Plugin-Orb for Applications in a Pervasive Computing Environment

نویسندگان

  • Antonio d'Acierno
  • Giuseppe De Pietro
  • Antonio Coronato
  • Giuliano Gugliara
چکیده

Pervasive computing environments aim to integrate components which are highly heterogeneous, not only in terms of software technologies, but also in terms of hardware resources. Unfortunately, classic middleware platforms do not appear able to cope with such a level of heterogeneity and new communication mechanisms are thus required. This paper presents Plugin-Orb, an adaptive middleware for mobile and embedded devices with poor resources. Plugin-Orb aims to obtain a communication mechanism which would make a client application able to inter-operate with server objects running over different middleware technologies using an unified communication interface, thus having the programmer able to develop applications without taking into account underlying middleware technologies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

A dynamic Architecture for Pervasive Computing

Pervasive Computing infrastructures have become widespread and sensors are getting increasingly smaller. PDAs or mobile phones are already used everywhere. But many applications have not yet taken mobility and pervasiveness into account. Due to teh lack of an appropriate supporting infrastructure. At ETHZ we have developed a new infrastructure for pervasive computing Jadabs. Jadabs has a small ...

متن کامل

Data Replication-Based Scheduling in Cloud Computing Environment

Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005