跨智能空间上下文共享研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
普适计算的目标是使得人们可以随时随地访问信息,并实现计算的不可见性。智能空间是普适计算在局部物理空间中的体现。而上下文感知计算在智能空间中起着举足轻重的作用,它体现了智能空间中智能性的特征。
     随着普适计算技术的深入挖掘与推广,智能空间的研究与应用也将从原来的单智能空间阶段逐步扩展到跨智能空间阶段,这种转变符合普适计算中“普”的要求,即无论用户处在哪个智能空间中,都可以充分享受到计算带来的服务。在跨智能空间研究阶段,上下文感知的研究仍然十分关键。然而,对于跨智能空间的场景,上下文共享又面临着多项理论与技术上的困难,如,上下文语义匹配问题、隐私性问题和时效性问题等。本文正是基于以上背景,开展对跨智能空间场景下上下文共享的隐私性问题和时效性问题的研究工作,具体研究内容和创新点表现在以下几个方面:
     (1)为了更好的开展跨智能空间上下文共享的研究,首先对普适计算中智能空间、跨智能空间和上下文感知的研究现状进行梳理,在此基础上提出了一个跨智能空间上下文共享的中间架构模型,并对其中遇到的隐私性问题和时效性问题做概括性探讨。
     (2)跨智能空间上下文隐私性研究。选取最典型也是应用最广的一种上下文——位置信息,作为研究对象,着重研究在用户所在空间和上下文消费者不可信任的场景下,保护用户位置信息的方法。本文发现基于位置的服务(LBS)中对查询隐私保护的两大类k匿名算法(clique cloaking和non-clique cloaking)只是针对单快照查询做匿名保护,无法保护连续查询的匿名性。因此提出一种连续查询模型,该模型融合了连续查询时间间隔模型和连续性模型,并基于该连续查询模型对两类LBS中的k匿名算法分别提出了一种连续查询攻击算法。本文发现在k匿名中普遍使用的以匿名集的势作为匿名集(即k)的度量方式并不适用于连续查询,提出了一种基于熵理论的匿名性度量方式AD,实验结果证明在连续查询中,AD比k能更好的反应查询的匿名性。
     (3)跨智能空间上下文传播的时效性研究,提出了一种面向推理的上下文缓存置换算法CORA,利用缓存技术来降低跨智能空间中由于上下文的数量大、距离远,所造成的上下文传播的开销。CORA采用状态空间对低级上下文到高级上下文的推理进行建模,对各种上下文推理方法具有普遍适用性。在此模型基础上,CORA计算出低级上下文的访问概率和预计失效时间,获得数据的缓存价值,作为上下文缓存置换的依据,以提高缓存的命中率。实验证实,针对普适计算环境上下文数据更新率高的特点,CORA相对传统的缓存置换算法能达到较高的命中率。
     (4)跨智能空间上下文推理的时效性研究,针对上下文推理结果在一段时间内仍然保持“新鲜”的特点,提出推理结果重复利用效率及其计算公式。在此基础上提出一种新鲜度敏感的上下文推理实时调度算法FRSA,以推理结果重复利用效率作为判断依据结合任务的deadline进行调度,其目标是在推理器负载较重时达到较高吞吐量。本文还提出一种实时调度的启发式规则,使FRSA避免基于值函数调度复杂度过高的缺陷。实验表明,在推理器负载重时,FRSA的系统吞吐量比经典调度算法(SJF、EDF、LSF和FCFS)高出10%-30%。
Pervasive Computing enables access to information anywhere,anytime,and makes the computing disappear.A smart space is a local Pervasive Computing environment,in which context-aware computing plays an important role in bringing intelligent interaction to users.
     With the development and spread of Pervasive Computing technology,research and application of smart space has extended from individual-smart-space stage to inter-smart-space stage.This extension demonstrates "pervasiveness" of Pervasive Computing,i.e.people can enjoy computing services in any smart spaces. Context-aware computing is still important in the inter-smart -space stage.However, in this stage,context sharing faces several theoretic and technical difficulties,such as semantic translation of context between smart spaces,inter-smart-space privacy protection and timely provision of massive contexts.In this dissertation,the author's researches focus on privacy protection and timely context processing in inter-smart-space context sharing scenarios.The specific issues and contributions include:
     (1) Firstly,it studies the state of the arts on "smart space","inter-smart space" and "context-aware computing",and proposed a context-sharing infrastructure in the inter-smart-space scenarios.Privacy and timeliness problems are briefly discussed with respect to this infrastructure.
