Mobile gaia: A middleware for ad-hoc pervasive computing

被引:0
|
作者
Chetan, S [1 ]
Al-Muhtadi, J [1 ]
Campbell, R [1 ]
Mickunas, MD [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
关键词
ubiquitous computing; personal active spaces; ad-hoc networking; Gaia; mobility; middleware;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Pervasive Computing promotes an environment that blurs the distinction between digital and physical devices and integrates all entities in a physical space into a cohesive programmable unit. Some of the early research activities in pen-ash-e computing focused on de,eloping infrastructures for pervasive applications. These infrastructures successfully merged physical and digital entities in an environment to create aware homes, smart offices and active spaces. In recent years, ad-hoc pen,ash,e computing has attracted attention with the proliferation of low cost, short-range wireless devices. Ad-hoc pervasive computing does not assume digital de devices to be tied to physical environments and aims to create digital "clusters" that can be viewed as a unified entity. The user can program this cluster of devices with a single programming interface. In this paper, we introduce our middleware, called Mobile Gaia, for ad-hoc pervasive,e computing. Mobile Gaia is a servies-based middleware that integrates resources of various dei-ices. It manages several functions such as forming and maintaining device collections, sharing resources among dei-ices and enables seamless service interactions. It also provides an application framework to develop applications for the device collection. The application framework decomposes the application into smaller components that can run on different devices in this collection. We discuss the architecture of Mobile Gaia and introduce a sample application that has been designed using our middleware.
引用
收藏
页码:223 / 228
页数:6
相关论文
共 50 条
  • [41] Optimized Edge, Fog and Cloud Computing Method for Mobile Ad-hoc Networks
    Balen, Josip
    Damjanovic, Davor
    Maric, Petar
    Vdovjak, Kresimir
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 1303 - 1309
  • [42] Adaptive Scheduling in a Mobile Ad-Hoc Grid for Time-Sensitive Computing
    Morsy, Hazem
    El-Rewini, Hesham
    2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2013,
  • [43] Performance evaluation of ad-hoc on demand distance vector (AODC) in mobile ad-hoc networks
    Tung, Ye
    Rahman, Quazi Shahriar
    Al-Khatib, Mazen
    Alsharif, Salim
    2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2006, : 458 - +
  • [44] The LAICA Project: An ad-hoc middleware to support Ambient Intelligence
    Cabri, Giacomo
    De Mola, Francesco
    Ferrari, Luca
    Leonardi, Letizia
    Quitadamo, Raffaele
    Zambonelli, Franco
    MULTIAGENT AND GRID SYSTEMS, 2008, 4 (03) : 235 - 247
  • [45] A Survey on Ad-hoc Cloud Computing Challenges
    Mawgoud, Ahmed A.
    PROCEEDINGS OF 2020 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMMUNICATION AND COMPUTER ENGINEERING (ITCE), 2020, : 14 - 19
  • [46] Middleware for pervasive computing
    Kumar, Mohan
    Zambonelli, Franco
    PERVASIVE AND MOBILE COMPUTING, 2007, 3 (04) : 329 - 331
  • [47] Trusted computing for protecting ad-hoc routing
    Jarrett, Michael
    Ward, Paul
    CNSR 2006: COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, PROCEEDINGS, 2006, : 61 - +
  • [48] Middleware Issues and Approaches for Mobile Ad hoc Networks
    Hadim, Salem
    Al-Jaroodi, Jameela
    Mohamed, Nader
    2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 431 - 436
  • [49] ActiveEdge-M: A survivable, multi-agent middleware platform for mobile ad-hoc networks
    Rosset, Sebastien
    Rho, Sue
    Redmond, Timothy
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1595 - 1601
  • [50] Security In Multicast Mobile Ad-Hoc Networks
    Shanthi, N.
    Ganesan, L.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 326 - 330