Dissertations / Theses on the topic 'Pervasive computing'

To see the other types of publications on this topic, follow the link: Pervasive computing.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Pervasive computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Long, Nguyen Hoang. "Authentication protocols in pervasive computing." Thesis, University of Oxford, 2009. https://ora.ox.ac.uk/objects/uuid:d21c0ce6-5dd6-43ef-b6c6-01346d02031b.

Full text
Abstract:
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably identity theft, and creates new requirements for secure communication. A recently proposed approach to creating secure communication is to use human trust and human interactions. These approaches potentially eliminate the need for passwords as in Bluetooth, shared secrets or trusted parties, which are often too complex and expensive to use in portable devices. In this new technology, handheld devices exchange data (e.g. payment, heart rates or public keys) over some medium (e.g. WiFi) and then display a short and non-secret digest of the protocol's run that the devices' human owners manually compare to ensure they agree on the same data, i.e. human interactions are used to prevent fraud. In this thesis, we present several new protocols of this type which are designed to optimise the work required of humans to achieve a given level of security. We discover that the design of these protocols is influenced by several principles, including the ideas of commitment without knowledge and separation of security concerns, where random and cryptographic attacks should be tackled separately. Underpinning the technology is a new cryptographic function, termed a keyed digest function, which produces a short number for humans to compare. This is similar to the notion of a universal hash function, but its output length is shorter (e.g. 16 bits). Hence, it should be faster to compute. We propose several digest constructions using Toeplitz matrices, integer multiplication and pseudorandom numbers. The application of digest functions leads us to develop more efficient alternatives to standard digital signatures. Our protocol security analysis leads to a new bound on the key length for an almost universal hash function, which can be derived by the pigeon-hole principle. The new bound turns out to be tighter than another similar bound derived from the combination of the Singleton bound in coding theory and an equivalence between error-correcting codes and almost universal hash functions.
APA, Harvard, Vancouver, ISO, and other styles
2

Abukmail, Ahmed Ahed. "Pervasive computing approach to energy management." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0013060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Malik, Yasir. "Towards Evaluation of Pervasive Computing System." Thèse, Université de Sherbrooke, 2014. http://hdl.handle.net/11143/6020.

Full text
Abstract:
Résumé : L’informatique diffuse est le passage du paradigme informatique vers l’informatique partout. L’émergence couvre principalement l’informatique mobile et distribuée, les réseaux de capteurs, l’interaction homme-machine et l’intelligence artificielle sous l’égide de l’informatique diffuse. Des efforts considérables ont été mis sur les recherches dans ce domaine, mais il n’existe pas de normes ou des méthodologies communément acceptées pour évaluer ces systèmes et de définir des nouvelles orientations de recherche dans le futur. Cette thèse s’attaque au problème d’évaluation des systèmes informatiques ubiquitaires. La question de recherche notamment le quoi et comment évaluer n’a pas encore été résolue. Dans l’objectif de trouver une réponse à cette question et d’élaborer un cadre général d’évaluation, nous avons procédé comme suit. Pour répondre à la première partie de la question, “Quoi évaluer”, nous avons tout d’abord classè les systèmes en se basant sur certains critères, et nous avons défini ensuite les principaux paramètres pour évaluer ces systèmes. Pour ce faire, nous avons étudié différents aspects de l’informatique diffuse et nous les avons classés en onze différents aspects d’évaluation. Pour chaque aspect, nous avons identifiè les principaux paramètres qui peuvent être caractérisés et mesurés. Cette taxonomie n’est pas assez exhaustive, mais elle reflète le schéma de classification le mieux adaptè pour des évaluations effectives. Cependant, pour que l’évaluation soit la plus complète possible, nous avons jugé nécessaire d’incorporer l’utilisateur dans le processus d’évaluation. À cet effet, nous avons proposè un modèle d’évaluation qui prend en compte les besoins de l’utilisateur, le contexte dans lequel la technologie sera utilisée, et l’environnement d’exploitation dans lequel le système va être déployé. Le modèle proposè constitue une première étape vers le développement des directives et standards d’évaluation qui peuvent être utilisés peuvent être utilisées pendant les évaluations formatives et sommatives. Une autre question complémentaire à l’évaluation des performances est la validation fonctionnelle d’un système en cours d’exécution, qui confirme que le système est conforme aux exigences fonctionnelles et ne contient pas de failles. Pour répondre à la deuxième partie de la question à savoir “comment évaluer”, nous avons adoptè les techniques formelles de vérification et de validation. Comme le champ d’application du projet est très large, nous sommes concentrés sur l’évaluation au premier stade de la conception afin de vérifier et de valider l’exactitude fonctionnelle de la conception de systèmes. Pour la preuve de concept, nous avons appliqué deux méthodes, dans la première méthode, nous avons étudié les approches de vérification automatique et nous avons choisi la technique la plus connue qu’est le “model checking” pour vérifier les exigences fonctionnelles d’un système de gestion des médicaments basé sur le contexte pour des personnes âgées dans une maison Intelligente. Cette approche est complémentaire aux tests et à l’évaluation et permet aux concepteurs de vérifier le comportement de leurs systèmes par rapport aux exigences fonctionnelles avant le développement du prototype de système. Certaines propriétés de base, telles que la disponibilité ou la vivacité, l’interblocage, la comparaison des spécifications et implémentations et l’analyse d’accessibilité, sont également vérifiées à ce stade. Dans la deuxième méthode, nous avons étudié les approches de vérification d’exécution et nous avons adoptè la technique de conception par le contrat pour modéliser et vérifier la sémantique et exigences de l’interopérabilité des services dans les environnements intelligents. L’avantage de cette approche réside dans la vérification automatique en temps réel de l’interopérabilité des services dans les environnements intelligents. // Abstract : Summary performance evaluations. The proposed model is a step towards forming standard evaluation guidelines that can be used during formative and summative evaluations. A complementary issue to performance evaluation is functional correctness of a running system, which confirms that the system fulfills its functional requirements and does not contain any flaws. To address the second part of the question that is “ how to evaluate ”, we have adopted the well-known formal verification and validation techniques. As the scope of the project is very big, the focus of this thesis is on early design stage evaluation to verify and validate the functional correctness of the systems design. For the proof-of-concept, we applied two methods: In the first method, we studied automatic verification approaches and used a well-known model checking approach to model and verify the functional requirements of a context aware medication management system for the elderly in a Smart House. This approach is complementary to testing and evaluation, it allows designers to verify their system behavior against its functional requirements before developing the system prototype. Some basic properties like the availability or liveliness, deadlock checking, matching of specification and implementation, and reachability analysis are verified. In the second method, we studied the runtime verification approaches and used design by contract technique to model and verify the semantic and pragmatic service interoperability requirements in smart environments. The analysis of this technique and results are presented. The benefit of the approach is automatic verification of services interoperability in smart environments on the fly.
APA, Harvard, Vancouver, ISO, and other styles
4