     (2) Research on privacy protection in the inter-smart-space scenarios.Using location context,a typical and most widely used context,as the research object,it focuses on the users' location privacy protection in untrusted smart spaces.The two classical k-anonymity algorithm in Location-Based Service(LBS),i.e.,Clique Cloaking and Non-Clique Cloaking,provide good privacy protection only for snapshot queries but not for continuous ones.A continuous query-issuing model is proposed,which incorporates a query issuing interval model and a consecutive queries relationship model.Under this model,an attacking algorithm is devised against the k-anonymity algorithm.It is arguedthat the cardinality of anonymity-set is not a good anonymity measurement under such attacking and an entropy-based anonymity measurement AD is proposed.Experiments demonstrate that the attacking algorithms have high success rate in identifying query senders when the consecutive queries have strong relationship,and that AD is better anonymity measurement than the cardinality of anonymity-set.
     (3) Research on the timeliness of context dissemination in the inter-smart-space scenarios.Caching is an effective way to reduce context access overhead and improve application availability when disconnections occur.The reasoning-oriented COntext cache Replacement Algorithm(CORA) is proposed in this dissertation,which adopts context state space as a general model for diverse context reasoning methods.And based on this model,it computes the estimated access probability and invalidation time of low-level contexts to get their caching values for replacement.Simulations demonstrate that CORA gets higher hit rate than conventional replacement algorithm for high data update rate(versus access rate) in pervasive computing scenarios.
     (4) Research on the timeliness of context reasoning in the inter-smart-space scenarios.Considering the fact that reasoning results remain fresh within a period of time,it introduces the concept of reasoning result reuse efficiency and its computation method.Then a Freshness-aware Real-time Scheduling Algorithm(FRSA) is proposed to promote the system throughput when the reasoner is overloaded,which schedules reasoning jobs according to their result reuse efficiencies and deadlines.A heuristic algorithm of real-time scheduling is also proposed to reduce the computing complexity of value function-based real-time scheduling.The simulation demonstrates that when the reasoner is heavily overloaded,the throughput of FRSA is 10%to 30%better than those of classic scheduling algorithms,i.e.,SJF,EDF,LSF and FCFS.
引文
[Abowd97] G.Abowd, C. Atkeson, J. Hong, S. Long, R. Kooper, M. Pinkerton. Cyberguide: A mobile context-aware tour guide[C]. ACM Wireless Networks, 1997,3(5):421 -433.
    [Acharya95] S. Acharya, R. Alonso, M. Franklin. Broadcast Disks: Data Management for Asymmetric Communications Environments[C]. In Procedings of ACMSIGMOD Conf. Management of Data, May. 1995:199-210
    [Acharya98] S. Acharya. Broadcast Disks: Dissemination-Based Data Management for Asymmetric Communication Environments. PhD dissertation, BrownUniv., May. 1998.
    [Al-Karaki04] J.N Al-Karaki, A.E.Kamal. Routing techniques in wireless sensor networks: A survey[J]. IEEE Wireless Communications. 2004, 11(6): 6-28
    [Anandarajah06] M. Anandarajah, J. Indulska, R. Robinson. Caching Context Information in Pervasive Systems[C]. Proceedings of the 3rd international Middleware doctoral symposium. Melbourne, Australia, 2006 :20-27
    [Anandarajah07] M. Anandarajah, J. Indulska and R. Robinson. Hoarding Context Information with Context Clusters. Proceeding of Pervasive Computing and Communications Workshops, Mar. 2007:33-38
    [Arnold99] K. Arnold et al. The Jini Specification. Addison-Wesley, Reading, Mass., 1999.
    [Baader03] F. Baader, D. Calvanese, D. L. McGuinness. The Description Logic Handbook. Cambridge University Press, 2003. ISBN 0-521-78176-0.
    [Bauer03] M. Bauer, C. Becker, J. Hahner, G.Schiele. ContextCube: Providing Context Information Ubiquitously[C]. In the Proceedings 23rd International Conference on Distributed Computing Systems Workshops, 2003: 308 -313
    [Becker04]C. Becker, D. Nicklas. "Where do spatial context-models end and where do ontologies start? A proposal of a combined approach"[C]. In the Proceedings of First International Workshop on Advanced Context Modelling, Reasoning And Management of UbiComp, 7,2004
    [Bellavista03] P. Bellavista, A. Corradi, R. Montanari. Context-aware middleware for resource management in the wireless Internet [J]. IEEE Trans. On Software Engineering, 2003,29(12): 1086-1099.
