首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Many applications and services have emerged in the frame of new Internet of Things paradigm. This novel view has opened the Web services to a variety of devices especially to tiny and resource-constrained devices. Wireless Sensor and Actuator Networks belong to that kind of devices. Those networks have become one of the more promising technologies to take part in the Future Internet. However, the integration of Sensor and Actuator Networks into the Service Cloud is a hard challenge requiring specific new architectures and protocols. This paper presents a middleware approach addressing this important issue. A Knowledge-Aware and Service-Oriented Middleware (KASOM) for pervasive embedded networks is proposed. The major aim of KASOM is to offer advanced and enriched pervasive services to everyone connected to Internet. In this sense, KASOM implements mechanisms and protocols which allow managing the knowledge generated in pervasive embedded networks in order to expose it to Internet users in a readable way. General functional requirements of embedded sensor and actuator platforms have been taken into account when designing KASOM, with special attention in energy consumption, memory and bandwidth. The KASOM evaluation and validation will be demonstrated through a real Wireless Sensor and Actuator Network deployment based on integral healthcare services in a sanatorium.  相似文献   

2.
For a number of services with similar functionality reputation has been regarded as one of the most important methods to identify good ones from bad ones. However, a composite service, which is composed of multiple component services, obtains only one score (or feedback) after every invocation. In order to compute the reputation of each component service, it is necessary for the composite service to distribute this score to its component services. How to achieve a fair distribution is a challenging issue, as each component service may perform differently in contributing to the success or failure of the composite service. Although several efforts have been made for this problem, they do not consider the context of composition, which makes the distribution unfair. Therefore, in this paper, we propose a fair score distribution framework which combines the context of component services and their runtime performance. We distinguish two aspects contexts of a component service: structure-related importance and community-related replaceability, and adopt graph theory and dominating relationship technique to compute them, respectively. Experimental results show that our approach can achieve a more reasonable and fair score distribution than other existing methods.  相似文献   

3.
4.
Mobile applications are software packages that can be installed and executed in a mobile device. Which mobile application is trustworthy for a user to purchase, download, install, execute or recommend becomes a crucial issue that impacts its final success. This paper proposes TruBeRepec, a trust-behavior-based reputation and recommender system for mobile applications. We explore a model of trust behavior for mobile applications based on the result of a large-scale user survey. We further develop a number of algorithms that are used to evaluate individual user’s trust in a mobile application through trust behavior observation, generate the application’s reputation by aggregating individual trust and provide application recommendations based on the correlation of trust behaviors. We show the practical significance of TruBeRepec through simulations and analysis with regard to effectiveness, robustness, and usability, as well as privacy.  相似文献   

5.
In this paper we show how pervasive technologies can be employed on a public-display advertisement scenario to enable behavioral self-adaptation of content. We show this through MyAds, a system capable of exploiting pervasive technologies to autonomously adapt the advertisement process to the trends of interests detected among the audience in a venue. After describing the rationale, the architecture and the prototype of MyAds, we describe the advantages brought by the use of such a system, in terms of impact on the audience and economic efficiency. The comparison of MyAds performances with different advertisement selection techniques confirms the validity of our advertisement model, and our prototype in particular, as a means for maximising product awareness in an audience and for enhancing economic efficiency.  相似文献   

6.
Maintaining sound reputation requires robust control and investigation. In this paper, we analyze a reputation mechanism that objectively maintains accurate reputation evaluation of selfish agent-based web services. In the proposed framework, web services are ranked using their reputation as a result of provided feedback reflecting consumers’ satisfaction. However, selfish web services may alter their public reputation level by managing to get fake feedback. We investigate the payoffs of different scenarios by focusing on the issues that discourage web services to act maliciously. We also analyze the details of the proposed mechanism by discussing simulation and empirical results that fully depict the system parameters and show the feasibility of the proposed approach.  相似文献   