Thompson, Michael Stewart. "Service Discovery in Pervasive Computing Environments." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/29133.

Full text
Abstract:
Service discovery is a driving force in realizing pervasive computing. It provides a way for users and services to locate and interact with other services in a pervasive computing environment. Unfortunately, current service discovery solutions do not capture the effects of the human or physical world and do not deal well with diverse device populations; both of which are characteristics of pervasive computing environments. This research concentrates on the examination and fulfillment of the goals of two of the four components of service discovery, service description and dissemination. It begins with a review of and commentary on current service discovery solutions. Following this review, is the formulation of the problem statement, including a full explanation of the problems mentioned above. The problem formulation is followed by an explanation of the process followed to design and build solutions to these problems. These solutions include the Pervasive Service Description Language (PSDL), the Pervasive Service Query Language (PSQL), and the Multi-Assurance Delivery Protocol (MADEP). Prototype implementations of the components are used to validate feasibility and evaluate performance. Experimental results are presented and analyzed. This work concludes with a discussion of overall conclusions, directions for future work, and a list of contributions.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
5

Schiele, Gregor Alexander. "System support for spontaneous pervasive computing environments." kostenfrei, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?idn=985989661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nigam, Atish 1981. "Analytical techniques for debugging pervasive computing environments." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17962.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.
Includes bibliographical references (p. 63-65).
User level debugging of pervasive environments is important as it provides the ability to observe changes that occur in a pervasive environment and fix problems that result from these changes, especially since pervasive environments may from time to time exhibit unexpected behavior. Simple keepalive messages can not always uncover the source of this behavior because systems can be in an incorrect state while continuing to output information or respond to basic queries. The traditional approach to debugging distributed systems is to instrument the entire environment. This does not work when the environments are cobbled together from systems built around different operating systems, programming languages or platforms. With systems from such disparate backgrounds, it is hard to create a stable pervasive environment. We propose to solve this problem by requiring each system and component to provide a health metric that gives an indication of its current status. Our work has shown that, when monitored at a reasonable rate, simple and cheap metrics can reveal the cause of many problems within pervasive environments. The two metrics that will be focused on in this thesis are transmission rate and transmission data analysis. Algorithms for implementing these metrics, within the stated assumptions of pervasive environments, will be explored along with an analysis of these implementations and the results they provided. Furthermore, a system design will be described in which the tools used to analyze the metrics compose an out of bound monitoring system that retains a level of autonomy from the pervasive environment. The described system provides many advantages and additionally operates under the given assumptions regarding the resources available
(cont.) within a pervasive environment.
by Atish Nigam.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

O'Keeffe, Daniel Brendan. "Distributed complex event detection for pervasive computing." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Millard, Ian C. "Contextually aware pervasive computing : a semantic approach." Thesis, University of Southampton, 2008. https://eprints.soton.ac.uk/266002/.

Full text
Abstract:
We live in a world which is becoming increasingly rich in technology, with a wide array of portable and embedded devices being readily available and surrounding us in everyday use. Similarly, advances in communications technologies and the explosive growth of data being published on the Internet have provided access to information on an unparalleled scale. However, device interoperability is often poor at best, and accessing data which is relevant to any given situation can be difficult due to the sheer quantity of information which is available. A contextually aware environment is envisioned as one in which integrated computer systems have an understanding or representation of not only the physical space and the resources within it, but also the activities, interests, actions and intent of the human occupants at any given time. Given such knowledge, a contextually aware and technology rich pervasive environment may offer services and applications which attempt to adapt the surroundings in a manner which assists its users, such as by configuring devices or assimilating information which is relevant to activities currently being undertaken. The research presented in this thesis combines the fields of knowledge management, semantic technologies, logic and reasoning with those from the predominantly hardware and communications oriented field of pervasive computing, in order to facilitate the creation of contextually aware environments. Requirements for such a system are discussed in detail, resulting in the development of a generic framework of components and data representations from which domain specific deployments can be created. To demonstrate and test the proposed framework, experimentation has been conducted in the example domain of an academic environment, including the development of two contextually aware applications. The experiences and lessons learned during this research are documented throughout, and have influenced the proposed avenues for future related research in this area.
APA, Harvard, Vancouver, ISO, and other styles
9

Schiele, Gregor. "System support for spontaneous pervasive computing environments." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-32709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kostakos, Vassilis. "A design framework for pervasive computing systems." Thesis, University of Bath, 2004. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.409882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Grimm, Robert. "System support for pervasive applications /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zeidler, Andreas. "A Distributed Publish/Subscribe Notification Service for Pervasive Environments." Phd thesis, [S.l.] : [s.n.], 2005. http://elib.tu-darmstadt.de/diss/000519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Quintela, Daniel H. "Pervasive sensing and computing for natural disaster mitigation." [Tampa, Fla.] : University of South Florida, 2005. http://purl.fcla.edu/fcla/etd/SFE0001160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dragovic, Boris. "CASPEr : containment-aware security for pervasive computing environments." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.614043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Thompson, Mark Kenneth. "Hypermedia link service architectures for pervasive computing environments." Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bevan, Christopher. "Human to computer trust in urban pervasive computing." Thesis, University of Bath, 2011. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541528.