    [Brezillon03] P. Brezillon. Context-based modeling of operators'practices by contextual graphs[C]. In Proceedings of the 14th Mini Euro Conference: Human Centered Processes, 2003:129-137
    [Brezillon04] P. Brezillon, G.K. Mostefaoui. Context-Based Security Policies: A New Modeling Approach[C]. In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004:154-158
    [Brinkhoff02] T. Brinkhoff .A Framework for Generating Network-Based Moving Objects [J]. Geoinformatica, 2002,6(2): 153-180.
    [Brumitt00] B. Brumitt, B. Meyers, J. Krumm. EasyLiving: Technologies for intelligent environments[C]. Handheld and Ubiquitous Computing, Bristol, UK, 2000: 30-36
    [Buchholz03] T. Buchholz, A. Kupper, M. Schiffers. Quality of Context Information: What it is and why we need it[C]. In Proceedings of the 10th HP-OVUA Workshop, Geneva, Switzerland, July, 2003 :33-42
    [Buchholz04] T. Buchholz, M. Krause, C. Linnhoff-Popien, M. Schiffers. CoCo: Dynamic Composition of Context Information [C]. In Proceedings of The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. 2004: 335-343
    [Buchholz05] T. Buchholz, C. Linnhoff-Popien. Towards Realizing Global Scalability in Context-Aware Systems In Location- and Context-Awareness[C]. In the Proceedings of the First International Workshop, LoCA 2005, Lecture Notes in Computer Science (3479),, Springer, Oberpfaffenhofen, Germany, 2005:26-39
    [Campbell02] R. Campbell, J. Al-Muhtadi, P. Naldurg, Towards Security and Privacy for Pervasive Computing[C]. In Theories and Systems, Mext-NSF-JSPS International Sympsoium, ISSS 2002: 395-399
    [Chen04a] H. Chen, F. Perich, T. Finin. SOUPA: Standard Ontology for Ubiquitous and Pervasive applications[C]. In the Proceedings of The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. 2004:258-267
    [Chen04b] H. Chen. An Intelligent Broker for Context-Aware Systems. Ph.D. thesis. University of Maryland. Baltimore County, 2004.
    [Cheverst98] K. Cheverst, K. Mitchell, N. Davies. Design of an object model for a context sensitive tourist GUIDE[C]. In Proceedings of Workshop on Interactive Applications of Mobile Computing (IMC'98), Rostock, Germany, 1998 : 95-100
    [Chow07] C.Y. Chow, M. F. Mokbel. Enabling Private Continuous Queries for Revealed User Locations[C]. In Proceedings of SSTD 2007: 258-275
    [Coen99] M. Coen. The future of human-computer interaction or how I learned to stop worrying and love my intelligent room [J]. IEEE Intelligent Systems, 1999, 4(3-4): 8-19
    [Cormen01]T. H. Cormen, C. E. Leiserson, R. L. Rives. Introduction to algorithms, MIT Press, Cambridge, MA., 2001
    [Czerwinski99] S.E. Czerwinski et al. An Architecture for a Secure Service Discovery Service[C]. In the Proceedings of 5th Ann. ACM/IEEE Int'l Conf. Mobile Computing and Networks (MobiCom 99), ACM Press, New York, 1999:24-35.
    [Deelman04] E Deelman, GSingh, M.P.Atkinson. Grid-Based Metadata Services[C]. In the Proceedings. 16th International Conference on Scientific and Statistical Database Management, 2004: 393 - 402
    [Dertouzos89] M. L. Dertouzos, A. K. Mok. Multiprocessor on-line scheduling of hard-real-time tasks [J]. IEEE Transaction on Software Engineering, 1989, 15(12):1497-1506.
    [Dertouzos99] M. Dertouzos. The future of computing[C]. Scientific American, 1999, 282(3): 52-63
    [Dey00] A.K. Dey. Providing Architectural Support for Building Context-Aware Applications. PhD dissertation, College of Computing, Georgia Institute of Technology, 2000.
