A Framework for Ambient Computing
Mohammed Fethi Khalfi and Sidi Mohamed Benslimane
Computer Science Department, University of Djilali Liabes, Sidi Belabess, Algeria
[email protected],
[email protected]
Keywords:
Pervasive Information Systems, Ambient Intelligence, Ubiquitous Computing, Smart Space.
Abstract:
The proliferation of mobile computing and wireless communications is producing a revolutionary change in
our information society. Ubiquitous Computing is a recent paradigm whose objective is to support users in
accomplishing their tasks, accessing information, or communicating with other users anytime, anywhere. In
other terms, Pervasive Information Systems (PIS) constitute an emerging class of Information Systems where
Information Technology is gradually embedded in the physical environment, capable of accommodating user
needs and wants when desired. PIS differ from Desktop Information Systems (DIS) in that they encompass a
complex, dynamic environment composed of multiple artefacts instead of Personal Computers only, capable of
perceiving contextual information instead of simple user input, and supporting mobility instead of stationary
services. In this paper, as an initial step, we present PIS novel characteristics compared to traditional desktop
information systems; we explore this domain by o ering a list of challenges and concepts of ubiquitous computing that form the core elements of a pervasive environment. As a result of this work, a generic framework
for intelligent environment has been created. Based on various and related works concerning models and
designs. This framework can be used to design any PIS instance.
1 INTRODUCTION
Mark Weiser was the first to describe the vision of
ubiquitous computing, which has as its goal the enhancing computer use by making many computers
available throughout the physical environment, and
making computers e ectively invisible to the user
(Weiser, 1991). The essence of Weisers vision is that
persons use many computers embedded in the environment, allowing technology to recede into the background. The first era was defined by the mainframe
computer, a single large time-shared computer owned
by an organization and used by many people at the
same time. Second, came the era of the PC, a personal
computer primarily owned and used by one person,
and dedicated to them. The third era, ubiquitous computing, representative of the present time, is characterized by the explosion of small networked portable
computer products in the form of smart phones, personal digital assistants (PDAs), and embedded computers built into many of the devices we own resulting
in a world in which each person owns and uses larger
numbers of computers becoming integrated into everyday life. In addition communications extend beyond the classic concept man to man or man to machine, to include direct communication between machines, (Fig. 1).
170
Figure 1: Evolution of computers, from the beginning to the
ambient computing.
The remarkable recent progress in embedded devices, smart phones, wireless communications and
networking technologies (Fig. 2) has enabled us
to create pervasive computing systems and services
with diverse applications and global accessibility (Escoffier, 2008), and promote their mobility in a transparent way without the explicit user intervention.
This technological progress offers an opportunity to
focus on its main task instead of configuring and
managing all IT equipment at their disposal and ac-
AFrameworkforAmbientComputing
cess to various services offered by these objects, anywhere, at any various devices (Cheikh, 2012), (Saha
and Mukherjee, 2003), (Satyanarayanan, 2001).
Figure 3: Pervasive Wireless Network.
Figure 2: Wireless networks.
This paper is organized as follows, after reviewing the state of the pervasive computing. Section 2
formulates the definition and evolution of information
systems and the main constraints of pervasive information systems, after we present PIS novel characteristics compared to traditional desktop information
systems (DIS), Section 3 identify and describe fundamental challenges, properties and characteristics of
ubiquitous computing environments that form or are
part of those environments. Section 4 reviews the
background and related works for different architectural models of pervasive systems. In section 5, we
describe out the proposed system architecture. Finally, we conclude this paper in section. 6, ans we
described future possibilities works.
2 ISSUES AND CHALLENGES OF
PERVASIVE COMPUTING:
Based on an analysis of literature in the field of ubiquitous computing we present an overview of fundamental properties and characteristics of ubiquitous
computing.
