期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
Energy-efficient and security-optimized AES hardware design for ubiquitous computing 被引量:2
1
作者 Chen Yicheng Zou Xuecheng Liu Zhenglin Han Yu Zheng Zhaoxia 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期652-658,共7页
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H... Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost. 展开更多
关键词 encryption and decryption power analysis model inhomogeneous S-Boxes ubiquitous computing advanced encryption standard.
在线阅读 下载PDF
Adaptive service configuration approach for quality of service management in ubiquitous computing environments 被引量:1
2
作者 Yong ZHANG Shen-sheng ZHANG Song-qiao HAN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第7期964-975,共12页
Mobility and resource-limitedness pose challenging issues to service configuration for quality of service (QoS) management in ubiquitous computing environments. Previous configuration approaches, such as static resour... Mobility and resource-limitedness pose challenging issues to service configuration for quality of service (QoS) management in ubiquitous computing environments. Previous configuration approaches, such as static resource reservation, dynamic resource allocation and single service composition are not valid in the environments. In this study, we present an adaptive service configuration approach. Firstly, we reduce the dynamic configuration process to a control model which aims to achieve the variation of critical QoS on minimal level with less resource cost. Secondly, to deal with different QoS variations, we design two configuration strategies—service chain reconfiguration and QoS parameter adjustment—and implement them based on fuzzy logic control theory. Finally, a configuration algorithm is developed to flexibly employ the two configuration strategies in tune with the error of critical QoS in configuration process. The results of simulation experiments suggest that our approach outper- forms existing configuration approaches in both QoS improvement and resource utilization. 展开更多
关键词 Service configuration ubiquitous computing (UbiComp) Quality of service (QoS) Fuzzy logic control
原文传递
UCIMssp:Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P 被引量:1
3
作者 孙道清 蒲芳 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第4期475-483,共9页
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconne... Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment. 展开更多
关键词 ubiquitous computing identification mechanism UCIMssp SPKI/SDSI Peer-to-Peer security
在线阅读 下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
4
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 ubiquitous computing identity authentication mechanism D-S Evidence Theory SPKI/SDSI SECURITY
在线阅读 下载PDF
An Indoor Ubiquitous Computing Environment Based on Location-awareness 被引量:1
5
作者 蒲芳 孙道清 +2 位作者 曹奇英 蔡海滨 李永宁 《Journal of Donghua University(English Edition)》 EI CAS 2006年第4期76-79,共4页
To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IU... To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA. 展开更多
关键词 ubiquitous computing location awareness middleware.
在线阅读 下载PDF
Assessing Level of Ubiquitous Computing Services for Ubiquitous Business Design 被引量:1
6
作者 KWON Ohbyung 《Journal of Electronic Science and Technology of China》 2004年第3期140-145,共6页
We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network'... We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network' business model because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Moreover, immediate access to ideas, goods, and services will be of greater value than the traditional model of permanent and ponderous possession. This paper illustrates how ubiquitous computing technology can be combined with legacy computer-based information systems, along with thoughts on relevant issues of ubiquitous commerce. We also propose a model for how to assess levels of ubiquitous computing services. 展开更多
关键词 ubiquitous computing service AHP ubiquitous business
在线阅读 下载PDF
LUCA:Lightweight Ubiquitous Computing Architecture
7
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2009年第3期300-308,共9页
Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbe... Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbed. The main attention of this paper was providing a compact and realizable method to apply ubiquitous computing into our daily lives under sufficient secure guarantee. At last,the personal intelligent assistant system was presented to show that this architecture was a suitable and realizable security mechanism in solving the ubiquitous computing problems. 展开更多
关键词 ubiquitous computing ARCHITECTURE TRUST AWARENESS privacy protection SECURITY
在线阅读 下载PDF
Ubiquitous Computing in the Library:Indiana State University Library's Experience
8
作者 Ralph B.Gabbard Judith Tribble +1 位作者 Paul Asay Chris Hayes 《现代图书情报技术》 CSSCI 北大核心 2002年第S1期161-167,共7页
1 Introduction New technologies and other developments haye changedthe information seeking behaviors of the academic communityand the general public.Nowhere is this more evident than inthe exponential growth of the Wo... 1 Introduction New technologies and other developments haye changedthe information seeking behaviors of the academic communityand the general public.Nowhere is this more evident than inthe exponential growth of the World Wide Web and cellularphone usage.Responding to these user needs and newtechnologies,libraries are moving from being InformationWarehouses to becoming Information Portals.Full-text。 展开更多
关键词 年刊 连续出版物 ubiquitous computing in the Library 《现代图书情报技术》 Access PDA CARD USB
在线阅读 下载PDF
Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for Clustered IoT Driven Ubiquitous Computing System
9
作者 Reda Salama Mahmoud Ragab 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2917-2932,共16页