    [Dian02] A. Dian, J. Madhavan, P. Domingos, A. Halevy. Learning to map between Ontologies on the semantic web[C]. In: Proccedings of the World-Wide Web Conference (WWW), 2002:662-673
    [Do02] H.H. Do, E. Rahm. COMA-A System for Flexible Combination of Schema Matching Approaches[C]. In: Proceedings of the 28th international conference on Very Large Data Bases (VLDB), 2002:610-621
    [Driessen97] RF. Driessen, J. Gabert. An Internet protocol for flexible, scalable, and secure interaction with ubiquitous computing devices [C]. In Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 1997:414-416
    [Duri02] S. Duri, M. Gruteser, X. Liu, P. Moskowitz.. Framework for security and privacy in automotive telematics [C]. In Proceedings of the second international workshop on Mobile commerce, ACM Press, 2002:25-32.
    [Dvorak97]A. Dvorak. Computational Properties of Fuzzy Logic Deduction[C]. Proceedings of the International Conference on Computational Intelligence, Theory and Applications, 1997:189-196
    [Fairman98] F. W. Fairman. Linear Control Theory, the State Space Approach. John Wiley & Sons Ltd, West Sussex, England, Jun. 1998
    [Ferscha01] A. Ferscha. Intergration Pervasive Information Acquisition to Enhance Workspace Awareness. In IEEE Proceedings of Ninth Euromicro Workshop on Parallel and Distributed Processing, 2001:327-336
    [Garlan02] D. Garlan, D.P. Siewiorek, A. Smailagic, P. Steenkiste. Project Aura: Toward Distraction-Free Pervasive Computing.[J] In: IEEE Pervasive Computing, 2000,21(2): 22-31
    [Gedik05] B. Gedik and L. Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model [C]. In Proceedings of International Conference on Distributed Computing Systems, 2005: 620-629
    [Ghinita07] G. Ghinita,, P. Kalnis, S. Skiadopoulos, PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems[C] In Proceedings of WWW, 2007: 371-380
    [Gray01] P. Gray, D. Salber. Modelling and using sensed context in the design of interactive applications[C]. In the Proceedings of 8th IFIP Conference on Engineering for Human-Computer Interaction, Toronto ,2001: 317-336
    [Grimm01] R. Grimm. Systems Directions for Pervasive Computing[C]. In the Proceedings of 8th Workshop Hot Topics in Operating Systems (HotOS VIII), 2001:128-132.
    [Grossmann05] M. Grassmann, M. Bauer, N. Honle. Efficiently Managing Context Information for Large-scale Scenarios[C]. In the Proceedings of the 3rd IEEE Int'l Conf. on Pervasive Computing and Communications, Hawaii, 12, 2005 :331-340
    [Gruber03] T. R. Gruber. A translation approach to portable ontology specifications.[J] Knowledge Acquisition, 1993 , 5(2): 199-220,
    [Gruteser03] M. Gruteser, D. Grunwald. Anonymous usage of locationbased services through spatial and temporal cloaking[C]. In ACM/USENIX MobiSys, 2003 :69-78
    [Gu04a] T. Gu, H.K.Pung, D.Q. Zhang. Toward an OSGi-Based Infrastructure for Context-Aware Applications Pervasive Computing. IEEE Pervasive Computing. 2004, 3(4): 66-74
    [Gu04b]T. Gu, H. K. Pung, D. Q. Zhang. A Bayesian Approach for Dealing with Uncertain Contexts[C]. In Proceedings of the 2nd International Conference on Pervasive Computing, 2004: 55-59
    [Gu05] T. Gu, H. K. Pung, D. Q. Zhang. A service-oriented middleware for building context-aware services [J]. Journal of Network and Computer Applications, 2005 :1-18
    [Guttman99] E. Guttman. Service Location Protocol: Automatic Discovery of IP Network Services[C]. IEEE Internet Computing, vol. 3, no. 4, July/Aug. 1999: 71-80.