Full text
Abstract:
How people come to trust computing technology is an important factor in the degree to which they come to accept the services that such technologies are able to provide. This is particularly important where the usage of a technology might risk compromising a person’s private information, making them vulnerable to technologically mediated attack. Research into interpersonal trust development between people has allowed designers of systems deployed using technologies such as the World Wide Web to successfully modulate a number of human interpersonal trust cues into the computer-mediated communication domain. Pervasive computing however, describes a significant shift in the ways in which people will come to encounter and use interactive technologies. No longer limited to the confines of the desktop, people can and will be able to perform many of the technological activities they would otherwise do at home in any place and at any time. However, while the services that a pervasive computing infrastructure will be able to provide may be similar to those that people are used to in the traditional world of the ‘desktop metaphor’, the novel characteristics of pervasive computing mean that many of the trust cues that were previously available to technology users may no longer offer an effective means of helping users to place their trust well. In this thesis, a mixed methods research plan, involving both laboratory-based and field-based experimental design, was developed to investigate the role of human-computer trust in respect of two novel characteristics of pervasive computing: service discovery and secure ad-hoc device association. Through leveraging various artefacts in the immediate physical world to support information presented by services in the digital world, this thesis posits that the provision of user-verifiable links between the physical and digital worlds might provide a means of increasing user trust in services whose source they can otherwise not perceive nor verify.
APA, Harvard, Vancouver, ISO, and other styles
17

Nogueras, Jorge Rafael 1976. "A stream redirection architecture for pervasive computing environments." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86718.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (p. 69-70).
by Jorge Rafael Nogueras.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
18

Pham, Hubert. "A distributed object framework for pervasive computing applications." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33330.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
Includes bibliographical references (p. 79-81).
This thesis presents a new architectural abstraction for developing dynamic and adaptive software. Separating application logic from implementation mechanism provides developers with a simple API for constructing new application functionality by connecting together a set of generic, distributed software modules. Developers codify adaptive application structure and logic in a simple, synchronous environment, and use the API to control and monitor the resulting implementation of highly parallel and asynchronous module networks. The design and implementation for this architectural abstraction is embodied in the Resources framework, a language- and platform independent software component platform geared for pervasive computing application development.
by Hubert Pham.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
19

Michalakis, Nikolaos 1978. "Location-aware access control for pervasive computing environments." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29698.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.
Includes bibliographical references (p. 69-73).
In pervasive computing environments certain applications are interested in a user's location in order to provide a service. Such applications would benefit from an architecture that enables users to prove their location prior to requesting a service. We present PA C, an architecture for location-aware access control in pervasive computing environments, where users authenticate their location in order to gain access to resources. PAC preserves user anonymity and uses lightweight security. We evaluate our architecture with respect to its security and its scalability as the number of resources and users increase.
by Nikolaos Michalakis.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
20

Tseng, Erick N. (Erick Neal) 1979. "Personal health benefits of pervasive computing and feedback." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86732.

Full text
Abstract:
Thesis (M.Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (leaves 227-230).
by Erick N. Tseng.
M.Eng.and S.B.
APA, Harvard, Vancouver, ISO, and other styles
21

Covington, Michael J. "A flexible security architecture for pervasive computing environments." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-06072004-131113/unrestricted/covington%5Fmichael%5Fj%5F200405%5Fphd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Nguyen, Tammy. "Context-aware access control in pervasive computing environments." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Thesis/Summer2005/t%5Fnguyen%5F061005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Sheng, Bo. "Building efficient wireless infrastructures for pervasive computing environments." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623557.

Full text
Abstract:
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but networked with each other through wireless channels so that people can easily control and access them. In the architecture of pervasive computing systems, these small and networked computing devices form a wireless infrastructure layer to support various functionalities in the upper application layer.;In practical applications, the wireless infrastructure often plays a role of data provider in a query/reply model, i.e., applications issue a query requesting certain data and the underlying wireless infrastructure is responsible for replying to the query. This dissertation has focused on the most critical issue of efficiency in designing such a wireless infrastructure. In particular, our problem resides in two domains depending on different definitions of efficiency. The first definition is time efficiency, i.e., how quickly a query can be replied. Many applications, especially real-time applications, require prompt response to a query as the consequent operations may be affected by the prior delay. The second definition is energy efficiency which is extremely important for the pervasive computing devices powered by batteries. Above all, our design goal is to reply to a query from applications quickly and with low energy cost.;This dissertation has investigated two representative wireless infrastructures, sensor networks and RFID systems, both of which can serve applications with useful information about the environments. We have comprehensively explored various important and representative problems from both algorithmic and experimental perspectives including efficient network architecture design and efficient protocols for basic queries and complicated data mining queries. The major design challenges of achieving efficiency are the massive amount of data involved in a query and the extremely limited resources and capability each small device possesses. We have proposed novel and efficient solutions with intensive evaluation. Compared to the prior work, this dissertation has identified a few important new problems and the proposed solutions significantly improve the performance in terms of time efficiency and energy efficiency. Our work also provides referrable insights and appropriate methodology to other similar problems in the research community.
APA, Harvard, Vancouver, ISO, and other styles
24

Hu, Haoyu, and 胡昊宇. "ContextTorrent: a context provisioning framewrok for pervasive applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47028488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gauger, Matthias. "Integration of wireless sensor networks in pervasive computing scenarios." Berlin Logos-Verl, 2010. http://d-nb.info/1002361559/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kong, Choi-yu. "Effective partial ontology mapping in a pervasive computing environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B32002737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Adhikari, Sameer. "Programming Idioms and Runtime Mechanisms for Distributed Pervasive Computing." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/4820.