2.1
2.1.1
Enabling Concepts and
Technologies:
Wireless Networks
Wireless networks infrastructures can form the platform, which enable clients to transparently connect
and share context with remote entities. The geographic scope defines the coverage capacity of a wireless network; we can distinguish several categories,
(Fig. 3).
2.1.2
to collect the information necessary to adjust system
behavior, pervasive systems usually integrate wireless sensors, which consist of small devices capable
of sensing, processing, and communicating different
types of sensory data. A WSN comprises a number of
components, and though the terminology may change
according to different architectures, (Fig. 4):
Figure 4: Wireless Sensor Networks.
2.1.3
Pervasive Access Devices
Pervasive access devices constitute the front end of
PIS (Senn, 2007; Mattern and Sturm, 2003) and
are likely to contain a multitude of different device
types that differ in size, shape (more diverse, ergonomic, and stylistic), and functional diversity (mobile phones, laptops, pagers, PDAs) (fig.5, fig.6). In
essence, pervasive devices dictate the interaction between the user and the pervasive system (Beigl et al.,
2003). A major requirement for participation of a device in a pervasive environment is connectivity. Devices may include one or more connectivity options
depending on their functionality.
Wireless Sensor Networks (WSN)
Figure 5: Aibo7.
consist of a large number of tiny devices called sensor
nodes that pervade an area and collaborate together
171
CLOSER2014-4thInternationalConferenceonCloudComputingandServicesScience
2.2.3
Figure 6: Nabaztag.
2.1.4
Human-Computer Interaction (HCI)
Is the interaction between users and computers via the
user interfaces (Dnovan, 2010; Gallissot, 2012). HCI
with ICT systems has conventionally been structured
using a few relatively expensive access points. This
interaction primarily uses input from Keyboard and
pointing devices which are fairly obtrusive to interact
with. Nowadays, Interaction is via natural user interfaces and physical interactions that can involve gestures input, multiple touch, voice control, eye gaze
control, etc. It can improve performance and user experience through anticipated actions and user goals in
relation to the current context, past user context and
group context.
2.2
2.2.1
Core Properties of Pervasive
Information Systems
Distributed Systems
Are considered the core of pervasive systems (Siddiq
and Ali, 2010). It consists of multiple autonomous
computers that communicate through a computer network (Bourcier), each device may have its own user
with individual needs, and the purpose of the distributed system is to coordinate the use of shared resources or provide communication services to their
users (Tanenbaum and M. Van Steen, 1999). A distributed system can operate across different homogeneous environments (Li, 2010; Dugénie; Petit) and
seamlessly integrate devices with environments.
2.2.2
Mobility
Will be an important characteric of a ubiquitous system (Saadi, 2009; Louberry, 2010). There are, however, different kinds of mobility schemes, such as terminal mobility, personal mobility, session mobility
and service mobility. Users shall be supported in such
a way that they can move from one place or terminal
to another and still get a personalized service (Tigli et
al,. 2009; Hoareau, 2007; Reignier, 2010; Kouici).In
the future, the networks may also be mobile and dynamic, and therefore, full mobility is an essential requirement in the ubiquitous wireless world.
172
Interoperability
Is one of the most essential requirements of ubiquitous software. Today, application developers’ use a
wide ranges of programming models, languages and
development environments (Vallecillo et al.). The
need to network the embedded products of different
vendors with cyber world applications is increasing in
the ubiquitous environment. the infrastructure for pervasive computing must support diverse types of software component. Applications in pervasive computing environments will be required to respond to novel
tasks and situations, applications will increasingly be
formed dynamically from available software components. This will require dynamic interoperability at
the component level, in addition to interoperability
that overcomes the heterogeneity of the environment
and of components.
2.2.4
Scalability
Is also crucial in pervasive computing scenarios
(Duboc et al,. 2006) as smart environments may lead
to highly intensive interactions between the computing infrastructure and the user space (Escoffier, 2008;
Najar et al., 2012; Sarr, 2010). This, in tum, can
have serious implications for the user with regards to
computing and network resources such as bandwidth,
memory and energy. The ever increasing levels of
communication and computing interactions between
different users also adds to the pressure on resources
(Bourcier) and making scalability an absolutely critical requirement for pervasive systems (André; Sancho, 2010).