    [Han07] Q. Han, N. VenKatasubramanian. Timeliness-accuracy balanced collection of dynamic context data[J]. IEEE Transaction on Parallel and Distributed Systems. 2007, 18(2): 158-171
    [Hdaiaer95] L. Hdaiaer. Toward vision 2001 : voice and audio processing consideration[J]. AT&T Technical Journal, 1995,74(2): 4-13
    [Heinzelman00] W. Heinzelman, A. Chandrakasan, H. Balakrishnan. Energy-Efficient Communication Protocol for Wireless Mi-crosensor Networks[C] In the Proceedings of the 33rd Hawaii International Conference on System Sciences, 2000: 1-10
    [Hengartner03] U. Hengartner, P. Steenkiste. Access Control to Information in Pervasive Computing Environments[C]. In the Proceedings of 9th Workshop on Hot Topics in Operating Systems (HotOS IX), 2003 :27-29
    [Henricksen02] K. Henricksen, J. Indulska, A. Rakotonirainy. Modeling Context Information in Pervasive Computing Systems[C]. In the Proceedings of the First International Conference on Pervasive Computing, 2002:167-180
    [Henricksen04] K. Henricksen, S. Livingstone, J. Indulska. Towards a hybrid approach to context modeling, reasoning and interoperation[C]. In the Proceedings of First International Workshop on Advanced Context Modelling, Reasoning And Management of UbiComp, Sep. 7,2004: 35-46
    [Hightower07] J. Hightower, G.Borriello. Location Systems for Ubiquitous Computing [J]. Computer. 2007,6(2): 62-69.
    [Hong02] J.I. Hong . The Context Fabric: An Infrastructure for Context-Aware Computing [C]. In Proceedings of Doctoral Consortium, Human Factors in Computing Systems, Minneapolis, MN ,2002: 39-45
    [Hong04] J.I. Hong, J.A. Landay. An Architecture for Privacy-Sensitive Ubiquitous Computing[C]. In Proceedings of The Second International Conference on Mobile Systems, Applications, and Services (Mobisys 2004). Boston, MA. 2004:177-189
    [Honle05] N. Honle, U.P. Kappeler, D. Nicklas. Benefits Of Integrating Meta Data Into A Context Model[C]. The proceedings of Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerComW, 8-12 March 2005 :25 - 29
    [Huang04] X. Huang, C. S. Jensen. Towards A Streams-Based Framework for Defining Location-based Queries[C]. In Proceedings of the International Workshop on Spatio-temporal Database Management, STDBM, Toronto, Canada, August 2004: 73-80.
    [Hung00] C. Hung, L. Hong. Bandwidth Sensitive Content Transformation in Pervasive Computing[C]. In Proceedings of IEEE Symposium on Computers and Communications, 2000: 14-19
    [Intanagonwiwat00] C. Intanagonwiwat, R. Govindan, D. Estrin. Directed difusion: a scalable and robust communication paradigm for sensor networks[C]. Proceedings of ACM MobiCom, Boston, MA, 2000: 56-67.
    [Jian05] N. Jian, W. Hu, G.Cheng, Y. Qu. Falcon-AO: Aligning Ontologies with Falcon[C]. K-Cap 2005 Workshop on Integrating Ontologies 2005 : 5-10
    [Jose99] R. Jose, N.Davies. Scalable and flexible location-based services for ubiquitous information access[C]. In Proceedings of First International Symposium on Hand-held and Ubiquitous Computing, HUC'99, Springer Verlag, 1999:2-66.
    [Judd03] G. Judd, P. Steenkiste. Providing Contextual Information to Pervasive Computing Applications[C]. In the Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003: 133- 142
    [Kagal02] L. Kagal, J.Undercoffer, F. Perich. A Security Architecture Based on Trust Management for Pervasive Computing Systems[C]. In Proceedings of Grace Hopper Celebration of Women in Computing 2002 : 59-65
    [Kagal03] L. Kagal, T. Finin, A. Josh. A Policy Language for a Pervasive Computing Environment. In Proceedings of IEEE Workshop on Policies for Distributed Systems and Networks, 2003:63-74
    [Kang02]K.D. Kang, S.H. Son, J.A. Stankovic, and T.F. Abdelzaher. A QoS-Sensitive Approach for Miss Ratio and Freshness Guarantees in Real-Time Databases [C]. In Proceedings of 14th Euromicro Conference of Real-Time Systems, 2002: 15-26
    
    [Khanna00] S. Khanna and V. Liberatore. On Broadcast Disk Paging[J], SIAM Journal of Computing,2000,29(5):1683-1702
    [Khedr05]M Khedr,A Karmouch.ACAI:Agent based Context aware Infrastructure for spontaneous applications[J].Network and Computer Applications,2005,28(1):19-44
    [Kidd99]C.D.Kidd,R.Orr,G.D.Abowd.The aware home:A living laboratory for ubiquitous computing research[C].In Proceedings of the International Workshop on Cooperative Buildings,Pittsburgh,Pennsylvania,1999:191-198
    [Kindberg01]T.Kindberg,J.Barton.A Web-Based Nomadic Computing System[J].In Computer Networks,Elsevier,2001,35(4):443-456.
