Adaptability and Interfaces: Key to Efficient Pervasive Computing

نویسنده

  • Arkady Zaslavsky
چکیده

As mobile and embedded computing devices become more pervasive, the nature of interaction between users and computers is evolving. Computing applications need to become increasingly autonomous and invisible, by placing greater reliance on knowledge of context in which they are running and reducing interactions with users. Moreover, due to the current popular emphasis onànytime, anywhere' computing, applications must cope with highly dynamic environments in which resources, such as network connectivity, bandwidth, security and software services, vary over time and therefore applications' behaviour and functionality have to adapt (adjust) to currently available resources and constraints. One example of varying resources comes from a requirement that users can use multiple and potentially heterogeneous computing devices and switch between those (eg, a workstation to a mobile laptop, or PDA (Personal Digital Assistant), then to a mobile phone) while still participating in distributed computational activities. To enable such change of devices, applications have to adapt to a variety of displays, various CPU capabilities, presence or absence of a hard disk and varying bandwidth of communication channels. Pervasive computing is believed to be a computing paradigm incorporated in a variety of devices (computers, cars, entertainment units, appliances, etc.), which can carry out computational activities in a relatively non-intrusive manner and can impact and support many aspects of work and everyday life. Pervasive systems need to be aware of their environment and associated resources (i.e. aware of their context), able to detect changes in the environment (context changes) and can adjust/adapt their functionality and behaviour to the changes. Pervasive computing systems represent a natural extension and evolution of mobile/ubiquitous/nomadic computing systems, which first emerged in the early 90s. While recognizing diversity and enormity of pervasive computing related issues, I reckon that ultimate success of this paradigm depends on useability of pervasive applications. I would identify the following important issues that need to be addressed by mobile and pervasive computing community. • Adaptability • Flexible customisable interfaces, both present in the device and around it • Context management, including location • Accuracy & credibility vs. disconnection-transparent continuous execution, mobile transaction accuracy thresholds • Direct and indirect methods of location (and other context attributes) verification The rest of this position paper is structured accordingly. Adaptability. System stability could be viewed from the perspectives of functional and behavioural stability. Functional stability refers to systems adherence to design specifications and its ability to achieve the expected outcomes from individual components …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Evolutionary Computing Assisted Wireless Sensor Network Mining for QoS-Centric and Energy-efficient Routing Protocol

The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...

متن کامل

An Enhanced MSS-based checkpointing Scheme for Mobile Computing Environment

Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...

متن کامل

ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications

To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of self-healing mechanism cannot be overlooked. Incorporation of efficient fault detection and recovery in device itself is the quest for long but there is no existing self-healing scheme for devices running in pervasive computing environments that can be claimed as the ultimate solution. Moreover, the hi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002