Context Aggregation and Dissemination in Ubiquitous Computing Systems

Author(s):  
Guanling Chen ◽  
David Kotz
2006 ◽  
Vol 14 (6) ◽  
pp. 731-743
Author(s):  
Chao-Chun Chen ◽  
Chiang Lee ◽  
Lien-Fa Lin

Author(s):  
José Ramiro Martínez-de Dios ◽  
Alberto de San Bernabé-Clemente ◽  
Arturo Torres-González ◽  
Anibal Ollero

Author(s):  
Robert Tesch ◽  
Ashok Kumar ◽  
Jamie Mason ◽  
Dania Alvarez ◽  
Mario Di’Mattia ◽  
...  

Majority of the devices that are used in ubiquitous computing are expected to be as small as possible, be able to perform as many computations as possible, and transmit the results to another device or computer. Such expectations in performance put a pressure on the power budget of such devices. It is a well-known fact that the advances in battery technology are much slower and cannot keep up with the performance demands of tiny gadgets unless new methods of designing and managing hardware and software are developed and used. This chapter will introduce the motivation for low power design considerations by discussing the power limitations of ubiquitous computing devices. Then the chapter will discuss the research directions that are being pursued in literature for reducing power consumption and increasing efficiency of ubiquitous computing systems.


Author(s):  
Volkmar Lotz ◽  
Luca Compagna ◽  
Konrad Wrona

The flexibility and dynamism of ubiquitous computing systems have a strong impact on the way their security can be achieved, reaching beyond traditional security paradigms like perimeter security and communication channel protection. Constant change of both the system and its environment demand adaptive security architectures, capable of reacting to events, evaluating threat exposure, and taking evolving protection needs into account. We introduce two examples of projects that contribute to meeting the challenges on adaptive security. The first focuses on an architecture that allows for adaptive security in mobile environments based on security services whose adaptation is guided by context information derived from sensor networks. The second addresses engineering aspects of secure ubiquitous computing systems through making security solutions accessible and deployable on demand and following emerging application-level requirements.


2013 ◽  
Vol 79 (5) ◽  
pp. 518-529 ◽  
Author(s):  
Meikang Qiu ◽  
Lei Zhang ◽  
Zhong Ming ◽  
Zhi Chen ◽  
Xiao Qin ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document