In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(... In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(UCS).The UCS necessitates heterogeneity,management level,and data transmission for distributed users.Simultaneously,security remains a major issue in the IoT-driven UCS.Besides,energy-limited IoT devices need an effective clustering strategy for optimal energy utilization.The recent developments of explainable artificial intelligence(XAI)concepts can be employed to effectively design intrusion detection systems(IDS)for accomplishing security in UCS.In this view,this study designs a novel Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for IoT Driven Ubiquitous Computing System(BXAI-IDCUCS)model.The major intention of the BXAI-IDCUCS model is to accomplish energy efficacy and security in the IoT environment.The BXAI-IDCUCS model initially clusters the IoT nodes using an energy-aware duck swarm optimization(EADSO)algorithm to accomplish this.Besides,deep neural network(DNN)is employed for detecting and classifying intrusions in the IoT network.Lastly,blockchain technology is exploited for secure inter-cluster data transmission processes.To ensure the productive performance of the BXAI-IDCUCS model,a comprehensive experimentation study is applied,and the outcomes are assessed under different aspects.The comparison study emphasized the superiority of the BXAI-IDCUCS model over the current state-of-the-art approaches with a packet delivery ratio of 99.29%,a packet loss rate of 0.71%,a throughput of 92.95 Mbps,energy consumption of 0.0891 mJ,a lifetime of 3529 rounds,and accuracy of 99.38%. 展开更多
关键词 Blockchain internet of things ubiquitous computing explainable artificial intelligence CLUSTERING deep learning
在线阅读 下载PDF
Ubiquitous Computing: Technological Autonomy or Human Autonomy?
10
作者 Zhu Wenxi Wang Guoyu 《Journal of Philosophy Study》 2018年第5期217-223,共7页
With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For ins... With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For instance, people can use their electronic devices at hand (e.g., Google glasses or Apple watch) to access information they need. However, this '~ubiquitous" service poses challenges to human autonomy. Based on the analysis of the features of pervasive computing, this paper points out the ambiguity between the subject and object of ubiquitous computing and shows technological interventions can affect human autonomy at three levels: technology addiction, the degradation of human capacities, and the reversal of the end and the means caused by the fuzziness of ma^-machine interface. In other words, ubiquitous computing gives people unprecedented convenience, and it also deprives of their freedom. According to Kant's Theory of Freedom, this article reflects on the relationship between the autonomy of technology and that of humankind. 展开更多
关键词 ubiquitous computing technological autonomy human autonomy FREEDOM
在线阅读 下载PDF
Improving Vehicular Mobility in Urban Traffic Using Ubiquitous Computing
11
作者 J. A. Castán S. Ibarra Martínez +3 位作者 J. Laria Menchaca M. G. Treviño Berrones J. Pérez Cobos E. Castán Rocha 《Journal of Computer and Communications》 2016年第10期57-62,共6页
The paper introduces a novel paradigm to use ubiquitous computing in urban traffic control as a methodology to include the benefits of considering physical elements implicated in the environment. This promising idea a... The paper introduces a novel paradigm to use ubiquitous computing in urban traffic control as a methodology to include the benefits of considering physical elements implicated in the environment. This promising idea arises from previous results in the literature, where ubiquitous computing achieves significant and promising results in diverse scenarios. Some works in the state-of- the-art clearly state that traditional traffic light signals are not capable of offering higher service levels when they should control the vehicular mobility because of different constraints. In this sense, the paper proposes an adaptation of the main ideas of ubiquitous computing as a metaphor to facilitate the interaction between users and traffic infrastructures in order to improve the users’ experience on the road. 展开更多
关键词 ubiquitous computing Urban Traffic Control Intelligent Transport System
在线阅读 下载PDF
Strategic Implications for E-Business Organizations in the Ubiquitous Computing Economy
12
作者 YUM Jihwan KIM Hyoungdo 《Journal of Electronic Science and Technology of China》 2004年第3期33-38,共6页
The ubiquitous economy brings both pros and cons for the organizations. The third space emerged by the development of ubiquitous computing generates new concept of community. The community is tightly coupled with peop... The ubiquitous economy brings both pros and cons for the organizations. The third space emerged by the development of ubiquitous computing generates new concept of community. The community is tightly coupled with people, products, and systems. Organizational strategies need to be reshaped for the changing environment in the third space and community. Organizational structure also needs to change for community serving organization. Community serving concept equipped with the standardized technology will be essential. One of the key technologies, RFID service will play a key role to acknowledge identification and services required. When the needs for sensing the environment increase, technological requirement such as the ubiquitous sensor network (USN) will be critically needed.. 展开更多
关键词 ubiquitous economy ubiquitous computing management strategy
在线阅读 下载PDF
A comprehensive survey of orbital edge computing:Systems,applications,and algorithms
13
作者 Zengshan YIN Changhao WU +4 位作者 Chongbin GUO Yuanchun LI Mengwei XU Weiwei GAO Chuanxiu CHI 《Chinese Journal of Aeronautics》 2025年第7期310-339,共30页
