Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Â
A dhoc networks
1.
2. ī¨ The Telecom Market and Evolution of Cellular
Standards
īĄ Infrastructure will support diverse range of data services
īĄ Currently data usage is low
īĄ Mobile telephony is much more popular than fixed systems
īĄ Asia Pacific, Middle East and Africa has tremendous potential for
subscription (around 17-20% currently)
īĄ Subscribers do not prefer to pay more for innovative services
īĄ Mobile devices evolved incrementally to support camera, gaming, e-
wallet, mp3 player
īĄ Operators have diverse standards which makes subscriberâs life
difficult (e.g. call forward, voicemail)
īĄ Opportunity is to have IP enabled infrastructure for all the services
īĄ Mobile devices are supporting multiple network interfaces
īĄ Services bundling can be interesting from user point view
īĄ IP enabled network supports all possible Multi-Media services
3. ī¨ The Telecom Market and Evolution of Cellular
Standards
īĄ IP, SIP and IMS (IP Multimedia Subsystem)
īĄ IMS control: Rules, SIP: Map, IP: Roads
īĄ Multi-Vendor and Multi-Operator IMS can run on
top of diverse networks
4. ī¨ The Telecom Market and Evolution of Cellular Standards
īĄ HSPA: High Speed PAcket Access
īĄ SPEED: Higher bit rates 40 / 10 Mbps
īĄ Reduced delay
īĄ Capacity: Targeting almost double number of VoIP users
īĄ The key is that the user should be able to afford the technology in terms of money
īĄ 2Q06: Mobile phone with HSDPA with 1.8 Mbps, PC card with 3.6 Mbps
īĄ 2H06: Volume handsets 3.6 Mbps
īĄ 1H07: PC cards and handsets with 7.2 Mbps DL
īĄ Enhanced uplink support, 1.46 Mbps
īĄ GPRS, EDGE, WCDMA, HSDA chipsets are lightweight
īĄ WiMax (Wireless Broadband) X HSPA (Mobile Broadband) have different starting points â
different use
īĄ 3G LTE (Long Term Evolution): Multiple Receivers on a mobile device
īĄ 3G LTE testbed: Up to peak 100 Mbps DL and 20 Mbps UL
īĄ In short: The cellular networks are going to provide substantial data rates for DL/UL
īĄ Future looks good!
5. ī¨ Mobility Metrics to Enable Adaptive Routing in
MANET (Carleton University, Canada)
īĄ Mobile nodes adjusts its routing behavior individually based
on its environment to improve routing performance
īĄ Need to generalize adaptiveness in the routing protocols
īĄ Change routing params based on environment
īĄ Mobility metrics: Parameters that represent current mobility
status a node can monitor: no. of link breaks, relative mobility,
link duration
īĄ If every node can adjust its routing behavior based on network
conditions around it, the protocol performance can be
improved!
īĄ The knowledge of link breaks can be used to tune the protocol
params e.g. hello interval for improved performance
6. ī¨ Routing with uncertainty in the position of the
destination (Carleton University, Canada)
īĄ For position based routing algorithms
īĄ What if the source is uncertain about the position of
the destination? (source may have knowledge about
destinationâs speed)
īĄ 2 phases: Reach some node in the region
īē Flooding is resource intensive and still does not guarantee
delivery if the node has moved outside the region
īē Hybrid approaches are proposed to improve delivery rate
and reduce transmission cost
7. ī¨ Multi-path routing based secure data
transmission in Ad Hoc networks (Washington
State Uni., VS)
īĄ Detecting misbehaving nodes which ca drop the
packets going to the destination
īĄ Multipath routing combined with feedback
mechanism
īĄ Remove the misbehaving path from the sourceâs
cache
īĄ Sybil attack (a node keeps multiple identities) fails
the scheme
8. ī¨ A mobility prediction based weighted
clustering algorithm using local cluster-heads
election for QoS in MANETs (Univ. of Guelph,
Canada)
īĄ Not presented
9. ī¨ A Fault Tolerant Routing Algorithm for Mobile
Ad Hoc Networks Using a Stochastic Learning
Based Weak Estimation Procedure (Carleton
University, Canada)
īĄ Fault tolerance is important because of adversarial
conditions in MANET
īĄ Use stochastic learning
10. ī¨ Cooperative Caching with Adaptive Prefetching in
