ACM Transactions on Programming Languages and Systems (TOPLAS)
Modern control theory (3rd ed.)
Modern control theory (3rd ed.)
Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Rover: a toolkit for mobile information access
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
CyberDesk: a framework for providing self-integrating ubiquitous software services
Proceedings of the 10th annual ACM symposium on User interface software and technology
Reworking the RPC paradigm for mobile clients
Mobile Networks and Applications - Special issue on mobile computing and system services
The context toolkit: aiding the development of context-enabled applications
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
MOCA: a service framework for mobile computing devices
Proceedings of the 1st ACM international workshop on Data engineering for wireless and mobile access
An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The design and implementation of an intentional naming system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Challenges: an application model for pervasive computing
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mobile IP; Design Principles and Practices
Mobile IP; Design Principles and Practices
Java Language Specification, Second Edition: The Java Series
Java Language Specification, Second Edition: The Java Series
Policy Specification for Programmable Networks
IWAN '99 Proceedings of the First International Working Conference on Active Networks
Predator: A Distributed Location Service and Example Applications
CoBuild '99 Proceedings of the Second International Workshop on Cooperative Buildings, Integrating Information, Organization, and Architecture
Towards Context-Aware User-Modeling
USM '00 Proceedings of the Third International IFIP/GI Working Conference on Trends in Distributed Systems: Towards a Universal Service Market
A document-based framework for internet application control
USITS'99 Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2
Smart CAPs for Smart Its – Context Detection for Mobile Users
Personal and Ubiquitous Computing
Detecting Context in Distributed Sensor Networks by Using Smart Context-Aware Packets
ARCS '02 Proceedings of the International Conference on Architecture of Computing Systems: Trends in Network and Pervasive Computing
Performance evaluation of protocols for group-oriented mobile services
Mobile Networks and Applications
International Journal of Network Management
Sensor-driven adaptation of web document presentation
UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: applications and services
Network software platform design for wireless real-world integration applications
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Hi-index | 0.00 |
We describe an architecture that allows mobile users to access a variety of services provided by pervasive computing environments. Novel to our approach is that the system selects and executes services taking into account arbitrary contextual information (e.g. location or preferences). Our architecture is based on an adaptive service interaction scheme; individual service requests are attributed by context constraints, which specify the adaption policy. Context constraints may relate to spatial or temporal concerns. We propose a document-based approach; so called Context-Aware Packets (CAPs) contain context constraints and data for describing an entire service request. Intermediary network nodes route and apply the data to services, which match the embedded constraints. Services are identified by characterizing attributes, rather then explicit network addresses. The execution of selected services may be deferred, and triggered by a specific event. Service requests carry the context of their use, therefore our system works well in environments with intermitted connectivity, less interaction with the issuing requester is required.