    [Kindberg02]T.KindBerg,A.Fox.System software for ubiquitous computing[J].In:IEEE Pervasive Computing.2002,1(1):70-81
    [Kolahdouzan05]M.R.Kolahdouzan,C.Shahabi.Alternative Solutions for Continuous K Nearest Neighbor Queries in Spatial Network Databases[J].GeoInformatica,2005,9(4):321-341,
    [Krause06]A Krause,A Smailagic,D P Siewiorek.Context-aware;mobile computing:learning context- dependent personal preferences from a wearable sensor array[J].IEEE TRANSACTIONS ON MOBILE COMPUTING.2006,5(2):113-127
    [Kung03]H.T.Kung,D.Vlah.Efficient Location Tracking Using Sensor Networks[C].In Proceedings of IEEE Wireless Communications and Networking Conference,2003:1954-1961
    [Lee01]C.Lee,C.Chen.A Data Delivery Strategy in Ubiquitous Computing Systems.[C].In the Proceedings of Database Systems for Advanced Applications,2001:210-217
    [Lehmann04]O.Lehmann,M.Bauer,C.Becker.From Home to World:Supporting Context-aware Applications through World Models[C].Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications,2004:297-306
    [Leonhardi02]A.Leonhardi,K.Rothermel.Architecture of a Large-scale Location Service[C],Proceedings of the 22nd Conference on Distributed Computing Systems ICDCS, Short Paper, 2002:465-466
    [Leung82] J. Leung, J. Whitehead .On the complexity of fixed-priority scheduling of periodic, real-time tasks [J]. Performance Evaluation,2(12), 1982 :237-250
    [Lewis99] T. Lewis, UbiNet: The Ubiquitous Computing will be Wireless [J]. Computer, 32(10), 1999 : 126-127
    
    [Lin04] 林涛.普适计算中的服务选择问题.东北大学博士论文,2004.1
    
    [Liu73] C. L. Liu, J. Layland. Scheduling algorithms for multiprogramming in real-time systems[J]. Journal of the ACM, 1973, 20 (1):46-61
    [Loke04] S. W. Loke. Facing Uncertainty and Consequence in Context-Aware Systems: towards an Argumentation Approach[C]. In the Proceedings of First International Workshop on Advanced Context Modelling, Reasoning And Management of UbiComp, Sep. 7, 2004 :34-37
    [Loke86]C. Loke. Best-Effort Decision making for Real-Time Scheduling. PHD thesis, Computer Science Department, Carnegie-Mellon University, 1986
    [Machanavajjhala06] A. Machanavajjhala, J. Gehrke, and D. Kifer. 1-Diversity: Privacy Beyond k-Anonymity [C]. In Proceedings of International Conference on Data Engineeing, 2006 :229-236
    [Madhavant01] J. Madhavant, RA. Bernstein, E. Rahm. Generic schema matching with cupid[C]. In: Proccedings of the 27th Internationl. Conference on very Large Databases (VLDB), 2001:. 49-58
    [Mercer92] W. Mercer. An introduction real-time operating system: scheduling theory. School of Computer Science, Carnegie Mellon University, 1992
    [Misra01] A. Misra, S. Das, A. McAuley. Autoconfiguration, Registration, and Mobility Management for Pervasive Computing[J]. IEEE Personal Communications, 8(4),2001: 24-31
    [Mokbel05] M.F. Mokbel , W.G.Aref. SOLE: Scalable Online Execution of Continuous Queries on Spatiotemporal Data Streams. Technical Report TR CSD-05-016, submitted for a journal publication, Purdue University Department of Computer Science, July 2005:1-25
    [Mokbel07] M.F. Mokbel, C.Y. Chow, W.G.Aref. The New Casper: A Privacy-Aware Location-based Databse Server[C].In Proceedings of International Conference on Data Engineeing 2007:1499-1500
    [Ogata67]K.Ogata.State Space Analysis of Control Systems.Prentice-Hall,Englewood Cliffs,N.J.1967.
    [Olson00]C.Olston,J.Widom.Offering a Precision-Performance Tradeoff for Aggregation Queries over Replicated Data[C].In Proceedings of VLDB,2000:144-155
    [Oiston01]C.Olston,BT Loo,J Widom.Adaptive Precision Setting for Cached Approximate Values[J].ACM SIGMOD Record,2001,30(2):355-366
    [Oviatt97]S.Oviatt,A.DeAngeli,K.Kuhn.Integration and synchronization of Input Modes during Multimodal Human-Computer Interaction[C].Proceedings of the SIGCHI conference on Human factors in computing systems,1997:415-422.