MANET (University of Guelph, Canada)
īĄ Caching in MANET can be used for data caching, route caching
īĄ Proposed work combines cooperative caching with prefetching
īĄ Uses clusturing architecture to reduce overhead
īĄ Uses hybrid cache replacement policy
īĄ Cooperative: Neighbor store items and provide them
īĄ Prefetching: Proactively fetching most frequently accessed data
īĄ Increases data accessibility ratio and query delay at lower
prefetch thresholds and larger cache sizes
11. ī¨ An Abstract Model for Supporting
Interoperability in MANET (American
University of Beirut, Lebanon)
īĄ Consider the situation where mobile node is
facilitated with multiple network interfaces
īĄ Proposes communication abstract model supporting
interoperability and coexistence between
heterogeneous mobile devices
īĄ Communication service layer, capability layer,
interface layer
12. ī¨ A Tabu Search Heuristics for the Global
Planning of UMTS Networks (Ecole
Polytechnique de Montreal, Canada)
īĄ Tabu search heuristics for global planning problem â
cell planning, access network planning, core network
planning
13. ī¨ Indoor wLAN planning with a QoS constraint
based on a Markovian Performance Evaluation
Model (INSA Lyon, France)
īĄ Get the best possible network QoS configuration
īĄ Realistic planning solutions with limited
computational load
īĄ Optimization criteria: coverage, interference
avoidance, throughput guarantee (mean available
bandwidth to the user)
īĄ However, is static approach, does not take into
account dynamic behavior of the users
14. ī¨ Performance (evaluation) of multi-interface
based wireless mesh backbone to support VoIP
service delivery (CTTC, Spain)
īĄ For 802.11 based network to provide VoIP services
īĄ The available E-Model predicts the voice quality of a
phone call using transmission params to provide
numerical indication of quality of a call (R-Factor)
īĄ The degradation occurs because when number of
subscribers increase, the nodes compete for channel
access with other nodes located beyond their
transmission range, thus increasing delay
15. ī¨ IEEE 802.11 handover assisted by GPS
information (LSIIT, France)
īĄ Targets the problem of link and network layer
handover when a mobile node roams through access
points
īĄ Choose the closest AP based on location obtained
using GPS sensing
īĄ Reduces the layer 2 and 3 handover latencies
16. ī¨ Performance evaluation of dynamic networks
using an evolving graph combinatorial model
BEST STUDENT PAPER AWARD (University
of Sao Paulo, Brazil)
īĄ Fixed Schedule Dynamic Networks (FSDN): MANET
with predictable dynamics e.g. satellite network
īĄ Assess applicability of evolving graph theory in the
construction of efficient routing protocols in realistic
scenarios
īĄ Comparison of EGproto with DSDV, DSR and AODV
īĄ EGproto is most suitable for FSDNs
17. ī¨ Resource Management for End-to-End QoS in a
Mobile Environment (LaBRI Laboratory,
France)
īĄ Resource management for E2E QoS based on QoS
NSLP signaling aplication
īĄ Use QoS NSLP messages to make reservation in
advance to reduce the impact of handover on QoS
18. ī¨ A New SCTP mobility Scheme Supporting Vertical
Handover (LARIM, Canada)
īĄ Vertical handover: Across heterogeneous mobile environments
īĄ Related work on 3G/WLAN integration
īĄ Use of SCTP (Stream Control Transmission Protocol): A
mobility management for IP-based networks that focuses on
the transport and session layers instead of network layer
īĄ
īĄ SCTP+:
īē Simultaneous dynamic address reconfiguration
īē Everything is simulated
īē Possibly can use Arjanâs work for context detection
19. ī¨ On Channel Selection Strategies for Multi-Channel MAC protocols
in Wireless Ad Hoc Networks (University of Calgary, Canada)
īĄ Multi-Hop ad-hoc networks: hidden terminal and exposed terminal
problem
īĄ Multi-channel MAC protocols: Use of different channels for different
purposes
īĄ Bi-Directional MC MAC protocol: Good for TCP because data and ack
can be sent over different links
īĄ Problems:
īē Does it matter how channels are chosen?
