Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Trustworthiness-based fuzzy adaptive access control model for pervasive computing

ZHANG Li-chen,WANG Xiao-ming,

计算机应用研究 , 2009,
Abstract: Based on the current trust models,proposed the trustworthiness-based fuzzy adaptive access control model for pervasive computing (TBFAAC).The model extends the concept of trustworthiness, establishing the interval value fuzzy policy rules of permissions, achieving the effective authorization through the fuzzy reasoning based on the context information related to the subject.Described the main elements and the interval value fuzzy reasoning algorithm of the model.The TBFAAC model provides the technology for dynamic authorization in pervasive computing.
A Semantic and Adaptive Middleware Architecture for Pervasive Computing Systems  [cached]
Qing Wu,Weihua Hu,Wen Ding
Journal of Software , 2009, DOI: 10.4304/jsw.4.10.1061-1068
Abstract: With the increasing demands for adaptive middleware of dynamic systems in pervasive computing environments, the need for dynamic software architecture and programming infrastructure to achieve dynamic adaptation is widely recognized. In this paper, we firstly present a semantic and adaptive middleware architecture called ScudWare that supports for dynamic and heterogeneous environments. ScudWare middleware is based on adaptive communication environments, which consists of adaptive components, and semantic virtual agents. Specially, a ScudADL framework and the specification semantics, based on higher-order typed calculus theory, are proposed, which describes ScudWare component structure characters, and dynamic behavior adaptation. In the ScudADL, the computing resources consumption is concerned. And the component inner and outer adaptive behaviors are separated from component functional behaviors in an explicit way. Finally, we introduce an application of ScudWare architecture, which is a computer aided assessment system in a smart CAA space, and give a case study to show its adaptation.
A Mobile Computing Framework for Pervasive Adaptive Platforms
Olivier Brousse,Jérémie Guillot,Gilles Sassatelli,Thierry Gil,Fran ois Grize,Michel Robert
International Journal of Distributed Sensor Networks , 2012, DOI: 10.1155/2012/193864
Abstract: Ubiquitous computing is now the new computing trend, such systems that interact with their environment require self-adaptability. Bioinspiration is a natural candidate to provide the capability to handle complex and changing scenarios. This paper presents a programming framework dedicated to pervasive platforms programming. This bioinspired and agentoriented framework has been developed within the frame of the PERPLEXUS European project that is intended to provide support for bioinspiration-driven system adaptability. This framework enables the platform to adapt itself to application requirements at high-level while using hardware acceleration at node level. The resulting programming solution has been used to program three collaborative robotic applications in which robots learn tasks and evolve for achieving a better adaptation to their environment.
A Clustering-based Location Privacy Protection Scheme for Pervasive Computing  [PDF]
Lin Yao,Chi Lin,Xiangwei Kong,Feng Xia,Guowei Wu
Computer Science , 2010,
Abstract: In pervasive computing environments, Location- Based Services (LBSs) are becoming increasingly important due to continuous advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBSs can jeopardize the location privacy of mobile users. Consequently, providing safeguards for location privacy of mobile users against being attacked is an important research issue. In this paper a new scheme for safeguarding location privacy is proposed. Our approach supports location K-anonymity for a wide range of mobile users with their own desired anonymity levels by clustering. The whole area of all users is divided into clusters recursively in order to get the Minimum Bounding Rectangle (MBR). The exact location information of a user is replaced by his MBR. Privacy analysis shows that our approach can achieve high resilience to location privacy threats and provide more privacy than users expect. Complexity analysis shows clusters can be adjusted in real time as mobile users join or leave. Moreover, the clustering algorithms possess strong robustness.
Trust in pervasive computing

