Adaptation of composite services in pervasive computing environments

被引:6
|
作者
Funk, Caroline [1 ]
Schultheis, Amelia [1 ]
Linnhoff-Popien, Claudia [1 ]
Mitic, Jelena [2 ]
Kuhmuench, Christoph [2 ]
机构
[1] Univ Munich, Mobile & Distributed Syst Grp, D-80539 Munich, Germany
[2] Siemens AG Corp Technol Software & Engn, Munich, Germany
关键词
D O I
10.1109/PERSER.2007.4283922
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Pervasive Computing is characterized by an automatic adaptation of services to the user's situation. To achieve this we compose services from atomic services taking ambient information into account. Due to changing availability of services because of e.g. user mobility an initial composition is not sufficient but an adaptation during runtime is also necessary. Within our architecture we manage one or more composite services. Decisions regarding their adaptation are made taking requirements from all composite services into account. This is not easy as each composite service may have different goals. In this paper, we present the results of an analysis of pervasive application scenarios. Based on the analysis we developed a two-level decision system for adaptation decisions: on the composite service level decisions are made using linear programming, on the system level using rule based control. The implementation is integrated in our existing service composition architecture.
引用
收藏
页码:242 / +
页数:2
相关论文
共 50 条
  • [41] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33
  • [42] Ontology access patterns for pervasive computing environments
    Villanueva, F. J.
    Villa, D.
    Barba, J.
    Rincon, F.
    Moya, F.
    Lopez, J. C.
    AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244
  • [43] On experiments with a transport protocol for pervasive computing environments
    Avancha, S
    Korolev, V
    Joshi, A
    Finin, T
    Yesha, Y
    COMPUTER NETWORKS, 2002, 40 (04) : 515 - 535
  • [44] A Hybrid CARV Architecture for Pervasive Computing Environments
    Kim, SoonGohn
    Ko, Eung Nam
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2008, 15 : 380 - +
  • [45] Advances in security and multimodality for pervasive computing environments
    Park, Jong Hyuk
    Hsu, Ching-Hsien
    Chilamkurti, Naveen
    Denko, Mieso
    TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 1341 - 1342
  • [46] Protecting Users' Anonymity in Pervasive Computing Environments
    Pareschi, Linda
    Riboni, Daniele
    Bettini, Claudio
    2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 11 - 19
  • [47] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [48] Bradio: A wireless infrastructure for pervasive computing environments
    Yoshimi, B
    Bolam, GB
    Sukaviriya, N
    Elliott, J
    Carmeli, B
    Morgan, J
    Derby, H
    CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 309 - 316
  • [49] Enabling Personal Privacy for Pervasive Computing Environments
    Baguees, Susana Alcalde
    Zeidler, Andreas
    Klein, Cornel
    Fernandez Valdivielso, Carlos
    Matias, Ignacio R.
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (03) : 341 - 371
  • [50] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    Wireless Networks, 2018, 24 : 139 - 149