īē Impacts on performance
īĄ Channel selection: Random selection, lowest channel available
īĄ Soft channel: Select one used previously or use above selection
īĄ Soft channel is better: 100% TCP throughput improvement is possible
with Soft Channel Reservation
20. ī¨ Location based services and positioning
methods in urban heterogeneous mobile comm
networks
21. ī¨ A Distributed Architecture for Reasoning about Higher Level
Context (Dresden Univ. of Tech., Germany)
īĄ Deals with higher level context
īĄ Dynamics of primitive context
īĄ Knowledge base, empirical ambient knowledge (EAK), aggregators for
aggregation of primitive context, composer composes higher level
context information
īĄ Bayesian Composer which computes posterior probabilities in order to
discriminate between various contextual states, and likelihood
estimates to revise belief of EAK
īĄ Applications in Heath Care (stress level), Activity Assistance,
Adaptive Multimodal Systems (which kind of user interface to use?)
īĄ Bayesian Network helps to capture higher level context even if only a
subpart of its aspects could be captured
īĄ Use ontologies which are application specific
22. ī¨ A Media Access Protocol for Proactive Information
Discovery in Ubiquitous Networks (Univ. of Tokyo,
Japan)
īĄ A node selects an adequate broadcast rate considering the
network topology to deal with collision problems
īĄ Fame size in the Framed Aloha has a tradeoff of delivery time
and collision
īĄ Discovery time represents time required to discover neighbors
with some probability
īĄ Example of service discovery is shop discount application in
which devices in shops provide discount information
īĄ Frame size is selected adaptively after considering the
requirements of the discovery time (e.g. 4 secs)
23. ī¨ Indexing Mobile Objects: A strategy for
supporting Dynamic Channel Allocation in
Cellular Networks (Univ. of Fortaleza, Brazil)
24.
25. ī¨ A Hybrid Model of Context-Aware Service
Provisioning Implemented on Smart Phones (Helsinki
Institute of Info. Tech., Finland)
īĄ Services are scattered in the network, no complete access to
userâs context and recommendations are important
īĄ Services can be centralized or distributed (P2P)
īĄ Hybrid model is service generated but user annotated
īĄ In Hybrid model, service selection is based on service
annotation (recommendation by user) which is linked to the
service
īĄ Implementation: for guided sailing in the area full of islands
īĄ Real trial with 9 sailboats, 28 participants Nokia 6630 + BT-GPS
device
īĄ Technical problems due to 2G/3G handovers and GPS device
disconnections
26. ī¨ Wireless Web Services Using Mobile Agents and Ontologies (University
of Athens, Greece)
īĄ Use of mobile agents to find the services from the service registry
īĄ Users invoke a set of services with only one interaction with the fixed network
īĄ User off-line operation
īĄ MA is user representative in the fixed network
īĄ Moves, finds, executes SWS and deliver results to the user
īĄ RSA is Registry Stationary Agent and acts as a broker between
īĄ PSA resides in the host offering service
īĄ WSP (Web Service Provider) provides service expressed in WSDL and OWL-S
īĄ Performance evaluation has been done for various systems
īē Conventional WS business model
īē MA framework with stationary agents
īē w/o agents
īē Hybrid
īĄ MA cloning has also been considered
27. ī¨ Generating and Supporting Dynamic Heterogeneous MAS (Monash
University, Australia)
īĄ Run time support is an important element of any MASs
īĄ Planning is based on the mission
īĄ Plan is a Directed Acyclic Graph based on Task Decomposition Graph (TDG)
īĄ Intermediate nodes of TDG are compound tasks
īĄ Leaves of TDG are primitive tasks
īĄ Build the plan top-down and execute bottom-up
īĄ Mission is a tuple (o, P, A, Z)
īĄ Planâs structure is dynamic and evolving as the mission is executed
īĄ Mission execution history is captured and preserved
īē To suspend and resume mission execution
īĄ Extensive performance evaluation has been done
īĄ MAs can be interfaced with Web Services where MAs execute web services
locally on the servers they visit
28. ī¨ An Agile Vertical Handoff Scheme for Heterogeneous Networks
(National Chung Hsig University, Taiwan)
īĄ How to achieve seamless vertical handoff?