    [Padovitz05]A.Padovitz,A.Zaslavsky,S.W.Loke,B.Burg.Maintaining Continuous Dependability in Sensor-Based Context-Aware Pervasive Computing Systems.Proceedings of the 38th Hawaii International Conference on System Sciences.Jan.2005:290-291
    [Pan03]潘刚.三维人脸识别若干技术研究.浙江大学博士学位论文,2003.8.
    [Papadimitriou98]C.H.Papadimitdou,K.Steiglitz.Combinatorial optimization:algorithms and complexity,Dover,New York,1998
    [Perdg00]A.Perrig,R.Szewzyk,J.D.Tygar.SPINS:security protocols for sensor networks[J].Wireless Networks.2000,8(5):521-534.
    [Pfitzmann01]A.Pfitzmann,M.Kohntopp.Anonymity,Unobservability,and Pseudonymity - A Proposal for Terminology.In Proceedings of Information Hiding Workshop,Pittsburgh,USA,2001:1-9
    [Qin05]秦伟俊,基于本体的智能空间情境信息模型研究.清华大学硕士学位论文,2005.
    [Ranganathan03]A.Ranganathan,R.H.Campbell.An infrastructure for context-awareness based on first order logic[J].Personal and Ubiquitous Computing 2003,7(6):353-364
    [Ranganathan04]A.Ranganathan,J.Al-Muhtadi,R.H.Campbell.Reasoning about Uncertain Contexts in Pervasive Computing Environments[J]. IEEE Pervasive Computing, 2004, 3(2): 62 - 70
    [Roman02] M. Roman, C.K. Hess, R. Cerqueira, A. Ranganathan, R.H. Campbell, K. Nahrstedt. Gaia: A Middleware Infrastructure to Enable Active Spaces[J]. In: IEEE Pervasive Computing, 2002: 74-83
    [Rosenthal00] L. Rosenthal, V. M. Stanford. NIST Smart Space: Pervasive Computing Initiative[C]. In the Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2000: 6-11
    [Sahuguet03] A. Sahuguet, R. Hull, D. F. Lieuwen, and M. Xiong. Enter once, share everywhere: User profile management in converged networks[C]. In Conference on Innovative Data Systems Research, 2003 :33-45
    [Salber99] D. Salber, A.K. Dey, G.D. Abowd. The context toolkit: Aiding the development of context-enabled applications[C]. In: Proceedings of The ACM SIGCHI Conference on Human Factors in Computing Systems, May, 1999: 434-441
    [Satyanarayanan01] M. Satyanarayanan. Pervasive computing: Vision and challenges.[J]. IEEE Personal Communications, 2001, 8(4) :10-17
    [Schilit93]B. N. Schilit, M. M. Theimer, B. B. Welch. Customizing mobile applications[C]. In the Proceedings USENIX Symposium on Mobile and Location-Independent Computing, Aug. 1993:129-138,
    [Schilit94] B. N. Schilit, N. Adams, and N. Want. Context-aware computing applications[C]. Proceedings of the IEEE Workshop on Mobile Computing System and Application, 1994:85-90.
    [Schilit95] W. N. Schilit. A System Architecture for Context-Aware Mobile Computing. PhD thesis, Columbia University, 1995.
    [Shankar04] C. Shankar, A. Ranganathan, R. Campbell. Towards Fault tolerant pervasive computing[C]. In Proceedings of Workshop on Sustainable Pervasive Computing, Linz/Vienna, Austria, April 2004: 38-44
    [Silberschatz02] A. Silberschatz, P. B. Galvin, G.Gagne. Operating system concepts, Sixth Edition. John Wiley & Sons, Inc, 2002.
    [Silberschatz99]A.Silberschatz,H.F.Korth,S.Sudarshan.Database system concept,3rd edition.McGraw-Hill.,1999.