OUYANG Jian-quan,WANG Huai-min,SHI Dian-xi,

计算机应用研究 , 2008,
Abstract: The emergence and extensive application of bring a new challenge for the trustworthy resource sharing and acces-sing due to the ubiquity and convenience of the pervasive computing model.Trustworthy scheme,which is a hot-spot in the research of pervasive computing,can guarantee everywhere and invisible computing model in pervasive computing.This paper analyzed its key technologies,including access control,privacy protection,fault-tolerant.Finally,indicated the future research directions of this topic.
User Behavior Prediction based Adaptive Policy Pre-fetching Scheme for Efficient Network Management  [PDF]
Yuanlong Cao,Jianfeng Guan,Wei Quan,Jia Zhao
International Journal of Computer Science Issues , 2013,
Abstract: In recent years, network management is commonly regarded as an essential and promising function for managing and improving the security of network infrastructures. However, as networks get faster and network centric applications get more complex, there is still significant ongoing work addressing many challenges of the network management. Traditional passive network censoring systems lack of adaptive policy pre-fetching scheme, as a result, preventing malicious behavior (such as hacker, malware etc.) is big challenging. In this paper, we propose a novel user behavior prediction based adaptive policy pre-fetching scheme for efficient network management. A newly Distributed web User Behavior Prediction model (DUBP) is introduced first to cognize and predict user behavior. It extends a distributed DHT network to fix the bottleneck in traditional Client-Server (C/S) architecture occurred by large-scale network service requesting and massive user log analyzing and calculating. Based on user behavior sensing and prediction provided by DUBP, a further Adaptive Policy Pre-fetching and Caching scheme (APPC) is addressed for fine-grained and efficient network management. Our Universal Network (UN) will employ DUBP and APPC scheme to justify its advantages in secure network service.
Solving the Challenges of Pervasive Computing  [PDF]
Syed Muqsit Shaheed, Jalil Abbas, Asif Shabbir, Fayyaz Khalid
Journal of Computer and Communications (JCC) , 2015, DOI: 10.4236/jcc.2015.39005
Abstract: Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, communications, intellectual properties, information securities, data presentations and web dis-plays to make attraction for human interaction. Pervasive systems have a broad range of applica-tions but it is relatively challenging for pervasive applications to meet emergence into existing physical environment and newly built structure requirements. Due to their interaction to gather information and change the environment via activating devices independently is highlighted. Se-curity of the pervasive devices and applications which control our activities has primary importance and will be destroyed, if the pervasive system operations are not secure. There is a need to improve the security measures for data to travel rapidly, unbroken, unchanged and invisible by deceptive recipients. Pervasive Computing allows users to get information and services access anytime and anywhere but need to discuss issues and solutions to deliver secure information with privacy and trust. Possible solutions for these challenges of Pervasive Computing interaction between human are emphasized. A collection of papers and articles have been collected in order to investigate the previous study of Pervasive Computing interaction and its challenges. Is it possible for us to understand what the scientific world will be close to generate new avenues? Expectations of future bring new openings for user interaction with systems, data, information and the environments in which they live, work and play.
An Adaptive Checkpointing Scheme for Peer-to-Peer Based Volunteer Computing Work Flows  [PDF]
Lei Ni,Aaron Harwood
Computer Science , 2007,
Abstract: Volunteer Computing, sometimes called Public Resource Computing, is an emerging computational model that is very suitable for work-pooled parallel processing. As more complex grid applications make use of work flows in their design and deployment it is reasonable to consider the impact of work flow deployment over a Volunteer Computing infrastructure. In this case, the inter work flow I/O can lead to a significant increase in I/O demands at the work pool server. A possible solution is the use of a Peer-to- Peer based parallel computing architecture to off-load this I/O demand to the workers; where the workers can fulfill some aspects of work flow coordination and I/O checking, etc. However, achieving robustness in such a large scale system is a challenging hurdle towards the decentralized execution of work flows and general parallel processes. To increase robustness, we propose and show the merits of using an adaptive checkpoint scheme that efficiently checkpoints the status of the parallel processes according to the estimation of relevant network and peer parameters. Our scheme uses statistical data observed during runtime to dynamically make checkpoint decisions in a completely de- centralized manner. The results of simulation show support for our proposed approach in terms of reduced required runtime.
Location privacy protect model for pervasive computing

LIU Heng,WANG Tie-jun,SHE Kun,ZHOU Ming-tian,

计算机应用研究 , 2009,
Abstract: With the development of pervasive computing technologies,the applications in ubicom environment was increa-sing.Those application usually based on user's location information,which included user's privacy information directly or indirectly.This paper discussed how to protect user's location privacy while personalized service was provided.Proposed user's location information acquisition policy and pseudonym policy and built a model for protect user policy of pervasive computing based on those policy.
Dynamic Computing Network;Architecture of Pervasive Computing for the Internet of Things

LU Jun,HUANG Jian,XU Yuan-ping,GUO Ben-jun,YUE Xi,

计算机科学 , 2012,
Abstract: With the development of Internet of Things, a lot of different devices connect to the Internet of Things through a variety of ways. This trend makes the pervasive computing environment more complex and requires the architecture of pervasive computing change to adapt the new environment of the Internet of Things. This paper provided architecture of pervasive computing for Internet of Things,which aims to how to make the pervasive computing systems to automatically adapt o the complex hardware and software operating environment in the Internet of things. I}his architecturc of pervasive computing can make the software run everywhere without modification, and implement the service discovery, context aware service and service migration easily. I}his paper used the computing area network as the base infrastructure,and used the "devices dynamically match" as the solution of software self-adaptive. The research of this paper enhances the adaptability of pervasive computing software on the environment of the Internet of Things, and provides an effective solution of pervasive computing software system design for the Internet of Things.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.