īĄ How to pass NAT gateway and adapt TCP behavior?
īĄ Multiple communication networks
īĄ Vertical handoff is in heterogeneous networks (e.g. wireless LAN to
3G)
īĄ Previous approaches include using Mobile IP with m/cast, COA is
changed to m/cast address
īĄ In NAT, the problem is that the comm. Must be initiated by private
n/w
īĄ Vertical hand-off does not work in case of IP address change
īĄ Solution is to use old IP address? (what happens when new IP address
is assigned?)
īĄ Use of Contention window size for TCP adaptation
īĄ Implementation in Linux â changes to communication manager
īĄ
29. ī¨ Introducing Reliability and Load balancing in Home Link of
Mobile IPv6 Based Networks (Southern Methodist Univ. USA)
īĄ In addition to Mobile IPv4, Mobile IPv6 allows multiple HA in home
network
īĄ Problem TBA is what happens one of the HA fails in IPv6 and home
link fails?
īĄ Introduced VHA Reliability P on top of which V Ho Link and V Ho
Network Protocols
īĄ All home Agents have one global IP Address which is resolved to one
of the HAs
īĄ Every HA is active, backup or inactive
īĄ Use of Heart Beats to detect failure
īĄ Use of multiple links for fault tolerance
īĄ Simulation using OPNET
30. ī¨ Modeling and Using Context in Adapting Applications to Pervasive
Environments (LIRIS-INSA, France)
īĄ Context is set of external parameters (only for legacy applications, depends
whether to interpret external or internal) that modify the behavior of
application by defining new views on its data and services
īĄ SECAS Architecture takes care of capturing, disseminating and adapting to the
context
īĄ Context (subject, predicate, value, time, certainty)
īĄ Intelligent and semantic processing is handled by ontologies
īĄ High level context is reasoned from low level context
īĄ Functional model of application is application service description + service
description
īĄ Initial functional model is adapted based on context information
īĄ Adaptation rules are defined for adaptation action
īē Pairs (context situation + adaptation action)
īĄ Implementation for healthcare domain
īĄ Future work on content adaptation module and UI adaptation module
31. ī¨ A Scalable Execution Control Method for Context-dependent Services (NTT
DoCoMo, Japan)
īĄ Context dependent services: Recommendation services, child surveillance, healthcare
service, friend-finder service
īĄ In case of large number of services, context needs to be gathered from various sources
īĄ Components for context acquisition (e.g. cell phones with GPS device)
īĄ Context collection
īĄ Service has execution conditions based on collected context
īĄ Determination of execution: calculate expected utility and choose one with higher EU
īē Utility: Effect of execution/non-execution for the user
īĄ The time at which execution condition is likely to be satisfied is anticipated
īē Predict context values
īē Utility in the future can be estimated using predicted values
īĄ Use Bayesian networks for probability
īĄ Can be used for MSP in proactive adaptation
īĄ Simulation for restaurant recommendation system where user is looking for the restaurant
within particular area
īĄ The services provide the recommendation for the particular instance
īĄ Gather context when service execution condition is about to be satisfied â context is
location of the user and availability of tables
32. ī¨ Situation Awareness: Dealing with Vague Context (University of Athens,
Greece)
īĄ Situation: logically interrelated context
īĄ Proposed context model deals with inexact situation determination through
Fuzzy Inference rules
īĄ Situation awareness: Reasoning (Determination) and Activation
īĄ Situation are modeled using Ontologies: Similar situations means similar
contexts from specific ontologies
īĄ Resoner selects most similar situation SMax, each situation that subsumes
SMax, each situation compatible with SMax, each situation maximizing
similarity function
īĄ Uncertain decision is taken close to ânotificationâ boundaries
īĄ Fuzzy rules to decide whether to perform a specific task based on the current
user situation
īĄ Ontologies used: IEEE SUO, GUMO< FOAF< FIPA< DAML-Time/Time Entry
īĄ Racer and Fuzzy Jess for reasoning
33. ī¨ Granular Best Match Algorithm for Context-Aware Computing Systems
(Middle East Technical University, Turkey)
īĄ Dealing with the multi-granular and fuzzy context information
īĄ Matching: Pattern matching, string match, fuzzy and app. match
