In the blooming era of pervasive and mobile computing, trust has been accepted as a vital factor for provisioning secure, reliable and seamless communications between pervasivecomputing elements. However, advancing r...
详细信息
In the blooming era of pervasive and mobile computing, trust has been accepted as a vital factor for provisioning secure, reliable and seamless communications between pervasivecomputing elements. However, advancing research in the area of trust-based protocol for distributed pervasive and mobile computing might be challenging due to the ambiguity of the concept of trust as well as the variety of divergent trust models, protocols and algorithms in different contexts. In this research, we augment the trust concept and definition from various field of studies and proposed models in the literature and provide general conceptual phases and methods of trust management toward-trust-based protocols, in the context of pervasive and mobile computing. The paper addresses a broad range of techniques, methods, models, applications and desired futures of trust-based protocols. A number of the currently used trust-based protocols are critically reviewed, and this further leads our discussion to the security attacks and mitigation strategies used with trust-based protocols for pervasive and mobile computing. Finally, the paper discusses open research issues. (C) 2018 Elsevier B.V. All rights reserved.
Promoting Heritage is a challenge for all generations. The heritage is a legacy that we inherit from our ancestors and that we should deliver to our decedents. In this sense, the first steep that we should take, after...
详细信息
ISBN:
(纸本)9780999855102
Promoting Heritage is a challenge for all generations. The heritage is a legacy that we inherit from our ancestors and that we should deliver to our decedents. In this sense, the first steep that we should take, after preserve the heritage, is to develop solutions that enable effective and democratic ways to promote it. This promotion starts with the ability that of those who visit this heritage he able to know and enjoy it. Information and Communication Technologies and specifically pervasive and mobile computing represents nowadays a big opportunity to develop innovative solutions capable to inform tourists about heritage and even enable them to experience past realities related to immaterial heritage like ancestral legends, past events and even no longer existing physical patrimony. This paper starts to make a reflection and the evolution the information and Communication Technologies role on tourism and present a technological architecture to respond to the challenge of promote heritage and inform tourist in their travel experiences. After that, the paper presents also a developed prototype created to the Portuguese City of Mirandela capable to promote its historical and gastronomic heritage and also support the tours of the tourists through its territory. Finally, there are made some remarks about the future growing and directions for technology applied to tourism.
This paper investigates the continuous all k-nearest neighbor (CAkNN) problem in a pervasive and mobile computing environment, which is a spatial query that continuously monitors kNN results for all mobile users in th...
详细信息
This paper investigates the continuous all k-nearest neighbor (CAkNN) problem in a pervasive and mobile computing environment, which is a spatial query that continuously monitors kNN results for all mobile users in the network for a specified period of time. This problem is characterized by the fact that a single movement of a node may result in that several users have to re-compute their kNN results. The affected nodes are the moving node itself and its Reverse-kNN (RkNN) nodes at both the previous and the new locations. This paper proposes the use of a bucket point-region quadtree to index mobile users. This structure is unique in that it can be readily reorganized for maintenance purpose when nodes move. In addition, it helps to quickly determine an appropriate search radius for each of these nodes. In this paper, we have proposed two novel RkNN techniques that are tailored for the structure with only small maintenance overhead. These techniques enable us to integrate kNN and RkNN searching operations together so as to facilitate continuous monitoring of the query result. Based on the notion of maximum prune distance, we present two algorithms to offer true continuity for a CAkNN query. Simulation results show that our algorithms outperform existing solutions by a significant margin. (C) 2016 Elsevier B.V. All rights reserved.
The high diffusion of smartphones in the users' pockets allows to sense their movements, thus monitoring the amount of physical activity they do during the day. But, it also gives the possibility to use these devi...
详细信息
The high diffusion of smartphones in the users' pockets allows to sense their movements, thus monitoring the amount of physical activity they do during the day. But, it also gives the possibility to use these devices to persuade people to change their behaviors. In this paper, we present ClimbTheWorld, a serious game which uses a machine learning-based technique to recognize and count stairsteps and aims at persuading people to use stairs instead of elevators or escalators. We perform a fine-grained analysis by exploiting smartphone sensors to recognize single stairsteps. Energy consumption is widely investigated to avoid exhausting smartphone battery. Moreover, we present game appreciation and persuasive power results after a trial experiment with 13 participants.