Full text
Abstract:
The emergence of pervasive computing power and networking infrastructure is enabling new applications. Still, many milestones need to be reached before pervasive computing becomes an integral part of our lives. An important missing piece is the middleware that allows developers to easily create interesting pervasive computing applications. This dissertation explores the middleware needs of distributed pervasive applications. The main contributions of this thesis are the design, implementation, and evaluation of two systems: D-Stampede and Crest. D-Stampede allows pervasive applications to access live stream data from multiple sources using time as an index. Crest allows applications to organize historical events, and to reason about them using time, location, and identity. Together they meet the important needs of pervasive computing applications. D-Stampede supports a computational model called the thread-channel graph. The threads map to computing devices ranging from small to high-end processing elements. Channels serve as the conduits among the threads, specifically tuned to handle time-sequenced streaming data. D-Stampede allows the dynamic creation of threads and channels, and for the dynamic establishment (and removal) of the plumbing among them. The Crest system assumes a universe that consists of participation servers and event stores, supporting a set of applications. Each application consists of distributed software entities working together. The participation server helps the application entities to discover each other for interaction purposes. Application entities can generate events, store them at an event store, and correlate events. The entities can communicate with one another directly, or indirectly through the event store. We have qualitatively and quantitatively evaluated D-Stampede and Crest. The qualitative aspect refers to the ease of programming afforded by our programming abstractions for pervasive applications. The quantitative aspect measures the cost of the API calls, and the performance of an application pipeline that uses the systems.
APA, Harvard, Vancouver, ISO, and other styles
28

周彧 and Yuk Chow. "A light-weight mobile code system for pervasive computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kong, Choi-yu, and 江采如. "Effective partial ontology mapping in a pervasive computing environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B32002737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Alsiyami, Aeshah Abdulkarim Dammad. "A policy language definition for provenance in pervasive computing." Thesis, University of Sussex, 2012. http://sro.sussex.ac.uk/id/eprint/39401/.

Full text
Abstract:
Recent advances in computing technology have led to the paradigm of pervasive computing, which provides a means of simplifying daily life by integrating information processing into the everyday physical world. Pervasive computing draws its power from knowing the surroundings and creates an environment which combines computing and communication capabilities. Sensors that provide high-resolution spatial and instant measurement are most commonly used for forecasting, monitoring and real-time environmental modelling. Sensor data generated by a sensor network depends on several influences, such as the configuration and location of the sensors or the processing performed on the raw measurements. Storing sufficient metadata that gives meaning to the recorded observation is important in order to draw accurate conclusions or to enhance the reliability of the result dataset that uses this automatically collected data. This kind of metadata is called provenance data, as the origin of the data and the process by which it arrived from its origin are recorded. Provenance is still an exploratory field in pervasive computing and many open research questions are yet to emerge. The context information and the different characteristics of the pervasive environment call for different approaches to a provenance support system. This work implements a policy language definition that specifies the collecting model for provenance management systems and addresses the challenges that arise with stream data and sensor environments. The structure graph of the proposed model is mapped to the Open Provenance Model in order to facilitating the sharing of provenance data and interoperability with other systems. As provenance security has been recognized as one of the most important components in any provenance system, an access control language has been developed that is tailored to support the special requirements of provenance: fine-grained polices, privacy policies and preferences. Experimental evaluation findings show a reasonable overhead for provenance collecting and a reasonable time for provenance query performance, while a numerical analysis was used to evaluate the storage overhead.
APA, Harvard, Vancouver, ISO, and other styles
31

Leon, Orlando (Orlando Wing) 1979. "An extensible communication-oriented routing environment for pervasive computing." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/16848.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (p. 59-60).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
The realm of pervasive computing is expanding at a fast pace, and the need for more generalized protocols and systems is in high demand. Bluetooth is a technology with great potential, but it runs over specific protocols standardized only for other Bluetooth devices. This limits connectivity and control of these devices. CORE, the communication-oriented routing environment, is a generalized message-based routing and inter-connect system that provides an implementation and framework for platform-independent, device-independent services and applications over TCP/IP. More importantly, CORE exposes a routing mechanism that allows extensions and abstractions through levels of indirection. Our implementation of CORE allows us to design an extension that will allow Bluetooth and non- Bluetooth devices to communicate, use, and control Bluetooth devices through CORE.
by Orlando Leon.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
32

Carboni, Davide. "Services in pervasive computing environments : from design to delivery." Thèse, Université de Sherbrooke, 2005. http://savoirs.usherbrooke.ca/handle/11143/5047.