īĄ Context matching issues: Provided context vs. desired context, unique
characteristics of contextual information, different abstraction levels,
uncertainty, different representations
īĄ Granular best match: proposed for subjective, fuzzy, multi-granular and multi-
dimensional characteristics of context information
īē Use of weight and threshold parameters for matching
īē Weight specifies the importance from the user point of view, threshold specifies the
triggering criteria
īĄ Implementation Using CA Personal Reminder Agent tool (Location, Time,
People, Activity, Aggregate)
īē Scenario 1: Context history search from previously recorded contexts
īē Scenario 2: Reminder creation (Remind for purchasing gift when I am not busy and
near shopping center)
34. ī¨ Personalizing Pervasive Services on Top of
Heterogeneous Networks (University of Exeter,
UK)
īĄ DAIDALOS project to provide a universal and open
service platform to offer pervasive services to
application developers in a transparent way
īĄ User preferences are non-logic based
(attribute/value), modeled using ontologies
īĄ Targeted for service composition, QoS configuration,
and privacy consideration
īĄ In QoS: User changes the session from terminal A to
B results in session transfer, QoS adaptation
35. ī¨ Designing Pervasive Services for Physical Hypermedia
(Universite de Lyon, France)
īĄ Physical Hypermedia: Organizing Collections of Mixed
Physical and Digital Material (e.g. building supplemented by
web pages)
īĄ Hypermedia: A database format similar to hypertext in which
text, sound, or video images related to that on a display can be
accessed directly from the display
īĄ Design and implementation of a software substrate for
pervasive applications in physical hypermedia
īĄ Prototype: Extension of SOA for location aware applications
with the notion of navigation activity (Navigation Aware
Services)
36. ī¨ Stream Processing in Networks of Smart
Environments (Humboldt University of Berlin,
Germany)
īĄ Business apps aim to integrate data for smart devices
(sensors) which have properties of data streams
īĄ For sensors, communicating is much more energy
consuming than calculations
īĄ The problem of determining stream window size is
NP hard
īĄ Solved using GA
īĄ Optimization params: Message delay, value based
errors, node specific energy consumption
37. ī¨ An Affinity-driven Clustering Approach for
Service Discovery and Composition for
Pervasive Computing (Univ. of Belfort-
Montbeliard, France)
īĄ Adaptive Servers/Client paradigm (service goes to
client) and Spontaneous Service Emergence
paradigm have emerged over the current CS
paradigm
īĄ Objective is to take a Self-Organizing approach to
Service Discovery and Composition
īĄ Self organizing approach: nodes can establish
relationships between them based on their affinity
īĄ Affinity values can be adjusted run-time
īĄ Equation calculates affinity between nodes
38. ī¨ Rule Based Approach Towards Context-Aware
User Notification Service (Fraunhofer Institute,
Germany)
īĄ Notification service should provide unified way to
notify the changes in the environment
īĄ ANS â Awareness and Notification Service
īē Rule based approach
īē Enables users to state what they are interested in
īē ANS consists of Knowledge repository, Notification Profile
Manager, Rule Engine, Notifier
īē ANS rule language consists of: Clause and Semantics e.g.
Upon leaveRoom() When IsOnline() Do Notify()
39. ī¨ Building Mobile Augmented Reality Services in
Pervasive Computing Environments (Waseda
University, Japan)
īĄ Too many appliances with control panels, and
remote controls
īĄ Tangible UIs and Universal Remote Controllers have
been proposed
īĄ Vidgets: To control home appliances using PDA like
devices
īē Mobile code: Download controlling s/w automatically
īē Deal with search, select and use appliances which have
sensors
40. ī¨ A Service Provisioning System for Distributed
Personalization with Private Data Protection
(NTT DoCoMo, Japan)
īĄ Service behavior adapts according to various data
however data can not be accessed (privacy problem)
īĄ Userâs private data - > Rule calculation -> Service
execution
īĄ Scenario on restaurant selection based on user
preferences (e.g. type of restaurant, budget)
41. ī¨ Using A 2D Colorized Barcode Solution for
Authentication in Pervasive Computing (William
Claycomb, New Mexico Tech, USA)
īĄ The problem is how to exchange information securely?