    [Sousa02]J.P.Sousa,D.Garlan.Aura:an architectural framework for user mobility in ubiquitous enviroment[C].In Proceedings of the 3rd Working IEEE/IFIP Conference on Software Archietecture,2002:29-43
    [Spreitzer93]M.Spreitzer,M.Theimer.Providing location information in a ubiquitous computing environment[C].In Proceedings of the fourteenth ACM symposium on Operating systems principles,ACM Press,1993:270-283
    [Strang04]T.Strang,C.Linnhoff-Popien.A context modeling survey.[C]In:Workshop on Advanced Context Modelling,Reasoning and Management,UbiComp,2004:135-146
    [Sweeney02]L.Sweeney.k-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5);557-570.
    [Tang06]X.Tang,J.Xu.Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks[C].Proceedings of 25th Infocom,2007:1-12
    [UDDI04]http://www.uddi.org/pubs/uddi_v3.htm
    [Vahdat01]A.Vahdat.Scalable and self-organizing meta data dissemination for ubiquitous computing[C].In Proceedings of workshop oa Internet Applications,2001:80-81
    [Wang04a]X.H.Wang,D.Q.Zhang,T.Gu,H.K.Pung.Ontology Based Context Modeling and Reasoning using OWL[C].In:Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops,2004:18-22
    [Wang04b]X.Wang,J.S.Dong,C.Y.Chin,S.R.Hettiarachchi and D.Zhang.Semantic Space:An Infrastructure for Smart Spaces[J].IEEE Pervasive Computing,2004,3(3):32 - 39
    [Want95]R Want,B.N Schilit,N.I.Adams.An Overview of the ParcTab Ubiquitous Computing Experiment.Personal Communications,1995,2(6):28-43
    [Warneke01] B. Warneke, M. Last, B.Liebowitz. Smart Dust: Communicating with a Cubic-Millimeter Computer [J]. IEEE Computer, 2001,34(1): 44-51
    [Weiser91] M. Weiser. The computer for the 21st century[J], Scientific American, 1991,265(30):94-104.
    
    [Westin67] A.F. Westin .Privacy and Freedom. (New York : Atheneum.) 1967.
    [Winoto99]W. Adjie-Winoto et al. The Design and Implementation of an Intentional Naming System[C]. In the Proceedings of 17th ACM Symp. Operating System Principles (SOSP 99), ACM Press,New York, 1999: 186-201.
    [Wu07] M. Wu, J. Xu, X. Tang, W, Lee. Top-k Monitoring in Wireless Sensor Networks[J]. IEEE Transactions on Knowledge and Engineering. 2007, 19(7): 962-976.
    [Xiao07]Z. Xiao, X. Meng, J. Xu. Quality-aware privacy protection for location-based ervices[C]. In Proceedings of the International Conference on Database Systems for Advanced Applications(DASFAA'07), Bangkok, Thailand, April 2007:434-446
    [Xiong05] X. Xiong, M. F. Mokbel, W.G.Aref. SEA-CNN: Scalable Processing of Continuous K-Nearest Neighbor Queries in Spatio-temporal Databases[C]. In Proceeding of the International Conference on Data Engineering, ICDE, Tokyo, Japan, April 2005:643-654
    
    [Xu03a] 徐光祜,史元春,谢伟凯.普适计算.计算机学报,2003,26(9):1042-1050
    [Xu03b] J. Xu, X.Tang, and D. L. Lee. Performance Analysis of Location-Dependent Cache Invalidation Schemes for Mobile Environments[J]. IEEE Trans. Knowledge and Data Engineering, 2003 , 15(2): 474-488.
    [Xu04] J. Xu, Q. Hu, W. C. Lee, and D. L. Lee. Performance Evaluation of an Optimal Cache Replacement Policy for Wireless Data Dissemination. IEEE Transactions on Knowledge and Data Engineering (TKDE), 2004, 16(1): 125-139.
    [Yang04] K. H. Yang, D. Olson, J. Kim, Comparison of first order predicate logic, fuzzy logic and non-monotonic logic as knowledge representation methodology. Expert Systems with Applications, 27(4), November 2004: 501-519
    [Yang06]杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231
    [Zhang06]张德干,班晓娟,曾广平,王昭顺.构件化无缝主动迁移机制中的资源调度策略.计算机学报,2006,29(11):2027-2036
    [Zheng02]B.Zheng,J.Xu,D.Lee.Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments[J].IEEE Transactions on Computers,2002,51(10):1141-1153.
    [Zimmer04]T.Zimmer.Towards a Better Understanding of Context Attributes[C].Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops,2004:23-27
    [Zipf]G.K.Zipf.Human Behavior and the Principle of Least Effort.Addison-Wesley,1949..

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700