Full text
Abstract:
The work presented in this thesis is based on the assumption that modern computer technologies are already potentially pervasive: CPUs are embedded in any sort of device; RAM and storage memory of a modern PDA is comparable to those of a ten years ago Unix workstation; Wi-Fi, GPRS, UMTS are leveraging the development of the wireless Internet. Nevertheless, computing is not pervasive because we do not have a clear conceptual model of the pervasive computer and we have not tools, methodologies, and middleware to write and to seamlessly deliver at once services over a multitude of heterogeneous devices and different delivery contexts. Our thesis addresses these issues starting from the analysis of forces in a pervasive computing environment: user mobility, user profile, user position, and device profile. The conceptual model, or metaphor, we use to drive our work is to consider the environment as surrounded by a multitude of services and objects and devices as the communicating gates between the real world and the virtual dimension of pervasive computing around us. Our thesis is thus built upon three main “pillars”. The first pillar is a domain-object-driven methodology which allows developer to abstract from low level details of the final delivery platform, and provides the user with the ability to access services in a multi-channel way. The rationale is that domain objects are self-contained pieces of software able to represent data and to compute functions and procedures. Our approach fills the gap between users and domain objects building an appropriate user interface which is both adapted to the domain object and to the end user device. As example, we present how to design, implement and deliver an electronic mail application over various platforms. The second pillar of this thesis analyzes in more details the forces that make direct object manipulation inadequate in a pervasive context. These forces are the user profile, the device profile, the context of use, and the combinatorial explosion of domain objects. From the analysis of the electronic mail application presented as example, we notice that according to the end user device, or according to particular circumstances during the access to the service (for instance if the user access the service by the interactive TV while he is having his breakfast) some functionalities are not compulsory and do not fit an adequate task sequence. So we decided to make task models explicit in the design of a service and to integrate the capability to automatically generate user interfaces for domain objects with the formal definition of task models adapted to the final delivery context. Finally, the third pillar of our thesis is about the lifecycle of services in a pervasive computing environment. Our solutions are based upon an existing framework, the Jini connection technology, and enrich this framework with new services and architectures for the deployment and discovery of services, for the user session management, and for the management of offline agents.
APA, Harvard, Vancouver, ISO, and other styles
33

Xu, Chang. "Inconsistency detection and resolution for context-aware pervasive computing /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20XU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Xu, Fengyuan. "Improving Energy Efficiency and Security for Pervasive Computing Systems." W&M ScholarWorks, 2013. https://scholarworks.wm.edu/etd/1539623629.

Full text
Abstract:
Pervasive computing systems are comprised of various personal mobile devices connected by the wireless networks. Pervasive computing systems have gained soaring popularity because of the rapid proliferation of the personal mobile devices. The number of personal mobile devices increased steeply over years and will surpass world population by 2016.;However, the fast development of pervasive computing systems is facing two critical issues, energy efficiency and security assurance. Power consumption of personal mobile devices keeps increasing while the battery capacity has been hardly improved over years. at the same time, a lot of private information is stored on and transmitted from personal mobile devices, which are operating in very risky environment. as such, these devices became favorite targets of malicious attacks. Without proper solutions to address these two challenging problems, concerns will keep rising and slow down the advancement of pervasive computing systems.;We select smartphones as the representative devices in our energy study because they are popular in pervasive computing systems and their energy problem concerns users the most in comparison with other devices. We start with the analysis of the power usage pattern of internal system activities, and then identify energy bugs for improving energy efficiency. We also investigate into the external communication methods employed on smartphones, such as cellular networks and wireless LANs, to reduce energy overhead on transmissions.;As to security, we focus on implantable medical devices (IMDs) that are specialized for medical purposes. Malicious attacks on IMDs may lead to serious damages both in the cyber and physical worlds. Unlike smartphones, simply borrowing existing security solutions does not work on IMDs because of their limited resources and high requirement of accessibility. Thus, we introduce an external device to serve as the security proxy for IMDs and ensure that IMDs remain accessible to save patients' lives in certain emergency situations when security credentials are not available.
APA, Harvard, Vancouver, ISO, and other styles
35

Arabi, Agha Ihab. "Distributed and adaptive approaches for ubiquitous and pervasive computing." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCA025.

Full text
Abstract:
Le paradigme d'émergence spontanée de services (Spontaneous Emergence Paradigm, SEP) pour la mise en œuvre de l’informatique omniprésente ou diffuse (pervasive computing), consiste à fournir des services aux utilisateurs en fonction de leur environnement ad hoc. Ce paradigme a prouvé son efficacité et son adéquation aux applications distribuées sensibles au contexte. Ce travail se concentre sur deux aspects liés à la mise en œuvre des services SEP. Le premier se distingue de ce qui est proposé dans la littérature, par une approche physiologique de « Dead Reckoning » (Physiological Pedestrian Dead Reckoning Approach, PDR), qui permet de corriger les erreurs de positionnement à partir de données physiologiques comme la fréquence cardiaque et la vitesse de déplacement. Cette approche utilise des modèles stochastiques, qui reposent sur la distribution des probabilités des fréquences cardiaques précédemment collectées par rapport à la vitesse de déplacement de l’utilisateur (par exemple, par apprentissage via une marche sur un tapis roulant). Le modèle proposé permet ainsi d’ajuster les vitesses lues dans n’importe quel futur système PDR. Le deuxième aspect de cette recherche concerne la détection de réseaux d’affinités (Social Relationship Detection framework, SRD). Cette approche propose d’explorer le niveau d’affinité entre personnes en fonction de leur connexions et interactions selon plusieurs conditions. Ces connexions à des bornes WAP (Wireless Access Point), par rapport à chaque condition, sont consolidées pour former des distributions de probabilités. Par la suite, ces distributions de probabilités sont introduites dans un réseau de neurones (back propagation neural network) pour détecter et déterminer les affinités entre utilisateurs. Cette approche permet une prise de décision adaptative à chaque connexion au WAP et selon le comportement de l’utilisateur, contrairement aux approches classiques reposant uniquement sur une connaissance globale au préalable de la convergence des attributs des utilisateurs concernés
Service Emergence Paradigm (SEP), based on a pervasive computing approach, consists of providing services to users within intended applications, transparently from their intentions, relatively to their needs, and regardless of the time and devices used. This considered paradigm has been proved sufficiently in applications that have context awareness schemes and various working threads. This research focuses on two aspects for providing SEP services. This first aspect is to implement a Physiological Pedestrian Dead Reckoning Approach (PPDR) that corrects position errors in pedestrian dead reckoning systems based on the heart rate parameter. This approach uses specific stochastic models that rely on probability distributions of previously collected heart rate values with respect to their velocities of a user during a treadmill walk. The reason behind this collection is to form a pattern that contributes in adjusting currently read velocities in any future PDR system. The second aspect of this research is the Social Relationship Detection framework (SRD). This approach proposes a mean for exploring the level of relationship between people by observing the network connection pattern of each person over several conditions. These connections, with respect to each condition, are consolidated to form a set that holds different probability distributions. These distributions are formed based on the users’ Wireless Access Point (WAP) connection establishment routine. Afterwards, the distributions of the probabilities are fed into a trained back propagation neural network to detect the level of relationship between candidate users for forthcoming friendship recommendations. This approach is elaborated in a technique that achieves intelligent decision-making whenever the connection pattern to the WAP and the user behavior are changing with time. It is also distinguished from other classical approaches that rely solely on prior knowledge of the convergence of the users’ attributes
APA, Harvard, Vancouver, ISO, and other styles
36