īĄ Ubicode: Using digital camera to capture an image of tag and
decode information within
īĄ Improvement: Expand Barcode capacity by adding color
īĄ The tag has details of Network address, hash of hostâs public
key
īĄ Mobile takes a picture of visual tag, extracts net. Address and
requests hostâ public key
īĄ Verification of public key using Hash code in the tag
īĄ 1584 images tested
42. ī¨ ARPM: An Adaptive Routing Protocol for
MANETs (University Claude Bernard Lyon,
France)
īĄ Adapts the routing process to the mobility of nodes
īĄ A node perception of the topological changes is
measured by the neighborhood change
43. ī¨ Mobile Personal Agents for Smart Spaces (University of
Alcala, Spain)
īĄ Smart env. Uses sensors
īĄ SETH: Smart EnvironmenT Hierarchy is a hierarchy of smart
spaces (e.g. City -> Home -> Car)
īĄ SETH devices: Devices w/o and with Agents
īĄ Identification and Personal devices
īĄ Device, System, Service and Personal Agents
īĄ PA uses Context Agents and Service Agents
īĄ PA migrates whenever and wherever user requests service
īĄ Assumes that there are no personal devices
44. ī¨ Predictive Mobility Models based on Kth
Markov Models (University of Franche-Comte,
France)
īĄ Markov Models have been used previously to
mobility predictions
īĄ Threshold is used to determine for the selection of
state and it can trigger complete or partial handoff
45. ī¨ Mobile Environmental Knowledge Assistant
(INSA Lyon, France)
īĄ Each player in mobile environment is as agent
īĄ Agent consists of knowledge represented by
ontology and a decision mechanism (associated to
utility function)
īĄ Agents create community and other agents can
participate in the community
īĄ User devices are personal agents while sensors are
context agents e.g. foot pressure sensor is context
agent while personal assistant of traveler is personal
agent
46. ī¨ A flexible and extensible component-oriented
middleware for creating CA applications in
Java (Catholic Univ. of Minas Gerais, Brazil)
īĄ Not presented
47. ī¨ A Client Side Architecture for Supporting Pervasive
Enterprise Communications (Vanderbit University,
Avaya Labs, USA)
īĄ Business processes need to communicate with people and
connect people with each other
īĄ HERMES middleware connect the people at right time with the
right communication media
īĄ User presence, communication activity, communication device
characteristics are important context, nature of request,
enterprise/personal rules/policies are other factors
īĄ Client side should take care of application user dialogues,
session management and transparency
īĄ Multimodal interfaces are being considered e.g. mobile phones
48. ī¨ Adaptation Methodology for the Deployment of Mobile Component based
Applications (INT, France)
īĄ Mobile devices are subject to communication and computation context changes which
results in repetitive deployment tasks
īĄ Deployment params are application architecture, placement of each component,
component implementation, property values
īĄ Vary deployment params according to the context information
īĄ Adaptation rule are association between context constraint to parameter
īĄ Propertiesâ adaptation rules are for functional and non-functional properties
īĄ Application level rules specify variability of app. architecture according to context and
complete component level rules that depend on the application semantics
īĄ Obligatory and optional components/connections â optional require specification of
context constraints
īĄ Consistency check on the application rules
īĄ Deployment adaptation
īē Collect context, filter context, extract deployment adaptation rules
īē Check the existence of the component
īē Determine connections between components
īē Use generic algorithm for the placement and implementation of components
īĄ CCM is used for implementation
īĄ OpenCCM is for applications while OSGI is for services
49. ī¨ COCOA: Conversation based Service Composition for
Pervasive Computing Environments (INRIA, France)
īĄ Adaptive application which streams between two different
media based on context information (on the fly service
composition)
īĄ Work done for Semantic Web Services
īĄ OWL-S based model for services and tasks
īĄ Service discovery semantically matches service requested
capability and service advertised capability
īĄ Service composition is mapped with Finite State Automata
īĄ Different environments may have different number of services
contributing to the composition
īĄ Part of AMIGO project
īĄ Conversation is Workflow e.g. travel service require a sequence
of services
50. ī¨ Taxonomy Caching: A Scalable Low-Cost Mechanism
for Indexing Remote Contents in P2P Systems (NTNU,
Norway)
īĄ Describe contents according to taxonomy
īĄ Taxonomy info is cached at peers
īĄ The content of a peer are expressed using taxonomy
īĄ Remote peers maintain a taxonomy overview instead of
detailed indexing information
īĄ Use cached taxonomy overview to route queries to appropriate
peers to reduce latency and find relevant data
īĄ Distributing taxonomic information is done by basic
mechanism e.g. piggyback matching category with query result
or lazy distribution by gossiping
īĄ Future work is employing techniques for XML/XPath querying
in P2P
51. ī¨ Designing a Publish-Subscribe Substrate for
Privacy/Security in Pervasive Environments
(Miami University, USA)
īĄ Content based publish subscribe
īĄ Problem of authorization, access control
īĄ Use of policy language based on KeyNote trust
management system (sample rules contain
Authorizer, Licensees, Conditions)
īĄ Actions are authenticate, advertise, publish,
subscribe etc.
