Understanding and Using Context
Personal and Ubiquitous Computing
The what, who, where, when, why and how of context-awareness
CHI '00 Extended Abstracts on Human Factors in Computing Systems
Chisel: A Policy-Driven, Context-Aware, Dynamic Adaptation Framework
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
WildCAT: a generic framework for context-aware applications
MPAC '05 Proceedings of the 3rd international workshop on Middleware for pervasive and ad-hoc computing
An Aspect-Oriented Approach to the Modularisation of Context
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
A methodology for preference-based personalization of contextual data
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Dynamo: dynamic monitoring of WS-BPEL processes
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
SOAdapt: A process reference model for developing adaptable service-based applications
Information and Software Technology
A monitoring mechanism to support agility in service-based application evolution
ACM SIGSOFT Software Engineering Notes
Exploiting Codified User Task Knowledge to Discover Services at Design-Time
International Journal of Systems and Service-Oriented Engineering
Exploiting Codified User Task Knowledge to Discover Services at Design-Time
International Journal of Systems and Service-Oriented Engineering
Hi-index | 0.00 |
When building service-oriented systems the evolution of requirements and context is the norm rather than the exception. Therefore, it is important to make sure that the system is able to evolve as well without necessarily starting a completely new development process, and possibly on the fly. In this paper we specifically focus on the role of the context in the adaptation activities. For us context has various different facets as it includes information ranging from the situation in which users exploit a service-based application to the conditions under which the component services can be exploited. We elaborate on how and when the context should be defined, exploited, and evolved, and on the impact it has on the various activities related to adaptation of service-based applications. We use a case study to exemplify our first findings on this subject.