7.
An effective offloading middleware for pervasive services on mobile devices   总被引:1,自引:0,他引:1  
Shumao  Kun  Jie   《Pervasive and Mobile Computing》2007,3(4):362-385
The practical success of pervasive services running in mobile wireless networks and devices relies on their ability to provide effective and efficient offloading support, so as to satisfy the increasing demand for mobile devices to run heavier applications (e.g. those running on desktop PCs). Offloading is an effective mechanism for leveraging the severity of resource constrained mobile devices by migrating some computing load to nearby resource-rich surrogates (e.g. desktop PCs, servers) on home networks or their extension. This paper proposes a light-weight and efficient offloading middleware, which provides runtime offloading services for resource constrained mobile devices. The middleware considers multiple types of resources (i.e. memory, CPU and bandwidth) and carries out application partitioning and partition offloading in an adaptive and efficient manner. The corresponding algorithms are presented. The evaluation outcomes indicate the effectiveness and efficiency of this service offloading solution.  相似文献   

8.
9.
Does pervasive technology have a role to play in supporting the communication of busy couples? Especially when they are already living together and already have a high degree of awareness of each other’s rhythms of daily life, their whereabouts and needs? A two week long field study of an awareness system allowed eight working couples to automatically exchange place, activity and calendar information as well as messages and photos. Data analysis provides both qualitative and quantitative evidence which suggest strongly that such a system can provide support for availability, coordination, reassurance and affection for this group. Findings which inform the design of such systems are: the need for transitions in places instead of location information to support coordination, the two tracks of daily communication of busy parents (reassurance and emergency) and usability barriers in current mobile applications which prevent this group from engaging in photo sharing. The contexts and unexpected uses that participants found in the system are described in detail.  相似文献   

10.
As ubiquitous computing becomes a reality, its applications are increasingly being used in business-critical, mission-critical and even in safety-critical, areas. Such systems must demonstrate an assured level of correctness. One approach to the exhaustive analysis of the behaviour of systems is formal verification, whereby each important requirement is logically assessed against all possible system behaviours. While formal verification is often used in safety analysis, it has rarely been used in the analysis of deployed pervasive applications. Without such formality it is difficult to establish that the system will exhibit the correct behaviours in response to its inputs and environment. In this paper, we show how model-checking techniques can be applied to analyse the probabilistic behaviour of pervasive systems. As a case study we apply this technique to an existing pervasive message-forwarding system, Scatterbox. Scatterbox incorporates many typical characteristics of pervasive systems, such as dependence on sensor reliability and dependence on context. We assess the dynamic temporal behaviour of the system, including the analysis of probabilistic elements, allowing us to verify formal requirements even in the presence of uncertainty in sensors. We also draw some tentative conclusions concerning the use of formal verification for pervasive computing in general.  相似文献   

11.
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero accountability via anonymous online identities and divergent interests result in selfish behavior that can disrupt or manipulate networks for personal gain. While “reputation systems” are recognized as a promising means to establish social control for such communities, developing reliable reputation systems remains a challenge. Several unaddressed threats still limit the effectiveness of reputation systems. Furthermore, most existing work on reputations has focused on accurate reputations for stable systems, but not examined the implications of integrating user reputations into scalable distributed infrastructures. The primary goal of this paper is to investigate and address the critical open challenges that limit the effectiveness of reputations. First, we identify a thorough taxonomy on reputation management, and use it as our framework to classify adversarial threats that compromise reliable operation of reputation systems. Second, we survey existing research to address these threats. Finally, we present our solutions to address the two leading reasons for erroneous and misleading values produced by reputation systems today, i.e., user collusion and short-lived online identities. We believe that this paper not only serves as an introduction to reputation systems design, but will also help researchers deploy reliable reputation solutions that contribute towards improving the performance of large distributed applications.  相似文献   