Gassen, Jonas Bulegon. "UMA METODOLOGIA PARA O USO DE ONTOLOGIAS APLICADAS À DESCRIÇÃO DE CONTEXTO EM AMBIENTES HOSPITALARES PERVASIVOS." Universidade Franciscana, 2010. http://tede.universidadefranciscana.edu.br:8080/handle/UFN-BDTD/245.

Full text
Abstract:
Made available in DSpace on 2018-06-27T18:56:27Z (GMT). No. of bitstreams: 3 Jonas Bulegon Gassen.pdf: 799149 bytes, checksum: 2d5d71d3a957faa5f82feebbf14e88fc (MD5) Jonas Bulegon Gassen.pdf.txt: 183193 bytes, checksum: ac769c0da06ca7ce3b8154b94c90eaf6 (MD5) Jonas Bulegon Gassen.pdf.jpg: 3509 bytes, checksum: dfc698f4611f3e08f6acfc0f11a92b31 (MD5) Previous issue date: 2010-03-25
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
For a hospital environment can be called as "pervasive", it requires that all the entities that are present in this context (like people and equipment) are sinchronized to perform the daily common tasks. Inside these environments, the computational devices should be considered tools to access information and, therefore, they shouldn't be the focus of attention of the professional. Thus, they should be used naturally. For the system to behave in such a way, it is necessary that it adapts itself to the users contexts. One of the most indicated ways to represent these contexts is through ontologies, due to the great expressivity that they allow. However, environments such as proposed require an extremely dynamic system to represent the context in a coherent manner with the changes in this environment, because their professionals encounter a frequent changing of shifts and tasks in which they work with diferent patients and information from diferent sources. To this end, this dissertation proposes an architecture for a hospital pervasive that seeks to provide all the features mentioned above.
Para que um ambiente hospitalar possa vir a tornar-se pervasivo, necessita-se que as entidades presentes neste contexto (como pessoas e equipamentos) estejam em perfeita sincronia para a realização das tarefas comuns do dia-a-dia. Dentro destes ambientes, os dispositivos computacionais devem ser considerados ferramentas para o acesso à informação e, portanto, não devem ser foco de atenção dos profissionais. Desta forma, os mesmos devem ser utilizados de forma natural. Para que o sistema possa se comportar de tal forma, é necessário que o mesmo se adapte ao contexto dos usuários. Uma das maneiras mais indicadas para efetuar a representação destes contextos é através de ontologias, devido a grande expressividade que estas permitem. Entretanto, ambientes como o proposto necessitam de um sistema extremamente dinâmico para representar o contexto de forma coerente com as modificações ocorridas neste ambiente, pois seus profissionais contam com uma freqüente modificação de turnos e tarefas, onde os mesmos trabalham com diferentes pacientes e informações provenientes de diferentes fontes. Para tal, esta dissertação propõe uma arquitetura para um ambiente hospitalar pervasivo que busca prover todas as funcionalidades acima citadas.
APA, Harvard, Vancouver, ISO, and other styles
37

Siu, Po-lam Pauline. "Context-aware state management for supporting mobility in a pervasive environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B3147858X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Siu, Po-lam Pauline, and 蕭寶琳. "Context-aware state management for supporting mobility in a pervasive environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B3147858X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lu, Heng. "A software testing framework for context-aware applications in pervasive computing." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B41758067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Nordstedt, David Roger. "MicroJini a service discovery and delivery infrastructure for pervasive computing /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000338.

Full text
Abstract:
Thesis (M.E.)--University of Florida, 2001.
Title from title page of source document. Document formatted into pages; contains xi, 76 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
42

Bruneau, Julien. "Developing and Testing Pervasive Computing Applications: A Tool-Based Methodology." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2012. http://tel.archives-ouvertes.fr/tel-00767395.

Full text
Abstract:
Malgré des progrès récents, développer une application d'informatique ubiquitaire reste un défi à cause d'un manque de canevas conceptuels et d'outils aidant au développement. Ce défi implique de prendre en charge des objets communicants hétérogènes, de surmonter la complexité des technologies de systèmes distribués, de définir l'architecture d'une application, et d'encoder cela dans un programme. De plus, tester des applications d'informatique ubiquitaire est problématique car cela implique d'acquérir, de tester et d'interfacer une variété d'entités logicielles et matérielles. Ce procédé peut rapidement devenir coûteux en argent et en temps lorsque l'environnement ciblé implique de nombreuses entités. Cette thèse propose une méthodologie outillée pour dévelop- per et tester des applications d'informatique ubiquitaire. Notre méthodologie fournit tout d'abord le langage de conception DiaSpec. Ce langage permet de définir une taxonomie d'entités spécifiques à un domaine applicatif, s'abstrayant ainsi de leur hétérogénéité. Ce langage inclut également une couche permettant de définir l'architecture d'une application. Notre suite outillée fournit un compilateur qui, à partir de descriptions DiaSpec, génère un canevas de programmation guidant les phases d'implémentation et de test. Afin d'aider à la phase de test, nous proposons une approche de simulation et un outil intégré dans notre méthodologie outillée : l'outil DiaSim. Notre approche utilise le support de test généré par DiaSpec pour tester les applications de manière transparente dans un environnement physique simulé. La simulation d'une application est rendue graphiquement dans un outil de visualisation 2D. Nous avons combiné DiaSim avec un langage dédié permet- tant de décrire les phénomènes physiques en tant qu'équations différentielles, permettant des simulations réalistes. DiaSim a été utilisé pour simuler des applications dans des domaines applicatifs variés. Notre approche de simulation a également été appliquée à un système avionique, démontrant la généralité de notre approche de simulation.
APA, Harvard, Vancouver, ISO, and other styles
43

Jakob, Henner. "Towards securing pervasive computing systems by design: a language approach." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2011. http://tel.archives-ouvertes.fr/tel-00719170.

