A Kind of Context-aware Computing Approach for Proactive Service
نویسنده
چکیده
We focus on modeling and computing of aware context with uncertainty for making dynamic decision during seamless mobile service. We re-examine formalism of random set, which is not finite-set statistics (FISST), argue the limitations of the direct numerical approaches, give new modeling mode based on random sets theory (RST) for aware context, and propose our computing approach of modeled aware context. In addition, we extend classic D-S evidence theory after considering reliability, time efficiency, relativity of context, and compare these two kinds of relative computing methods for uncertain context. By comparing, the validity of new context-aware computing approach based on improved random set theory (IRST) or extended D-S evidence theory (EDS) for proactive service has been tested.
منابع مشابه
A Study on Effective Proactive Service in Pervasive Computing Environment
Pervasive systems are becoming increasingly popular, with the appearance and penetration of mobile devices such as smart phones. Proactive service is one of the most important fields of research in pervasive computing. We propose a method for an effective proactive service in pervasive computing environment. Most of previous researches do not consider characteristics of both social network and ...
متن کاملEnergy Aware Resource Management of Cloud Data Centers
Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Virtualization technology forms a key concept for new cloud computing architectures. The data centers are used to provide cloud services burdening a significant...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملContext-aware Mobile Recommendation System Based on Context History
Recommendation systems for the mobile Web have focused on endorsing specificr content based on user preferences. But, user preferences vary in different contexts, such as at different times of day and in different locations. Therefore, in a mobile networking setting, providing proactive personalized service is more likely to depend on actual user context. This paper proposed a context-aware mob...
متن کامل