A component and communication model for push systems
ESEC/FSE-7 Proceedings of the 7th European software engineering conference held jointly with the 7th ACM SIGSOFT international symposium on Foundations of software engineering
The IEEE 802.11 Handbook: A Designer's Companion
The IEEE 802.11 Handbook: A Designer's Companion
Bluetooth Revealed
CRPIT '02 Proceedings of the Fortieth International Conference on Tools Pacific: Objects for internet, mobile and embedded applications
Principles of Real-Time Programming
EMSOFT '02 Proceedings of the Second International Conference on Embedded Software
Mobile software agents for location-based systems
NODe'02 Proceedings of the NODe 2002 agent-related conference on Agent technologies, infrastructures, tools, and applications for E-services
User mobility modeling and characterization of mobility patterns
IEEE Journal on Selected Areas in Communications
Personal and Ubiquitous Computing
A semantic location service for pervasive grids
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Location and tracking services for a meta-ubicomp environment
MIS'04 Proceedings of the 2004 international conference on Metainformatics
Hi-index | 0.00 |
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for moving users, objects, and devices. Their growing number has strong implications on the bandwidth of wireless and wired networks. Network bandwidth becomes a scare resource and its efficient useis crucial for the quality of service in pervasive computing. In this article we study process models for detecting location changes of moving objects and their effecton the network bandwidth. We simulate a scenario of 104 moving objects for a period of 107 time cycles while monitoring the quality of service with respect to network bandwidth for different location detection strategies. The simulation shows that the class of strategies implementing a synchronous model offers better quality of service than the timed model. We conclude the article with a set of guidelines for the application of the strategies we have investigated.