Systems to date have labels which are assigned by a person, e.g., tagging an object or a place with a keyword or phrase. Given some entities already labelled, a formal mechanism of generating labels using spatial cont...
详细信息
Systems to date have labels which are assigned by a person, e.g., tagging an object or a place with a keyword or phrase. Given some entities already labelled, a formal mechanism of generating labels using spatial context (detectable by sensors) is useful, not only to create new labellings without manual effort, but also that the labels can be used as queries to verify spatial properties of collections of objects.
We present WebPlug, a framework for the emerging Web of things. It consists of several building blocks which ease integration of things, including their sensors and actuators withthe Web. For example, WebPlug support...
详细信息
We present WebPlug, a framework for the emerging Web of things. It consists of several building blocks which ease integration of things, including their sensors and actuators withthe Web. For example, WebPlug supports versioning of and eventing for arbitrary Web resources, like sensor readings, thus simplifying the process of creating physical mash-ups. After providing an analysis that led to the development of WebPlug, we present selected aspects of its *** complete the paper by presenting the application of our framework in a real-world scenario.
the main goal of this ongoing dissertation is to define and evaluate an efficient and flexible methodology to detect and solve collective conflicts for pervasive context-aware applications. the solution proposed is fl...
详细信息
the main goal of this ongoing dissertation is to define and evaluate an efficient and flexible methodology to detect and solve collective conflicts for pervasive context-aware applications. the solution proposed is flexible enough to be used by applications with different characteristics and also considers the resource constraints, which are typical in pervasive systems. One of the basic motivations to the development of this work is the existence of a great number of collective context-aware applications, specially the ones related to the pervasive computing area. Besides, to the best of the author's knowledge, until now there is no work in literature that could be applied to many different applications, and that also considers systematically the trade-off between quality of services (QoS) and resource consumption. In this work, QoS means the users' satisfaction withthe application's tasks. A user is considered satisfied when he/she can perform the tasks he/she has previously demanded.
Sensing coverage is essential for most applications in wireless networks. In traditional coverage problem study, the disk coverage model has been widely applied because of its simplicity. though notable recent works p...
详细信息
ISBN:
(纸本)9781424472611;9780769540597
Sensing coverage is essential for most applications in wireless networks. In traditional coverage problem study, the disk coverage model has been widely applied because of its simplicity. though notable recent works point out that the disk model has many critical limitations when applied in practice, few successful works have been conducted to comprehensively study the issue. Motivated by this, in this paper we propose a new coverage model called T-R model. T-R model is derived from a real application of transceiver-free object detection. Compared withthe traditional disk model, T-R model is able to describe many new coverage features such as the probabilistic coverage, the link-centric coverage units and the correlations between multiple coverage units. these new capabilities make T-R model a better abstraction of individual sensors. To evaluate the performance of T-R model, we conduct comprehensive empirical studies based on a test-bed of 30 telosB nodes. Experimental results show that the T-R model can adequately describe the sensing behavior in the transceiver-free object detection applications. the average error between the model and the reality is only 8%. Moreover, T-R model presents attractive flexibility, making it more appropriate for general coverage problem studies than the transceiver-free object detection.
Current efforts in real world deployment of wireless sensor networks end up in the development of the 6LoWPAN protocols. While big industrial consortia develop new technologies, architectures, and concepts, 6LoWPAN is...
详细信息
Current efforts in real world deployment of wireless sensor networks end up in the development of the 6LoWPAN protocols. While big industrial consortia develop new technologies, architectures, and concepts, 6LoWPAN is heading towards improvements and adaptations of existing and matured network protocols like IP, TCP, and UDP. Because 6LoWPAN uses the low power WPAN standard ieee802.15.4 in lower layers, a standardized and seamless connectivity of low power wireless devices with existing networking infrastructure is achieved. But further research on suitable application layer protocols on top of 6LoWPAN is still required. this paper investigates on the applicability of the Devices Profile for Web Services (DPWS) in 6LoWPAN networks. Main scope is the necessary optimized message encoding, to reduce the overhead of this SOAP based protocol. therefore, the paper introduces in current developments of encDPWS (encoded DPWS), a new encoding for DPWS.
Service-oriented Architecture (SOA) is increasingly relevant across several domains of application by promising systems openness and unification over a common design and communication paradigm. At device level, the ap...
详细信息
Service-oriented Architecture (SOA) is increasingly relevant across several domains of application by promising systems openness and unification over a common design and communication paradigm. At device level, the application of SOA is carried, on one hand, by Devices Profile for Web Services (DPWS) and complementary web-based specifications oriented towards resource management, and, on the other hand, by OPC Unified Architecture (OPC UA) framework. these are currently the major candidates to be deployed at device level in a service-oriented industrial scenario. this document offers an overlook over both approaches, along with some complementary WS-* specifications through an extensive technical assessment. Also, it illustrates that neither one of these specifications can alone entirely cope withthe requirements of service-oriented industrial domain device level and that a combined approach promises to deliver an important contribution. Synergies between the two sets of specifications for a more conformant solution are identified, and a convergence approach is enunciated in an era where it is imperative to avoid unnecessary layers of integration across enterprise infrastructure to ensure a more agile, lean and sustainable development.
the impact IT systems have on organizations is widely debated, both in academia and industry. this paper describes a quantitative framework for analyzing organizational impact from IT systems. the framework consists o...
详细信息
ISBN:
(纸本)9780769537856
the impact IT systems have on organizations is widely debated, both in academia and industry. this paper describes a quantitative framework for analyzing organizational impact from IT systems. the framework consists of an abstract model that is a metamodel suitable for expressing organizational structure incorporated with an extended influence diagram for analysis. the purpose is to create enterprise architecture (EA) models that can be used for analysis of the enterprise. the framework has been validated through a case study where the framework has been used to analyze the changes in organizational structure after the introduction of an IT system.
the goal of the international Workshop Series on Security and Privacy in enterprisecomputing (InSPEC) is to provide a forum for the discussion of novel research directions and challenges in security and privacy in en...
ISBN:
(纸本)9781424455638
the goal of the international Workshop Series on Security and Privacy in enterprisecomputing (InSPEC) is to provide a forum for the discussion of novel research directions and challenges in security and privacy in enterprisecomputing among the experts from academia and industry. the following introduces the second edition of the workshop in conjunction withthe 13thieeeinternational EDOC conference in Auckland, New Zealand.
this paper gives a brief overview of the international workshop on vocabularies, ontologies and rules in the enterprise held at the EDOC 2009 conference. the paper discusses the scope and key topics of the workshop, r...
详细信息
ISBN:
(纸本)9781424455638
this paper gives a brief overview of the international workshop on vocabularies, ontologies and rules in the enterprise held at the EDOC 2009 conference. the paper discusses the scope and key topics of the workshop, reflects on the program of the workshop, including, the keynote and papers accepted for presentation.
Poor data in information systems impede the quality of decision-making in many modern organizations. Manual business process activities and application services are never executed flawlessly which results in steadily ...
详细信息
ISBN:
(纸本)9780769537856
Poor data in information systems impede the quality of decision-making in many modern organizations. Manual business process activities and application services are never executed flawlessly which results in steadily deteriorating data accuracy, the further away from the source the data gets, the poorer its accuracy becomes. this paper proposes an architecture analysis method based on Bayesian Networks to assess data accuracy deterioration in a quantitative manner. the method is model-based and uses the ArchiMate language to model business processes and the way in which data objects are transformed by various operations. A case study at a Swedish utility demonstrates the approach.
暂无评论