Full text
Abstract:
Dans de multiples domaines, un nombre grandissant d'applications interagissant avec des entités ommunicantes apparaissent dans l'environnement pour faciliter les activités quotidiennes (domotique et télémédecine). Leur impact sur la vie de tous les jours des utilisateurs rend ces applications critiques: leur défaillance peut mettre en danger des personnes et leurs biens. Bien que l'impact de ces défaillances puisse être majeur, la sécurité est souvent considérée comme un problème secondaire dans le processus de développement et est traitée par des approches ad hoc. Cette thèse propose d'intégrer des aspects de sécurité dans le cycle de développement des systèmes d'informatique ubiquitaire. La sécurité est spécifiée à la conception grâce à des déclarations dédiées et de haut niveau. Ces déclarations sont utilisées pour générer un support de programmation afin de faciliter l'implémentation des mécanismes de sécurité, tout en séparant ces aspects de sécurité de la logique applicative. Notre approche se concentre sur le contrôle d'accès aux entités et la protection de la vie privée. Notre travail a été implémenté et fait levier sur une suite outillée existante couvrant le cycle de développement logiciel.
APA, Harvard, Vancouver, ISO, and other styles
44

Khedr, Mohamed Essam. "An infrastructure for managing context information in pervasive computing environments." Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/29125.

Full text
Abstract:
The increasing popularity of mobile devices, such as mobile phones and personal digital assistants, and advances in wireless networking technologies, are enabling new classes of applications that raise challenging problems to application developers. These applications have to be aware of the variations in the execution context such as location, time, user activities, and device capabilities in order to tune and adapt their intended functionalities. We argue that developing and managing applications that are context-aware would be extremely hard, tedious, and error-prone if not supported by a computing infrastructure. This is because application developers would have to deal with issues such as context interpretation, context reasoning, and context adaptability, and consequently would be distracted from the actual requirements of the applications they are developing. We investigate the principles of ontologies, negotiation, and approximate reasoning, and their usage to support context-awareness and dynamic adaptation for applications in pervasive environments. These principles are integrated in our proposed infrastructure, which offers application developers a set of APIs and computing components to facilitate the process of developing and managing context-aware applications. The APIs that the infrastructure provides allow users to manipulate the information encoded in their semantic profiles and to negotiate context information causing the infrastructure to tailor its behaviour to applications' need. Accordingly, the infrastructure reasons and makes automated decisions that are based on this negotiated contextual information to achieve adaptability and to cope with the frequent changes in the environment. To manifest the effectiveness of these principles in developing and managing context-aware applications, we discuss the architecture and implementation of an agent-based context-aware infrastructure that implements these principles, and report on performance and usability results obtained from a thorough evaluation of the infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
45

Villeda, Enrique Edgar León. "Towards affective pervasive computing : emotion detection in intelligent inhabited environments." Thesis, University of Essex, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Wong, Ford Long. "Protocols and technologies for security in pervasive computing and communications." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cho, Jihoon. "Cryptographic approaches to security and privacy issues in pervasive computing." Thesis, Royal Holloway, University of London, 2014. http://repository.royalholloway.ac.uk/items/7272f105-8c80-462d-95eb-36f3de8ddaad/1/.

Full text
Abstract:
Technological innovation has enabled tiny devices to participate in pervasive com- puting. Such devices are particularly vulnerable to security and privacy threats, because of their limited computing resources and relatively weak physical security. We investigate possible cryptographic solutions to security and privacy problems arising in two kinds of emerging pervasive computing networks: Personal Area Net- works (PANs) and the EPCglobal Network. A number of key management schemes have been proposed for use in PANs, but these schemes only support key management within a PAN. However, as people are increasingly equipped with multiple wireless devices, PANs are likely to be intercon- nected to share information or services. We introduce a term, iPANs, to name such interconnected PANs. We define system models and design goals for key manage- ment in iPANs, and propose a novel security initialisation scheme for use in iPANs. The proposed scheme achieves desirable security and efficiency properties by making use of the unique characteristics of PANs. The EPCglobal Network is designed to give efficiency and cost savings in and beyond the supply chain using Radio Frequency Identification (RFID) technology; however, privacy threats affecting such networks are particularly serious. We construct a formal privacy model for RFID systems accurately reflecting adversarial threats and power. We then give brief privacy analysis for the existing privacy-enhanced RFID schemes which have received wide attention in the literature. We then construct a secure refresh-based RFID system based on re-encryption techniques, and prove its privacy using the defined privacy model. Finally, we show that the proposed scheme can greatly enhance the security and privacy of EPC tags, making the maximum use of given tag functionalities as specified in the standards.
APA, Harvard, Vancouver, ISO, and other styles
48

Forsyth, Jason Brinkley. "Exploring Electronic Storyboards as Interdisciplinary Design Tools for Pervasive Computing." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/73538.

