Decentralized Constraint Checking for Pervasive Computing

نویسنده

  • Chang Xu
چکیده

As computing becomes more pervasive, smart computing devices are increasingly connected. Applications provide pervasive services based on contexts of their host devices as well as other connected devices. However, the use of contexts commonly follows a centralized approach, i.e., copying all required contexts of other devices to one device that performs a computing task. This causes space overhead and privacy threats to resource-limited, personal devices. In this paper, we propose a constraint-based approach to systematically decentralizing constraint-expressed computing tasks to connected devices. This approach is expressive to support pervasive computing tasks such as situation evaluation to complete in a device-collaborating way. We show that the approach is effective for reducing space cost and protecting device privacy in pervasive computing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Checking Behavioral Consistency Constraints for Pervasive Context in Asynchronous Environments

Context consistency checking, the checking of specified constraint on properties of contexts, is essential to contextaware applications. In order to delineate and adapt to dynamic changes in the pervasive computing environment, context-aware applications often need to specify and check behavioral consistency constraints over the contexts. This problem is challenging mainly due to the distribute...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Decentralized Diagnosis and Diagnosability by Model Checking

This paper talks about a decentralized approach for diagnosis of discrete event systems based on the plant decomposition. A decentralized structure is used to avoid state space explosion found in centralized structure or decentralized structure with composition step. From plant models, all possible faults are identified to construct abnormal behavior models called diagnosers. Originality of thi...

متن کامل

Formal Method in Service Composition in Heath Care Systems

One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics of these systems, formal methods are used for specification, description and verificati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008