īĄ Environment dependent sharing and privacy
protected access to services
52. ī¨ On Existence Proofs for Multiple RFID tags
(University of Florida, USA)
īĄ RFID is replacement for Bar Codes
īĄ Problem is presence of same RFID tags at the same
place at same time
īĄ âYoking Proofsâ exist
īĄ ????
53. ī¨ Towards Autonomic Residential Gateways
(Grenoble University, France)
īĄ Home automation provides comfort, security,
healthcare etc. but require security, scalability,
heterogeneity, flexibility, dynamism, autonomy (self
managing, the last step is to contact human user)
īĄ Residential gateway follows principles of SOA, hosts
services, coordinate and control devices
īĄ Work in progress..!
54. ī¨ Resurrection: A platform for spontaneously
Generating and Managing Proximity
Documents (INSA Lyon, France)
īĄ Portable devices + Documents
īĄ Many people take notes of the meeting (document)
īĄ A dynamic document embeds and provides
functions allowing automatic assess and
modification of the document data
īĄ Resurrection management service manages the
creation and destruction of documents
īĄ Use of OSGI for service deployment and UPnP for
service discovery
55. ī¨ An Approach for Configuring Ontology Based
Application Context Model (SW Robot
Research Lab, ETRI, Korea)
īĄ Problem: IS it possible to support all ubiquitous
applications which use context?
īĄ Application context model as Instance layer, Domain
ontology layer, Common ontology layer, Stored
vocabulary layer
īĄ The presentation was not very clear and seem not to
meet the claim made in the paper
56.
57. ī¨ Ontology-Based Context-Aware Service
Discovery for Pervasive Environments (Amigo)
ī¨ Semantic-Based Context-Aware Service
Discovery in Pervasive-Computing
Environments (University of Waterloo,
Canada)
īĄ Work for web services
īĄ Parse request and expand it (reasoning)
īĄ Retrieve userâs contextual information
īĄ Construct SPARQL query to find matching
īĄ services
īĄ Rank matching services
58. ī¨ Pervasive spontaneous composition (France
Telecom, France)
īĄ Pervasive Service Oriented Middleware
īē Adapt to dynamic service availability
īē Adapt to service discovery protocol multiplicity
īē Make the use of local and distant services transparent
(priority of local binding)
īĄ Technological choices
īē OSGI
59. ī¨ DSCL: A Language to support Dynamic Service Composition
(Ludwig Maximilian University Munich, Germany)
īĄ Dynamic Service Composition
īē With respect to availability of services
īē Usage of equivalent services
īē DSCL refers to other services
īĄ Context-Awareness
īē Instantiation according to the situation
īē Selection of services based on the userâs context
īē DSCL describes context
īĄ Personalization
īē Selection of services based on user preferences
īē Composition based on user preferences
īē DSCL supports defining objective function
60. ī¨ Instantiable composition of services in a home
environment (Katholieke Universiteit Leuven,
Belgium)
īĄ Instantiable composition
īē Devices / services belong to class
īē Cameras, monitors, MP3 players
īē Do not associate a composition to specific devices
īē Associate composition to class of devices
īē Instantiate composition at runtime