It is important to support disconnected operations in mobilecomputing, because wireless communication requires substantial power consumption by mobile devices. Suitable usage of voluntary disconnected operations with...
详细信息
It is important to support disconnected operations in mobilecomputing, because wireless communication requires substantial power consumption by mobile devices. Suitable usage of voluntary disconnected operations with pre-fetching of data in mobile environments can effectively save energy and money for mobile devices in wireless pervasivecomputing. In this paper, we analyze energy expenditure, including voluntary disconnected operations, to evaluate the energy efficiency of mobilecomputing. We estimate the energy expenditure using various parameters. The results of our analysis will assist efficient employment of disconnected operations and performance prediction.
Background: A transformation is underway regarding how we deal with our health. mobile devices make it possible to have continuous access to personal health information. Wearable devices, such as Fitbit and Apple'...
详细信息
Background: A transformation is underway regarding how we deal with our health. mobile devices make it possible to have continuous access to personal health information. Wearable devices, such as Fitbit and Apple's smartwatch, can collect data continuously and provide insights into our health and fitness. However, lack of interoperability and the presence of data silos prevent users and health professionals from getting an integrated view of health and fitness data. To provide better health outcomes, a complete picture is needed which combines informal health and fitness data collected by the user together with official health records collected by health professionals. mobile apps are well positioned to play an important role in the aggregation since they can tap into these official and informal health and data silos. Objective: The objective of this paper is to demonstrate that a mobile app can be used to aggregate health and fitness data and can enable interoperability. It discusses various technical interoperability challenges encountered while integrating data into one place. Methods: For 8 years, we have worked with third-party partners, including wearable device manufacturers, electronic health record providers, and app developers, to connect an Android app to their (wearable) devices, back-end servers, and systems. Results: The result of this research is a health and fitness app called myFitnessCompanion, which enables users to aggregate their data in one place. Over 6000 users use the app worldwide to aggregate their health and fitness data. It demonstrates that mobile apps can be used to enable interoperability. Challenges encountered in the research process included the different wireless protocols and standards used to communicate with wireless devices, the diversity of security and authorization protocols used to be able to exchange data with servers, and lack of standards usage, such as Health Level Seven, for medical information exchange. Conclusions:
Programming models for pervasivecomputing applications typically include the possibility of specifying software components according to multiple alternative versions, each optimized for a certain class of computing a...
详细信息
ISBN:
(纸本)9781424495375
Programming models for pervasivecomputing applications typically include the possibility of specifying software components according to multiple alternative versions, each optimized for a certain class of computing and communication technologies. A main mechanism provided by these programming models permits to dynamically select one of the alternative versions for the execution. This reconfiguration activity may be critical, from a performance point of view, when considering High-Performance pervasivecomputing applications, especially if the reconfiguration must be performed in such a way that the application semantics is respected (i.e. the reconfiguration is consistent). In this paper we show how to introduce consistent reconfiguration protocols for the ASSISTANT programming model, we exemplify two general protocols and we show experimental results for one of them.
The ability to retrieve software in an easy and efficient way confers competitive advantage on computer users in general and, even more especially, on users of wireless devices (like some laptops, PDAs, etc.). In this...
详细信息
The ability to retrieve software in an easy and efficient way confers competitive advantage on computer users in general and, even more especially, on users of wireless devices (like some laptops, PDAs, etc.). In this article, we present a software retrieval service that allows users to select and retrieve software in an easy and efficient way, anywhere and anytime. Two relevant components of this service are: 1) a software ontology (software catalog) which provides users with a semantic description of software elements, hiding the location and access method of various software repositories, and 2) a set of specialist agents that allow browsing of the software catalog (automatically customized for each user), and an efficient retrieval method for the selected software. These agents automatically adapt their behavior to different users and situations by considering the profile and preferences of the users and the network status. In summary, our software-obtaining process based on an ontology and autonomous and adaptive agents presents a qualitative advance with respect to existing solutions: our approach adapts to the features of users, relieving them from knowing the technical features of their devices and the location and access method of various remote software repositories.
暂无评论