12.
基于用户经验反馈的Web Services可信度评测体系构建   总被引:1,自引:0,他引:1  
吴建斌  吕刚 《计算机应用》2009,29(8):2291-2292
服务之间的可信度是Web Services推广和计价中必须考虑的一个问题。提出服务可信度的影响因素包括QoS可信度和用户对服务执行结果的满意程度。通过用户经验反馈,针对不同领域获取用户对相应服务的可信度评价量化值,并计算QoS的实际满足率,以此建立服务的可信度评测体系。针对QoS欺骗问题,通过定期QoS统计分析,及时进行QoS修正,保持服务的高可信度。通过在模拟系统中的试用,此可信度评测体系在持续欺骗服务实体和暂时性QoS失真情况下均较低为合理。  相似文献   

13.
PICO: a middleware framework for pervasive computing   总被引:2,自引:0,他引:2  
The pervasive information community organization is a framework for creating mission-oriented dynamic communities of autonomous software entities that perform tasks for users and devices. PICO's telemedicine example scenario demonstrates its potential as a simple, unique, and versatile middleware framework for pervasive computing.  相似文献   

14.
PvcwCORBA:普适计算环境中间件的实现   总被引:1,自引:0,他引:1  
张向刚  刘锦德 《计算机应用》2004,24(8):10-13,17
针对普适环境的平台的多样性、资源的有限性、设备的移动性和应用高性能要求等需求,提出了其中间件的设计和实现方法,并据此构建了pvcwCORBA。通过试验验证了pvcwCORBA作为支持无线接入功能的高性能、嵌入式CORBA,能够适应普适计算环境的要求。  相似文献   

15.
As of today, there is no operating system suitable for pervasive computing. Such system must integrate and coordinate heterogeneous devices and systems but, at the same time, it should provide a single system image to let the user feel that there is only a single “pervasive” computing environment. Such illusion must consider the Internet as the system backbone, because users move. The challenge is providing a novel system while permitting the seamless integration of traditional legacy systems, which may be required to run on many computers and devices, if only to run their applications. We argue that to build such a system, we should abandon Middleware and use a different technology, that we call Upperware. To back up our claim, we have built an actual system using Upperware: the Octopus. The Octopus has been in use for several years both to build pervasive applications like smart spaces and to provide a general-purpose computing environment. We have been using it through wide area networks, on a daily basis. In this paper we discuss the Upperware approach and present the Octopus as an actual system built out of Upperware, including some evaluation results.  相似文献   

16.
一种内生式信誉系统不实评价过滤方法   总被引:1,自引:0,他引:1  
提出一种应用于Beta reputation信誉系统的内生式不实评价过滤方法。该方法以交易次数的对数做为权重进行均值计算,以此限制评价者虚报过大交易量;以加权方差定义容限,识别并过滤与平均信誉度差别较大的评价。仿真结果表明,该方法能有效过滤不实评价,提高信誉计算的精度。  相似文献   

17.
随着Web服务技术的发展与广泛应用,提供相同功能的Web服务越来越多,而如何在其所提供的Web服务中选择最优服务成为关键问题.传统的基于服务质量(QoS)模型的选择方案已不能满足此要求.提出了一种基于信誉模型并结合QoS的优化选择方案,首先利用工作流组织模型确定服务使用者之间的信任度结,结合可信用户的反馈评价值,确定服务的主观信誉度,然后根据Web服务的QoS量化模型,计算出客观质量值,最后结合二者选出最优的服务.  相似文献   

18.
19.
The pervasive computing environment will be composed of heterogeneous services. In this work, we have explored how a domain specific language for service composition can be implemented to capture the common design patterns for service composition, yet still retain a comparable performance to other systems written in mainstream languages such as Java. In particular, we have proposed the use of the method delegation design pattern, the resolution of service bindings through the use of dynamically adjustable characteristics and the late binding of services as key features in simplifying the service composition task. These are realised through the Scooby language, and the approach is compared to the use of APIs to define adaptable services.  相似文献   

20.
Motorola Labs' Web-enabled museum system demonstrates how context-aware wireless Web services can adapt their content to a user's dynamic context.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号