The Community for Technology Leaders
RSS Icon
Issue No.01 - January-March (2008 vol.7)
pp: 64-73
Cristiano André da Costa , Federal University of Rio Grande do Sul
Adenauer Corrêa Yamin , Catholic University of Pelotas
Cláudio Fernando Resin Geyer , Federal University of Rio Grande do Sul
The proliferation of various types of computational devices (many of which include the possibility of wireless network interconnection) allows a glimpse at a new field, which transcends the characteristics of most distributed systems in use today. This area, called ubiquitous (or pervasive) computing, presupposes a strong integration with the real world, keeping high transparency and focus on the user. To develop ubiquitous applications, we need a software infrastructure that can deal with different heterogeneities (hardware, operating systems, networks, protocols, and applications) as well as with whatever new challenges and issues might arise. This article proposes a general model for software architecture designed to support ubiquitous computing. It describes the fundamental issues of heterogeneity, scalability, dependability and security, privacy and trust, spontaneous interoperation, mobility, context awareness, context management, transparent user interaction, and invisibility.
ubiquitous computing; pervasive computing; software architectures; domain-specific architectures
Cristiano André da Costa, Adenauer Corrêa Yamin, Cláudio Fernando Resin Geyer, "Toward a General Software Infrastructure for Ubiquitous Computing", IEEE Pervasive Computing, vol.7, no. 1, pp. 64-73, January-March 2008, doi:10.1109/MPRV.2008.21
1. M. Weiser, "The Computer for the Twenty-First Century," Scientific Am., vol. 265, no. 3, 1991, pp. 94–101.
2. R. Grimm et al., "System Support for Pervasive Applications," ACM Trans. Computer Systems, vol. 22, no. 4, 2004, pp. 421–486.
3. D. Saha and A. Mukherjee, "Pervasive Computing: A Paradigm for the 21st Century," Computer, vol. 36, no. 3, 2003, pp. 25–31.
4. M. Román et al., "A Middleware Infrastructure for Active Spaces," IEEE Pervasive Computing, vol. 1, no. 4, 2002, pp. 74–73.
5. C. Fetzer and K. Högstedt, "Challenges in Making Pervasive Systems Dependable," Future Directions in Distributed Computing, A. Schiper et al., eds., Springer, 2002, pp.186–190.
6. G. Coulouris et al., "Mobile and Ubiquitous Computing," Distributed Systems: Concepts and Design, 4th ed., Addison-Wesley, 2005, pp. 657–719.
7. P. Robinson et al., "Some Research Challenges in Pervasive Computing," Privacy, Security and Trust within the Context of Pervasive Computing, P. Robinson et al., eds., Springer, 2005, pp. 1–16.
8. T. Kindberg and A. Fox, "A System Software for Ubiquitous Computing," IEEE Pervasive Computing, vol. 1, no. 1, 2002, pp. 70–81.
9. I. Augustin et al., "Towards Taxonomy for Mobile Applications with Adaptive Behavior," Proc. 20th Int'l Symp. Parallel and Distributed Computing and Networking (PDCN 02), ACTA Press, 2002, pp. 224–228.
10. A. Dey, "Understanding and Using Context," Personal and Ubiquitous Computing, vol. 5, no. 1, 2001, pp. 4–7.
11. M. Satyanarayanan, "Pervasive Computing: Vision and Challenges," IEEE Personal Comm., vol. 8, no. 4, 2001, pp. 10–17.
12. G. Banavar et al., "Challenges: An Application Model for Pervasive Computing," Proc. 6th Int'l Conf. Mobile Computing and Networking (MOBICOM00), 2000, ACM Press, pp. 266–274.
13. E. Niemelä and J. Latvakoski, "Survey of Requirements and Solutions for Ubiquitous Software," Proc. Mobile Ubiquitous Computing Conf., ACM Press, 2004, pp. 71–78.
14. P. Dourish et al., "Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem," Personal and Ubiquitous Computing, vol. 8, no. 6, 2004, pp. 391–401.
15. V. Cahill et al., "Using Trust for Secure Collaboration in Uncertain Environments," IEEE Pervasive Computing, vol. 2, no. 3, 2003, pp. 52–61.
16. F. Adelstein et al., Fundamentals of Mobile and Pervasive Computing, McGraw-Hill, 2005.
17. A. Dey et al., "A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Application," HCIJ., vol. 16, nos. 2–4, 2001, pp. 97–166.
18. F. Zhu, M. Mutka, and L. Ni, "Service Discovery in Pervasive Computing Environments," IEEE Pervasive Computing, vol. 4, no. 4, 2005, pp. 81–90.
19. D. Garlan et al., "Project Aura: Toward Distraction-Free Pervasive Computing," IEEE Pervasive Computing, vol. 1, no. 3, 2002, pp. 22–31.
20. E. Hornecker, "A Design Theme for Tangible Interaction: Embodied Facilitation," Proc. 9th European Conf. Computer Supported Cooperative Work (ECSCW 05), 2005, Kluwer, pp. 23–43.
21. I. Augustin et al., "ISAM, Joining Context-Awareness and Mobility to Building Pervasive Applications," ch. 4, Mobile Computing Handbook, M. Ilyas and I. Mahgoub, eds., CRC, 2004, pp. 73–94.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool