordination Framework for Context-Aware Systems

Li, Herman Hon Yu January 2006 (has links)
The dream of weaving technology into our everyday fabric of life is recently being made possible by advances in ubiquitous computing and sensor technologies. Countless sensors of various sizes have made their way into everyday commercial applications. Many projects aim to explore new ways to utilize these new technologies to aid and interact with the general population. Context-aware systems use available context information to assist users automatically, without explicit user input. By inferring user intent and configuring the system proactively for each user, context-aware systems are an integral part of achieving user-friendly ubiquitous computing environments. <br /><br /> A common issue with building a distributed context-aware system is the need to develop a supporting infrastructure providing features such as storage, distributed messaging, and security, before the real work on processing context information can be done. This thesis proposes a coordination framework that provides an effective common foundation for context-aware systems. The separation between the context-processing logic component and the underlying supporting foundation allows researchers to focus their energy at the context-processing part of the system, instead of spending their time re-inventing the supporting infrastructure. <br /><br /> As part of an ongoing project, Impress, the framework uses the open standard, Jabber, as its communication protocol. The Publish-Subscribe (pubsub) extension to Jabber provides interesting features that match those needed by a context-aware system. The main contribution of this thesis is the design and implementation of a coordination framework, called the Impress Context Store, that provides an effective common foundation for context-aware systems. The separation between the context-processing logic and the underlying supporting foundation allows researchers to focus their energy at the context-processing part of the system, instead of spending their time re-inventing the supporting infrastructure.

Page generated in 0.0648 seconds