2.2.5
Heterogeneity
Devices present in pervasive environments can be of
various kinds (Duboc et al,. 2006; Shaout and Srinivasan, 2009; Jouve, 2009): simple devices (light
or clock), mobile assistant devices (PDA or smartphones), multimedia devices (PC or TV), etc. These
devices have different hardware and are based on various operating systems (Flissi et al., 2005; Ferry et al,.
2008; Louberry, 2010). They can have different communication technologies (wired/wireless) (Bourcier),
and implement different network protocols (UPnP,
Jini, SLP, GSM). Thus, we need to handle this heterogeneity and provide users with an interoperable
system. In the same network, computers with large
storage can coexist with other devices with limited resources (Cheung-Foo-Wo, 2009; Hoareau, 2007).
AFrameworkforAmbientComputing
2.2.6
Integration
Pervasive computing systems by its nature require
integration of many different subsystems (Saha and
Mukherjee, 2003) with very different characteristics.
These subsystems include computational facilities,
communication devices, mechanical or chemical sensors and actuators, smart appliances, and existing control systems.
2.2.11
Context Awareness
Is a property of a system that allows itself to organize
and operate its own actions without human intervention (Bantz et al., 2003; Wikipedia, 2010). The Ubiquitous Computing systems are naturally autonomous,
because it is always self-governing and capable of its
own independent decisions and actions. The system
can operate without human intervention (Sarr, 2010),
and both the input/output and computation of the System are completely embedded in the device it controls.
One of the most important novel characteristics that
PIS introduce is the notion of context awareness. This
term was formally defined and used for the first time
by (Schilit et al., 1994; Brown et al., 1997) to describe
applications that "adapt according to their location
of use, the collection of nearby people and objects,
as well as the changes to those objects over time".
(Abowd et al., 1999) Define context-aware computing as "a system that uses context to provide relevant
information and/or services to the user, where relevancy depends on the user’s task". (Pascoe, 1998)
de?ne context as the subset of physical and conceptual states of interest to a particular entity. (Jameson, 2001) extend the previous definitions by adding
the user’s behavior and current interactions with the
pervasive system. (Laerhoven and Kofi, 2001) emphasize the importance of sensors embedded in the
environment in order to sense the location and current movement of the user and add it to the properties of a context-aware system. (Abowd et al., 1999)
approach context as the user’s emotional state, focus
of attention, location and orientation, date and time,
objects, and people in the user’s environment. Other
definitions have simply provided synonyms for context, referring, for example, to context as the environment or situation. (Cousins and Varshney, 2009)
defines context as the elements of the user’s environment that the user’s computer knows about. The most
generic de?nition for the features of a context-aware
system has been provided by (Dey, 2001): "a system
is context-aware if it uses context to provide relevant
information and/or services to the user, where relevancy depends on the user’s task.
2.2.9
2.2.12
2.2.7
Dynamicity
The mobility of some pervasive devices and the limited resources of others increase the dynamics of pervasive computing environments. This dynamics is
perceived in terms of the number and lifetime of pervasive functionalities a user can access to at a specific time and location. (Najar et al., 2012) In particular, new devices may appear in the environment while
other devices may become out of reach due to a lack
of resources (e.g., battery down), or due to the range
of radio transmissions.
2.2.8
Autonomy
Proaction
The system needs to be self-triggered to capture a priori what its users want in order to increase the overall
quality of service (Laforest, 2007).
2.2.10
Invisibility
is another key requirement for pervasive computing.
In the ideal sense, invisibility implies that the underlying technology is completely hidden from the user’s
perspective (Liu, 2006). In real environments, invisibility can exist only in the approximation sense.
This could be facilitated by smart environments that
constantly adapt to meet the user’s requirements with
minimum user intervention. This problem becomes
more difficult when the user is in a dynamically
changing environment.
Context Management
Users in pervasive environments must access to device functionalities. Moreover, they need a representation of the different elements present in the environment (Dey, 2001). The first requirement of a pervasive system thus is the context management. It demands to represent the context enable users to get
an overview of functionalities and to enable users to
manage this representation. Moreover, context management also involves to be continuously aware of environmental changes and to relate this according to
the context representation.
2.2.13
Adaptability
Adaptation is required in order to overcome the intrinsically dynamic nature of pervasive computing.
Mobility of users, devices and software components
173
CLOSER2014-4thInternationalConferenceonCloudComputingandServicesScience
can occur, leading to changes in the physical and virtual environments of these entities. Moreover, applications can be highly dynamic, with users requiring
support for novel tasks and demanding the ability to
change requirements on the fly (Bourcier). It should
be the role of the infrastructure for pervasive computing to facilitate adaptation, which may involve adapting individual software components and/or reconfiguring bindings of components by adding, removing
or substituting components. Dynamic adaptation can
involve complex issues such as managing the adaptation of software components that are used simultaneously by applications with different (and possibly
conflicting) requirements, and maintaining a consistent external view of a component that has behavior
that evolves over time.
2.2.14
Security
The goal of security is also to guarantee the well functioning of pervasive computing systems. Ubiquitous
computing has been designed in order to be deployed
anywhere and be accessed by the majority of users.
The user mobility and the proliferation of lightweight
devices make complex security problems. Recent research on pervasive computing focuses on building
infrastructures for managing smart spaces, connecting new devices, and providing useful applications
and services. Privacy, trust, and security issues in
such environments, Contextual data are generally personal data are static data such as user preferences and
habits, and dynamic data such as its location and the
tasks it performs. Thus, these data have confidentiality and exchange of data between these applications
must comply with the security measures defined by
the user.
2.2.15
Service Discovery
Is an important and challenging issue in pervasive environments. Service discovery is the task of locating
which services are available (Brown, 1996), usually
followed by a selection activity whose main goal is
the choice of the most appropriate (Zhu et al., 2005),
or best solution based on user-defined metrics (e.g.
accessibility, cost, available bandwidth, load, etc.) in
the presence of multiple instances of the same service
scattered throughout the network.
2.2.16
Quality of Service Management
(UIT) describes the quality of service as a set of requirements on the collective behavior or multiple objects. The aim is to provide users with applications
174
that work best and as long as possible on their favorite mobile device and that whatever the changes
in the environment (Louberry, 2010).
3 RELATED WORK
In this section, we briefly present some research
projects related to this topic, which are also based
on the ubiquitous concepts. We are positioning our
contribution in relation to this work. Though much
progress has been achieved, current architectures provide very few of abstraction and often generic and
limited support. Several studies on the architecture
of pervasive systems are proposed, even if they differ, all of these works are in fact complementary.
(Satyanarayanan, 2001; Moitra, 2004; Afyouni, 2010;
Achour et al., 2012; Em and Yoo, 2005; Siddiq
and Ali, 2010; Cousins and Varshney, 2009; Conti
et al., 2012; Zhou et al., 2010) Adopt an architecturally model based on new technologies (infrastructure networks and communicating devices). (Saha
and Mukherjee, 2003) detailed description of ubiquitous computing, In their opinion, the sensors provide
information about the context of ubiquitous systems,
what makes them different from traditional systems.
(Saha and Mukherjee, 2003) Introduced a model of
the pervasive computing environment by differentiating between devices, pervasive networking, pervasive middleware, and pervasive applications. (Satyanarayanan, 2001) explains that ubiquitous computing
based on distributed systems and mobile computing,
adding features such as smart spaces and invisibility. (Hoh, 2006) In his initial work presents a usercentric model. The authors (Cheung-Foo-Wo, 2009;
Afyouni, 2010; Achour et al., 2012; Hoh, 2006) illustrate the importance of smart spaces where digital and physical world are related in a natural and
transparent to the user. Work (Satyanarayanan, 2001;
Afyouni, 2010; Em and Yoo, 2005; Siddiq and Ali,
2010) integrate the field of intelligent interfaces that
allows users to control and interact with objects intuitively. Finally (Moitra, 2004; Em and Yoo, 2005;
Hoh, 2006) address the security which is a major challenge in building pervasive environment.
Most of the approaches proposed in the literature are
specific to an application or to a particular domain.
They are not sufficiently generic to be reusable in
other domains. The key contribution of the paper
is a reference model architectural has been proposed
for analyzing the functionalities and key of pervasive
computing. Tables 2 offer an overview of the proposals that have inspired our proposed model.
AFrameworkforAmbientComputing
Devices
Smart Space
Infrastructure
Security
Debashis SAHA, 2003
Punnet GUPTA, 2004
Natalia V,Em, 2005
S Hoh, 2006
Karlene C, 2009
Shahid SIDDIQ, 2010
LAYFOUNI, 2010
Jiehan ZHOU, 2010
Fatma ACHOUR, 2012
Marco CONTI, 2012
Our model
HCI
Table 1: Summaries of research work, (-) and (+) correspond to an absence and a presence of the layer
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
identify and authenticate an entity in order to verify
its source or to estimate the trust level that it can be
granted.
Figure 7: Our system architecture for pervasive computing.
4 ARCHITECTURAL MODEL
PROPOSED
The global architecture of PIS is illustrated in Fig.
7. It is based on five layers. The smart interaction
Layer is called for to combine many individual activity interactions for smart devices and smart environments to support the core properties of Ubiquitous
Computing. In other words smart interaction is a unified and continuous interaction model between Ubiquitous Computing applications and their Ubiquitous
Computing infrastructure, physical world and human
environments. The smart devices layer can be considered as a single entry to access sets of popular multiple application services on the device or remotely
on servers. Most of them usually have one specified
user. The smart environment layer comprises a set
of networked devices connected to the physical environment. Different from smart devices, the devices
including a smart environment normally complete a
single pre-defined task. Integrated environment components automatically react to or anticipate user interaction using iHCI (implicit human computer interaction). The infrastructure layer contains all physical hardware such as devices and network equipment.
This layer collects the raw data which are provided by
the physical devices. The security layer must ensure
basic security services. Privacy refers to the protection of the users’ identities and information from nonauthorized parties. Confidentiality is required to protect the users’ information in the whole system, access
control; it is a restriction to access or performance of
an action on some resources, Authentication: used to
4.1
Infrastructure Layer
Represents the level of communication channels, data
and sensor networks, and broadband internet access,
but also the intelligent design of databases, storage,
and network applications (Fig. 8). The term infostructure reflect the change in complexity over the traditional view of infrastructures, but also to emphasize
the increased interdependency with the other levels of
the value chain. Pervasive infostructure is all about
access to information and services beyond the traditional client-server paradigm. The merger of computing and communications is leading the way towards pervasiveness, and infrastructures are the level
where we place the property of this merger. System
infrastructure provides the systems needed for using
the services (Cheung-Foo-Wo, 2009). Infrastructure
providers have advantage about ubiquitous computing
as products and services are provided through multiple channels (Moitra, 2004).
Figure 8: Layer Infrastructure for the Intelligent Environment.
175
CLOSER2014-4thInternationalConferenceonCloudComputingandServicesScience
4.2
Smart Devices Layer
Smart devices, personal computer, mobile phone,
tend to be multipurpose ICT devices (Sartor), operating as a single portal to access sets of popular multiple application services that may reside locally on
the device or remotely on servers. There is a range
of forms for smart devices. Smart devices tend to be
personal devices, having a specified owner or user.
In the smart device model, the locus of control and
user interface resides in the smart device. Devices are
often designed to be multi-functional because these
ease access to, and simplify the interoperability of,
multi functions at run time. The main characteristics
of smart devices are as follows (Fig. 9).
provide appropriate services. The intelligence of the
systems depend on their way to exploit the context
data acquired. The data received from the environment and the user must be interpreted to perform the
appropriate action (Fig. 10).
Figure 10: Smart Space.
4.5
Figure 9: The main characteristics of smart devices.
4.3
Smart Interface Layer
Smart Interaction is called for to combine many individual activity interactions for smart devices (Miraoui, 2009) and smart environments to support the
core properties of Ubiquitous Computing. In other
words, smart interaction is a unified and continuous
interaction model between Ubiquitous Computing applications and their Ubiquitous Computing infrastructure, physical world and human environments.
4.4
Smart Space Layer
A smart environment comprises a set of networked devices connected to the physical environment (Satyanarayanan, 2001). It allows inhabited
services and tasks with different objects available
(Fontaine, 2006). The collection of information from
the physical environment system using communicating objects via using iHCI (implicit human computer
interaction) or objects capable of capturing information (sensors). The collected information is then interpreted, filtered and aggregated by various applications to enrich the contextual information in order to
176
Security layer
In pervasive computing, services are more open, accessible, distributed, and close to the user. This proximity introduces new threats and vulnerabilities for
the systems. Now, systems and services are assimilated to supermarkets open for everybody (Bourcier),
in which merchandise is directly accessible to clients
in a self-service way. Of course, such displayed
goods are vulnerable and can be easily stolen, but
new sophisticated guard systems appeared to protect
the merchandise. new techniques were developed to
adapt the security requirements to the environment.
5 CONCLUSION AND
PERSPECTIVES
In this paper, we have validated our approach in the
domain of pervasive computing from a complete domain analysis. Based on the concepts of Ubiquitous
Computing, we define a list of challenges and concepts that form the core elements of a pervasive environment. Pervasive information systems (PIS) constitute an emerging class of information systems (IS)
where information technology (IT) is gradually embedded in the physical environment (Kouruthanassis and Giaglis, 2006). Therefore, PIS introduce the
property of context awareness as a result of the pervasive artifacts capability to collect, process, and manage environmental or user-related information on a
real-time basis. other research issues that we would
like to work on are: context awareness in pervasive
computing.
AFrameworkforAmbientComputing
REFERENCES
Mark Weiser, The computer for the 21st century, Scientic American, tome 265, nř 3, pages 66-75, septembre
1991.
Ansem Ben Cheikh, E-CARe: une méthode d’ingénierie
des Systèmes d’Information ubiquitaires, 2012.
Clement Escoffier, iPOJO: Un modèle à composant à service flexible pour les systèmes dynamiques, 2008.
Debashis Saha and Amitava Mukherjee, "Pervasive computing: a paradigm for the 21st century", IEEE Computer, 25-31, March 2003.
M. Satyanarayanan, Pervasive Computing: Vision and
Challenges IEEE Personal Communications, 2001.
Puneet Gupta Deependra Moitra, Evolving a pervasive
IT infrastructure: a technology integration approach,
2004, p33.
Cristiano da Costa André, A context aware service based
software infrastructure for pervasive computing.
Adnan Shaout, Hari Srinivasan , Framing Pervasive Computing, 2009.
Imad Afyouni, Indoor space modelling, mobility, and positioning in ubiquitous information systems, 2010.
Jinshan Liu, Découverte de services sensible à la qualité
de service dans les environnements de l’informatique
diffuse, 2006.
Salma Najar, Manuele Pinheiro, Luiz Angelo and Carine
Souveyet, Analyse des Mécanismes de Découverte de
Services avec Prise, 2012.
Fatma Achour, Anis Jedidi and Faiez Gargouri, The
Generic Model for Pervasive Information System,
2012.
Daniel Cheung-Foo-Wo, Adptation dynamique par tissage
d’aspects d’assemblage, 2009.
Moeiz Miraoui, Architecture logicielle pour l’informatique
diffuse, 2009.
Natalia V. Em, Keedong Yoo, Extracting requirements for
ubiquitous computing technology-based is deploying
factor analysis, 2005.
Kouruthanassis, P. E. and Giaglis, G. M., A design theory
for pervasive information systems, 3rd Int. Workshop
on Ubiquitous Computing, pp. 62-70, 2006.
Wilfried Jouve, Approche déclarative pour la génération de
canevas logiciels dédiés à l’informatique ubiquitaire
p7, 2009.
Didier Hoareau, Composants ubiquitaires pour reseaux dynamiques, p8-9, 2007
L. Duboc, et al., "A framework for modelling and analysis
of software systems scalability," published in the proceedings of the International conference on Software
Engineering, 2006, pp 949-952.
D. F. Bantz, C. Bisdikian, D. Challener, J. P. Karidis, S.
Mastrianni, A. Mohindra, D. G. Shea and M. Vanover,
"Autonomic personal computing". IBM Systems Journal, 42(1):165-176, 2003.
A. K. Dey, "Understanding and Using Context". Personal
and Ubiquitous Computing, 5(1):4-7, 2001.
Boxiao Li, Design and Devleopment of an "Intelligent Environment", p10-11, 2010.
Jared Dnovan, Human computer interaction, 2010.
Wikipedia.
Autonomy. http://en.wikipedia.org/wiki/
Autonomy, 2010.
P. Senn,
"Objets communicants et nanotechnologie",
Journées Scientifiques du CNRFS Nanosciences et
Radioélectricité, 2007.
F. Mattern and P. Sturm, "From Distributed Systems
to Ubiquitous Computing - The State of the Art,
Trends, and Prospects of Future Networked Systems",
In Klaus Irmscher and Klaus-Peter Fähnrich, editors,
Proceedings KIVS, pp. 3-25, Springer- Verlag, February 2003.
M. Beigl, A. Krohn, T. Zimmer and Christian Decker, Situation Aware Context Communication", International
conference on Ubiquitous Computing, October 12-15,
Seattle, USA, 2003.
A. S. Tanenbaum and M. Van Steen. Distributed Systems:
Principles and Paradigms. Prentice Hall, 1999.
Idrissa Sarr, Routage des Transactions dans les Bases de
Données à Large Echelle, 2010.
Rachid Saadi, The Chamelon: Un système de sécurité pour
utilisateurs nomades en environnement pervasif et collaboratif, 2009, p2-15.
Jean-Yves Tigli, Stéphane Lavirotte, Gaëtan Rey, Vincent
Hourdin, Daniel Cheung- Foo-Wo, Eric Callegari, and
Michel Riveill. WComp Middleware for Ubiquitous Computing: Aspects and Composite Event-based
Web Services. Annals of Telecommunications (AoT),
64(3-4):197-214, Apr 2009.
F. Zhu, M. W. Mutka and L. M. Ni. Service Discovery in
Pervasive Computing Environments. IEEE Pervasive
Computing, 4(4):81-90. IEEE Educational Activities
Department, 2005.
Frédérique Laforest, De l’adaptation à la prise en compte du
contexte Une contribution aux systèmes d’information
pervasifs, p10, 2007
Areski Flissi, Christophe Gransart and Philippe Merle,
Une infrastructure à composants pour des applications
ubiquitaires. UbiMob 2005: 45-48.
Nicolas Plouznikoff, Jean-Marc Robert,
Applications
Ubiquitaires, Caractéristiques, enjeux et défis de
l’informatique portée, 2005.
Antonio Vallecillo, Juan Hernandez and José M. Troya,
Component Interoperability.
Nicolas Ferry, Stéphane Lavirotte, Gaëtan Rey and JeanYves Tigli, Adaptation Dynamique d’Applications au
Contexte en. Informatique Ambiante, 2008.
Germán Sancho, Adaptation d’architectures logicielles
collaboratives dans les environnements ubiquitaires.
Contribution à l’interopérabilité par la sémantique,
2010, p20.
Christine Louberry, Adaptation au Contexte pour la Gestion
de la Qualité de Service,2010.
UIT. X.902,
Technologies de l’information, traitement reparti ouvert, modèle de référence fondements. Recommandation x.902 (11/95), Union Internationale des Télécommunications.
Patrick Reignier, Intelligence Ambiante Pro-Active de la
Spécification à l’Implémentation. 2010.
177
CLOSER2014-4thInternationalConferenceonCloudComputingandServicesScience
Nabil Kouici, Gestion des déconnexions pour applications
réparties à base de composants en environnements
mobiles.
Johann Bourcier, Auto-Home: une plate-forme pour la gestion autonomique d’applications pervasives, 94.
Pascal Dugénie, Espaces collaboratifs ubiquitaires sur une
infrastructure à ressources distribuées, p52.
Mathieu Petit, Approche spatiale pour la caractérisation du
contexte d’exécution d’un système.
Fabien Sartor, Modélisation de l’interopérabilité d’objets
communicants et de leur coopération Application à la
domotique.
Shahid Siddiq and Aasim Ali, Gap Analysis between Ubiquitous Computing Requirements and Features of an
Open Source Operating System (Openmoko) for Hand
Held Devices, International Journal of Electrical &
Computer Sciences IJECS-IJENS Vol: 10 No: 05,
2010.
Mehdi Loukil, Gestion de contexte pour l’optimisation de
l’acces et l’adaptation des services sur des environnements heterogenes, 137, 2012.
Mathieu Gallissot, Modéliser le concept de confort dans
l’habitat intelligent: du multisensoriel au comportement, 2012, p16.
Emeric Fontaine, Programmation d’espace intelligent par
l’utilisateur final, p12, 2006
Schilit, N. B., Adams, N. and Want, R., (1994). Context
aware computing applications. In Workshop on Mobile Computing Systems and Applications. Sta Cruz,
EtatsUnis, décembre 1994. p 8590.
Brown, J. P., Bovey, D. J. and Chen, X., (1997). Contextaware Applications: from the Laboratory to the
marketplace. In Institute of Electrical and Electronics Engineers (IEEE) Personnal Communications. v.
4, p. 5864.
P. J. Brown. The Stick-e Document: a framework for creating Context aware applications. In Electronic Publishing 96, (1996), Document Manipulation and Typography, 24-26 September 1996, Pala-Alto, California,
USA, pp.259-272
Pascoe. Adding generic contextual capabilities to wearable
computers. In Proceedings of 2nd International Symposium on Wearable Computers, October 1998, pp.
92-99
Kristof Van Laerhoven and Kofi Aidoo, Personal and Ubiquitous Computing vol. 5 issue 1 February, 2001. p. 46
- 49.
Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith,
M., and Steggles, P., 1999. Towards a Better Understanding of Context and Context- Awareness ( Lecture
Notes In Computer Science, Vol. 1707, pp. 304- 307),
1999
Karlene C. Cousins and Upkar Varshney Designing Ubiquitous Computing Environments to Support Work Life
Balance, 2009,117-122.
S. Hoh, J. S. Tan, M. Hartley, Context-aware systems a
primer for user-centred services, BT Technology Journal 186 o Vol 24 No 2 o April 2006
Marco Conti, Sajal K. Das and Chatschik Bisdikian, Looking ahead in pervasive computing: Challenges and op-
178
portunities in the era of cyber-physical convergence,
Pervasive and Mobile Computing 8 (2012) 2-21.
Jiehan Zhou, Ekaterina Gilman, Mika Ylianttila and Jukka
Riekki, Service Computing: Visions and Challenges,
2010 10th IEEE International Conference on Computer and Information Technology, p1335-1339.
Anthony Jameson, "Modeling Both the Context and the
User", Personal Technologies, 5 (2001).