Full text
Abstract:
Pervasive computing proposes a new paradigm for human-computer interaction. By embedding computation, sensing, and networking into our daily environments, new computing systems can be developed that become helpful, supportive, and invisible elements of our lives. This tight proximity between the human and computational worlds poses challenges for the design of these systems - what disciplines should be involved in their design and what tools and processes should they follow? We address these issues by advocating for interdisciplinary design of pervasive computing systems. Based upon our experiences teaching courses in interactive architecture, product design, physical computing and through surveys of existing literature, we examine the challenges faced by interdisciplinary teams when developing pervasive computing systems. We find that teams lack accessible prototyping tools to express their design ideas across domains. To address this issue we propose a new software-based design tool called electronic storyboards. We implement electronic storyboards by developing a domain-specific modeling language in the Eclipse Graphical Editor Framework. The key insight of electronic storyboards is to balance the tension between the ambiguity in drawn storyboards and the requirements of implementing computing systems. We implement a set of user-applied tags, perform layout analysis on the storyboard, and utilize natural language processing to extract behavioral information from the storyboard in the form of a timed automaton. This behavioral information is then transformed into design artifacts such as state charts, textual descriptions, and source code. To evaluate the potential impact of electronic storyboards on interdisciplinary design teams we develop of user study based around ``boundary objects''. These objects are frequently used within computer-supported collaborative work to examine how objects mediate interactions between individuals. Teams of computing and non-computing participants were asked to storyboard pervasive computing systems and their storyboards were evaluated using a prototype electronic storyboarding tool. The study examines how teams use traditional storyboarding, tagging, tool queries, and generated artifacts to express design ideas and iterate upon their designs. From this study we develop new recommendations for future tools in architecture and fashion design based upon electronic storyboarding principles. Overall, this study contributes to the expanding knowledge base of pervasive computing design tools. As an emerging discipline, standardized tools and platforms have yet to be developed. Electronic storyboards offer a solution to describe pervasive computing systems across application domains and in a manner accessible to multiple disciplines.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
49

Shojanoori, Reza. "Towards formalisation of situation-specific computations in pervasive computing environments." Thesis, University of Westminster, 2013. https://westminsterresearch.westminster.ac.uk/item/8z17x/towards-formalisation-of-situation-specific-computations-in-pervasive-computing-environments.

Full text
Abstract:
We have categorised the characteristics and the content of pervasive computing environments (PCEs), and demonstrated why a non-dynamic approach to knowledge conceptualisation in PCEs does not fulfil the expectations we may have from them. Consequently, we have proposed a formalised computational model, the FCM, for knowledge representation and reasoning in PCEs which, secures the delivery of situation and domain specific services to their users. The proposed model is a user centric model, materialised as a software engineering solution, which uses the computations generated from the FCM, stores them within software architectural components, which in turn can be deployed using modern software technologies. The model has also been inspired by the Semantic Web (SW) vision and provision of SW technologies. Therefore, the FCM creates a semantically rich situation-specific PCE based on SWRL-enabled OWL ontologies that allows reasoning about the situation in a PCE and delivers situation specific service. The proposed FCM model has been illustrated through the example of remote patient monitoring in the healthcare domain. Numerous software applications generated from the FCM have been deployed using Integrated Development Environments and OWL-API.
APA, Harvard, Vancouver, ISO, and other styles
50

Günalp, Ozan Necati. "Continuous deployment of pervasive applications in dynamic environments." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM052/document.

Full text
Abstract:
L'émergence des nouveaux types d'environnements informatiques amplifie le besoin pour des systèmes logiciels d'être capables d'évoluer dynamiquement. Cependant, ces systèmes rendent très difficile le déploiement de logiciels en utilisant des processus humains. Il y a donc un besoin croissant d'outils d'automatisation qui permettent de déployer et reconfigurer des systèmes logiciels sans en interrompre l'exécution. Le processus de déploiement continu et automatisé permet de mettre à jour ou d'adapter un logiciel en exécution en fonction des changements contextuels et des exigences opérationnelles. Les solutions existantes ne permettent pas des déploiements reproductibles et tolérant aux pannes dans des environnements fluctuants, et donc requérant une adaptation continue. Cette thèse se concentre en particulier sur des solutions de déploiement continu pour les plates-formes d'exécution dynamiques, tels que celle utilisé dans les environnements ubiquitaires. Elle adopte une approche basée sur un processus transactionnel et idempotent pour coordonner les actions de déploiement. La thèse propose, également, un ensemble d'outils, y compris un gestionnaire de déploiement capable de mener des déploiements discret, mais également d'adapter les applications continuellement en fonction des changements contextuels. La mise en œuvre de ces outils, permet notamment aux développeurs et aux administrateurs de développer des déploiements d'applications grâce à un langage spécifique suivant les principes de l‘infrastructure-as-code. En utilisant l'implantation de Rondo, les propositions de cette thèse sont validées dans plusieurs projets industriels et académiques à la fois pour l'administration de plates-formes ubiquitaires ainsi que pour l'installation d'applications et leurs reconfigurations continues
Driven by the emergence of new computing environments, dynamically evolving software systems makes it impossible for developers to deploy software with human-centric processes. Instead, there is an increasing need for automation tools that continuously deploy software into execution, in order to push updates or adapt existing software regarding contextual and business changes. Existing solutions fall short on providing fault-tolerant, reproducible deployments that would scale on heterogeneous environments. This thesis focuses especially on enabling continuous deployment solutions for dynamic execution platforms, such as would be found in Pervasive Computing environments. It adopts an approach based on a transactional, idempotent process for coordinating deployment actions. The thesis proposes a set of deployment tools, including a deployment manager capable of conducting deployments and continuously adapting applications according to the changes in the current state of the target platform. The implementation of these tools, Rondo, also allows developers and administrators to code application deployments thanks to a deployment descriptor DSL. Using the implementation of Rondo, the propositions of this thesis are validated in several industrial and academic projects by provisioning frameworks as well as on installing application and continuous reconfigurations
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography