Using Event B to Specify Context Awareness for Service Discovery in Pervasive Environments

Author(s):  
Karima Belgharbi ◽  
Mahmoud Boufaida

The environments of pervasive computing are open and dynamic. In order to ensure the dynamic discovery of services evolving in a heterogeneous and dynamic environment, specific extensions to WSDL, known as A-WSDL are suggested. These extensions permit to a service provider to define the context of service use and the behavior associated to each change of context. To verify and prove the expected behavior of the suggested discovery protocol in the design phase, the Event-B formalism is adopted. One of the advantages of the Event B formalism is the application of the refining techniques which permit to express complex features by means of mathematical proofs and moves from an abstract specification to a concrete specification by using the Rodin tool which offers a support for the refining and the proofs.

Author(s):  
Frederico Moreira Bublitz ◽  
Emerson Loureiro ◽  
Hyggo Almeida ◽  
Evandro Costa ◽  
Angelo Perkusich

Pervasive computing is emerging as the new paradigm for the XXI century. Although it may be a new concept for many, its first ideas were introduced in 1991, in the seminal paper of Mark Weiser (Weiser, 1991). The primary vision of such a paradigm is that computing becomes part of our lives, being available anytime and anywhere. In other words, it replaced the idea of each person using a single computer at a time (i.e., the personal computer paradigm) to the one where each person can use many computers, which are embedded in everyday life objects (e.g., clothes, phone and automobile).


Author(s):  
Faouzi Sebbak ◽  
Sofiane Bouznad ◽  
Farid Benhammadi ◽  
Abdelghani Chibani ◽  
Yacine Amirat

Author(s):  
Furkh Zeshan ◽  
Radziah Mohamad ◽  
Mohammad Nazir Ahmad

Embedded systems are supporting the trend of moving away from centralised, high-cost products towards low-cost and high-volume products; yet, the non-functional constraints and the device heterogeneity can lead to system complexity. In this regard, Service-Oriented Architecture (SOA) is the best methodology for developing a loosely coupled, dynamic, flexible, distributed, and cost-effective application. SOA relies heavily on services, and the Semantic Web, as the advanced form of the Web, handles the application complexity and heterogeneity with the help of ontology. With an ever-increasing number of similar Web services in UDDI, a functional description of Web services is not sufficient for the discovery process. It is also difficult to rank the similar services based on their functionality. Therefore, the Quality of Service (QoS) description of Web services plays an important role in ranking services within many similar functional services. Context-awareness has been widely studied in embedded and real-time systems and can also play an important role in service ranking as an additional set of criteria. In addition, it can enhance human-computer interaction with the help of ontologies in distributed and heterogeneous environments. In order to address the issues involved in ranking similar services based on the QoS and context-awareness, the authors propose a service discovery framework for distributed embedded real-time systems in this chapter. The proposed framework considers user priorities, QoS, and the context-awareness to enable the user to select the best service among many functional similar services.


2018 ◽  
pp. 1431-1447
Author(s):  
Barkha Narang ◽  
Jyoti Batra Arora

Mobile Commerce is a term to describe any commercial activity on a mobile device, such as a mobile phone (iPhone, Android, Blackberry) or a tablet (iPad, Galaxy Tab, Surface). This includes all steps of the customer journey; reach, attract, choose, convert and retain. Hence mobile commerce is probably best described as shopping that takes advantage of unique properties of mobile devices. It is also called as m-commerce. Pervasive computing aims at availability and invisibility. On the one hand, pervasive computing can be defined as availability of software applications and information anywhere and anytime. On the other hand, pervasive computing also means that computers are hidden in numerous so-called information appliances that we use in our day-to-day lives Characteristics of pervasive computing applications have been identified as interaction transparency, context awareness, and automated capture of experiences.


Author(s):  
Barkha Narang ◽  
Jyoti Batra Arora

Mobile Commerce is a term to describe any commercial activity on a mobile device, such as a mobile phone (iPhone, Android, Blackberry) or a tablet (iPad, Galaxy Tab, Surface). This includes all steps of the customer journey; reach, attract, choose, convert and retain. Hence mobile commerce is probably best described as shopping that takes advantage of unique properties of mobile devices. It is also called as m-commerce. Pervasive computing aims at availability and invisibility. On the one hand, pervasive computing can be defined as availability of software applications and information anywhere and anytime. On the other hand, pervasive computing also means that computers are hidden in numerous so-called information appliances that we use in our day-to-day lives Characteristics of pervasive computing applications have been identified as interaction transparency, context awareness, and automated capture of experiences.


Author(s):  
Maria R.Y. Lee ◽  
Ching Lee

This chapter introduces ontology conceptual modeling for discovering Bluetooth Services in m-commerce. Discovery services in a dynamic environment, such as Bluetooth, can be a challenge because Bluetooth is unlike any wired network, as there is no need to physically attach cables to the devices you are communicating with. Regular Bluetooth service discovery protocol may be inadequate to match different service naming attributes. To support the matching mechanism and allow more organized service discovery, service relation ontology is proposed to extend and enhance the hierarchical structure introduced in the Bluetooth specification. Frame-based and XML-based approaches are used to codify the service relation ontology, which represents the relations of service concepts. A semantic matching process is introduced to facilitate inexact matching, which leads to a situation in which a simple positive or negative response can be meaningful. The Bluetooth ontology modeling represents a broad range of service descriptions and information. The semantic matching process improves the quality of service discovery. We believe that Bluetooth wireless networks’ amalgamation with the ontology conceptual modeling paradigm is a necessary component of creating a new path in the field of m-commerce infrastructures.


Author(s):  
Ratneshwer N/A

In order to develop software components that are reusable across the pervasive computing applications it would be required to consider the variations and properties (mobility, adaptability, composability, context awareness etc.) that may be required for different pervasive computing applications (application types). It should go without saying that various requirements and variations may not always be known a priori and hence developing all the multiple variants may not always be possible or feasible. It is quite unlikely that all the pervasive computing applications would be able to reuse a component ‘as-is’ always. One idea is to use lightweight components such that the overheads (those that are not required in a particular pervasive computing application) do not get transported with the body of the component. Based on this idea, a model of “Generic Component” with ‘Component Generator’ has been proposed that will generate components according to the requirements of a specific pervasive computing application. This work starts a discussion and calls for more extensive research oriented studies by professionals and academicians for perfection of the model.


Author(s):  
Feng Zhu ◽  
Wei Zhu

With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.


Sign in / Sign up

Export Citation Format

Share Document