Pervasive Computing for the 99%
نویسندگان
چکیده
A key limiting factor for the pervasive community has been the difficulty developing and deploying general purpose systems. Such systems should make application development easy, support a wide range of devices and sensors, and allow users to share these resources. Designing a multi-user middleware system that allows novice users to add arbitrary hardware and software raises several challenges, such as resolution between conflicting and stale data, managing data dependencies as software and hardware is changed, and tradeoffs between complexity and expressiveness in the API of such a system. We will discuss the feature set that could solve these problem, and test these features through a software implementation. We then evaluate the system after a year long deployment supporting smart office applications.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملSecurity in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
The best ebooks about Security In Pervasive Computing Second International Conference Spc 2005 Boppard Germany April 6 that you can get for free here by download this Security In Pervasive Computing Second International Conference Spc 2005 Boppard Germany April 6 and save to your desktop. This ebooks is under topic such as security in pervasive computing second international security in pervasi...
متن کاملDeploying fault tolerance and taks migration with NetSolve
Computational power grids are computing environments with massive resources for processing and storage. While these resources may be pervasive, harnessing them is a major challenge for the average user. NetSolve is a software environment that addresses this concern. A fundamental feature of NetSolve is its integration of fault-tolerance and task migration in a way that is transparent to the end...
متن کاملSimulation to help calibration of a MEMS sensor network
The Smart Surface1project aims at designing an integrated micro-manipulator based on an array of micromodules connected with a 2D array topology network. Each micromodule comprises a sensor, an actuator and a processing unit. One of the aims of the processing unit is to differentiate the shape of the part that is put on top of the Smart Surface. From a set of shapes this differentiation is done...
متن کاملThe use and effectiveness of anti-virus software
This study evaluates the effectiveness of currently available antivirus software. The brand of anti-virus software appears to make a slight difference in identifying viruses on network servers. When individual company workstations were evaluated, no significant differences were detected across products. In general, current users are satisfied with their anti-virus software. Adequate financial r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011