A behavioral reflective architecture for managing the integration of personal ubicomp systems: automatic SNMP-based discovery and management of behavior context in smart-spaces
详细信息    查看全文
  • 作者:Rui S. Moreira ; Ricardo S. Morla ; Luís P. C. Moreira
  • 关键词:SNMP ; and UPnP ; based behavioral reflection ; Automatic state and behavior graph discovery ; Autonomous management of ubicomp systems
  • 刊名:Personal and Ubiquitous Computing
  • 出版年:2016
  • 出版时间:April 2016
  • 年:2016
  • 卷:20
  • 期:2
  • 页码:229-243
  • 全文大小:2,032 KB
  • 参考文献:1.Abowd G, Dey A, Brown P, Davies N, Smith M, Steggles P (1999) Towards a better understanding of context and context-awareness. In: Gellersen HW (ed) Handheld and ubiquitous computing, vol 1707., lecture notes in computer scienceSpringer, Berlin, pp 304–307CrossRef
    2.Calder M, Magill EH (eds) (2000) VI feature interactions in telecommunications and software systems. IOS Press, Glasgow
    3.Calhoun P, Loughney J, Guttman E, Zorn G, Arkko J (1998) Diameter Base Protocol. RFC 3588, Internet Engineering Task Force
    4.Chaudhry SA, Song W, Vulla MH, Sreenan CJ (2011) EMP: a protocol for IP-based wireless sensor networks management. JUSPN 2(1):15–22CrossRef
    5.Chen G, Kotz D (2000) A survey of context-aware mobile computing research. In: Tech. rep. Dartmouth College
    6.Cheverst K, Byun HE, Fitton D, Sas C, Kray C, Villar N (2005) Exploring issues of user model transparency and proactive behaviour in an office environment control system. User Model User-Adapt Interact 15(3–4):235–273CrossRef
    7.Choi D, Hongseok J, Kugsang J, Punghyeok K, Soohyung K (2006) Delivery and storage architecture for sensed information using SNMP. In: Kim YT, Takano M (eds) Management of convergence networks and services, lecture notes in computer science, vol 4238. Springer, Berlin, pp 582–585
    8.Choi H, Kim N., Cha H (2009) 6LoWPAN-snmp: simple network management protocol for 6LoWPAN. In: 11th IEEE international conference on high performance computing and communications 2009 (HPCC’09), pp 305–313
    9.Data Mining Research Group, Data and Information Systems (DAIS) Research Laboratory, University of Illinois at Urbana-Champaign, IlliMine. http://​illimine.​cs.​uiuc.​edu/​ . Accessed 18 Jan 2016
    10.Durham D, Boyle J, Cohen R, Herzog S, Rajan R, Sastry A (2000) The COPS (Common Open Policy Service) Protocol. RFC 2748, Internet Engineering Task Force
    11.Fischer M (2008) Enhancing the ReMoteCare prototype by adding an SNMP proxy and video surveillance. Master’s thesis, Universitat Koblenz-Landau, Campus Koblenz
    12.Giladi R (2004) Snmp for home automation. Int J Netw Manag 14(4):231–239CrossRef
    13.Goncalves P, Oliveira JL, Aguiar R (2012) A study of encoding overhead in network management protocols. Int J Netw Manag 22(6):435–450CrossRef
    14.Goncalves P, Torres J, Sobral P, Moreira RS (2009) Remote patient monitoring in home environments. In: 1st international workshop MobiHealthInf (BIOSTEC 2009)
    15.Henricksen K, Indulska J, McFadden T, Balasubramaniam S (2005) Middleware for distributed context-aware systems. In: International symposium on distributed objects and applications (DOA). Springer, pp 846–863
    16.Hipp J, Güntzer U, Nakhaeizadeh G (2000) Algorithms for association rule mining—a general survey and comparison. ACM SIGKDD Explor Newsl 2(1):58–64CrossRef
    17.Huebscher M, McCann J (2006) An adaptive middleware framework for context-aware applications. Pers Ubiquitous Comput 10(1):12–20CrossRef
    18.International Telecommunication Union Telecommunication Standardization Sector: Recommendation X.680 – Abstract Syntax Notation One (ASN.1): Specification of Basic Notation (2008)
    19.Jain AK, Murty MN, Flynn PJ (1999) Data clustering: a review. ACM Comput Surv 31(3):264–323CrossRef
    20.Judd G, Steenkiste P (2003) Providing contextual information to pervasive computing applications. In: Proceedings 1st IEEE international conference on pervasive computing and communications 2003 (PerCom 2003), pp 133–142
    21.Kuryla S (2010) Implementation and evaluation of the simple network management protocol over ieee 802.15.4 radios under the contiki operating system. Master’s thesis, School of Engineering and Science, Jacobs University Bremen, Germany
    22.Lim YY, Messina M, Kargl F, Ganguli L, Fischer M, Tsang T (2008) SNMP proxy for wireless sensor network. In: 5th international conference on information technology: new generations, 2008 (ITNG 2008), pp 738–743
    23.Lopez-de Ipina D, Vazquez J, Garcia D, Fernandez J, Garcia I, Sainz D, Almeida A (2006) A middleware for the deployment of ambient intelligent spaces. In: Cai Y, Abascal J (eds) Ambient intelligence in everyday life, lecture notes in computer science, vol 3864. Springer, Berlin, pp 239–255
    24.Maulik U, Bandyopadhyay S (2002) Performance evaluation of some clustering algorithms and validity indices. IEEE Trans Pattern Anal Mach Intell 24(12):1650–1654CrossRef
    25.Moreira LP, Soares C, Moreira RS, Morla R (2012) A decentralized SNMP-based approach for behavior introspection, awareness and discovery in ubiquitous computing. In: 3rd international conference on wireless mobile communication and healthcare
    26.Murtaza SS, Amin SO, Hong CS (2006) Applications of SNMP in ubiquitous environment. KNOM Review 8(2):14–19
    27.Morla R, Davies N (2004) Evaluating a location-based application: a hybrid test and simulation environment. IEEE Pervasive Comput 3(3):48–56CrossRef
    28.Nakajima T, Satoh I (2006) A software infrastructure for supporting spontaneous and personalized interaction in home computing environments. Pers Ubiquitous Comput 10(6):379–391CrossRef
    29.Ranganathan A, Campbell RH (2003) An infrastructure for context-awareness based on first order logic. Pers Ubiquitous Comput 7(6):353–364CrossRef
    30.Salber D, Dey AK, Abowd GD (1999) The context toolkit: aiding the development of context-enabled applications. In: Proceedings SIGCHI conference on human factors in computing systems: the CHI is the limit, CHI’99. ACM, New York, pp 434–441
    31.Soares C, Moreira RS, Morla R, Torres J, Sobral P (2012) Interference free integration of pervasive applications. In: 11th IEEE international conference on ubiquitous computing and communications (IUCC 2012). Liverpool, pp 1499–1506
    32.Soares C, Moreira RS, Morla R, Torres J, Sobral P (2012) Prognostic of feature interactions between independently developed pervasive systems. In: International conference on prognostics and health management 2012 (PHM 2012). Denver
    33.Soares C, Moreira RS, Morla R, Torres J, Sobral P (2014) A graph-based approach for interference free integration of commercial off-the-shelf elements in pervasive computing systems. Future Gener Comput Syst 39:3–15CrossRef
    34.Urnes T, Hatlen AS, Malm PS, Myhre O (2001) Building distributed context-aware applications. Pers Ubiquitous Comput 5(1):38–41CrossRef
    35.Velasquez C, Soares C, Morla R, Moreira RS, Torres J, Sobral P (2011) A 3D Simulation Framework for Safe Ambient-Assisted Home Care. In: 5th International conference on mobile ubiquitous computing, systems, services and technologies (UBICOMM 2011). Lisboa, pp 61–66
    36.Yau S, Karim F, Wang Y, Wang B, Gupta S (2002) Reconfigurable context-sensitive middleware for pervasive computing. IEEE Pervasive Comput 1(3):33–40CrossRef
  • 作者单位:Rui S. Moreira (1) (3)
    Ricardo S. Morla (2) (3)
    Luís P. C. Moreira (1)
    Christophe Soares (1) (3)

    1. Faculdade de Ciências e Tecnologia, Universidade Fernando Pessoa, Praça 9 de Abril, 349, 4249-004, Porto, Portugal
    3. INESC Porto, Rua Dr. Roberto Frias, 4200-465, Porto, Portugal
    2. Faculdade de Engenharia, Universidade do Porto, Rua Dr. Roberto Frias, 4200-465, Porto, Portugal
  • 刊物类别:Computer Science
  • 刊物主题:User Interfaces and Human Computer Interaction
  • 出版者:Springer London
  • ISSN:1617-4917
文摘
Context-aware ubiquitous computing systems should be able to introspect the surrounding environment and adapt their behavior according to other existing systems and context changes. Although numerous ubiquitous computing systems have been developed that are aware of different types of context such as location, social situation, and available computational resources, few are aware of their computational behavior. Computational behavior introspection is common in reflective systems and can be used to improve the awareness and autonomy of ubicomp systems. In this paper, we propose a decentralized approach based on Simple Network Management Protocol (SNMP) and Universal Plug and Play (UPnP), and on state transition models to model and expose computational behavior. Typically, SNMP and UPnP are targeted to retrieve raw operational variables from managed network devices and consumer electronic devices, e.g., checking network interface bandwidth and automating device discovery and plug and play operations. We extend the use of these protocols by exposing the state of different ubicomp systems and associated state transitions statistics. This computational behavior may be collected locally or remotely from ubicomp systems that share a physical environment, and sent to a coordinator node or simply shared among ubicomp systems. We describe the implementation of this behavior awareness approach in a home health-care environment equipped with a VoIP Phone and a drug dispenser. We provide the means for exposing and using the behavior context in managing a simple home health-care setting. Our approach relies on a system state specification being provided by manufacturers. In the case where the specification is not provided, we show how it can be automatically discovered. We propose two machine learning approaches for automatic behavior discovery and evaluate them by determining the expected state graphs of our two systems (a VoIP Phone and a drug dispenser). These two approaches are also evaluated regarding the effectiveness of generated behavior graphs.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700