The number of satellites,especially those operating in Low-Earth Orbit(LEO),has been exploding in recent years.Additionally,the burgeoning development of Artificial Intelligence(AI)software and hardware has opened up ... The number of satellites,especially those operating in Low-Earth Orbit(LEO),has been exploding in recent years.Additionally,the burgeoning development of Artificial Intelligence(AI)software and hardware has opened up new industrial opportunities in both air and space,with satellite-powered computing emerging as a new computing paradigm:Orbital Edge Computing(OEC).Compared to terrestrial edge computing,the mobility of LEO satellites and their limited communication,computation,and storage resources pose challenges in designing task-specific scheduling algorithms.Previous survey papers have largely focused on terrestrial edge computing or the integration of space and ground technologies,lacking a comprehensive summary of OEC architecture,algorithms,and case studies.This paper conducts a comprehensive survey and analysis of OEC's system architecture,applications,algorithms,and simulation tools,providing a solid background for researchers in the field.By discussing OEC use cases and the challenges faced,potential research directions for future OEC research are proposed. 展开更多
关键词 Orbital edge computing ubiquitous computing Large-scale satellite constellations Computation offloading
原文传递
A Framework for ranking ubiquitous computing services by AHP analysis
14
作者 Shaghayegh Izadpana Hamed Vahdat-Nejad Hamid Saadatfar 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2018年第4期16-40,共25页
With the increasing advances in technology,ubiquitous computing services have been able to satisfy users by providing high quality services.Such services can be found in different areas such as healthcare,social netwo... With the increasing advances in technology,ubiquitous computing services have been able to satisfy users by providing high quality services.Such services can be found in different areas such as healthcare,social networks,urban transportation,and multimedia.Nowadays,there are a wide variety of services with similar functionalities in each of the abovementioned areas.Ranking these services based on quality of service(QoS)criteria can help the users to choose the most appropriate services that meet their preferences.The aim of this research is to create a comprehensive framework based on QoS criteria in ubiquitous environment to rank services.At first by extending the previous research,this paper gathers and classifies the QoS criteria into four classes of architecture,usability,ubiquity,and security.This classification organizes QoS criteria in a hierarchical structure.Afterward,Analytic Hierarchy Process(AHP)is used to propose a customized service ranking framework according to the values of each criterion.To utilize the opinions of experts of the subject,a questionnaire is designed to evaluate the proposed structure of QoS criteria and to determine the weight of each criterion.Finally,comparing the proposed framework with previous approaches indicates that this framework includes a complete set of criteria,which leads to a deep perception of QoS in a ubiquitous computing environment.Moreover,the computed inconsistency ratio indicates that the performed decision-making process has a reasonable consistency. 展开更多
关键词 ubiquitous computing quality of service service ranking AHP analysis.
原文传递
Research on reference nodes placement and selection of ubiquitous computing locating service
15
作者 ZHAO Hai SUN Peigang +2 位作者 ZHANG Wenbo YIN Zhenyu ZHAO Ming 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2007年第1期13-22,共10页
Obtaining the location of an unknown node accurately is a key problem of a locating service under a ubiquitous computing environment.The paper proposes and proves three theorems of location reference node placement ac... Obtaining the location of an unknown node accurately is a key problem of a locating service under a ubiquitous computing environment.The paper proposes and proves three theorems of location reference node placement according to the analysis of the location error produced during location using a polygon location method and three important characteristics of chaos dynamics.Based on the three theorems,the location reference node selection(LRNS)algorithm is proposed by improving on the traditional polygon location algorithm.The simulation results indicate that the reference node placement theorems and the LRNS algo-rithm can meet the requirements of a ubiquitous terminal’s real-time location and possess a preferable precision in location. 展开更多
关键词 ubiquitous computing locating service loca-tion error reference nodes placement theorems location reference node selection algorithm
原文传递
A Work Service Model of the Ubiquitous Environment Collaboration
16
《Journal of Civil Engineering and Architecture》 2012年第1期44-52,共9页
Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computationa... Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computational technology to support office works, have already affected the practice of companies and organizations. Within this context, this study deals with a work service model of the ubiquitous office environments by understanding human behaviors and works in their workspace. We propose a ubiquitous office model considering the correlation between ubiquitous computing technologies and work services in the office. Two attributes are emphasized, collaboration and mobility, as identifiers for categorizing the work types. The types of work services have variations in the amount of communication and the proportion of working outside of the office. The proposed work service model of the ubiquitous office includes territorial and non-territorial services to enable workers in and out of the office to interact with each other effectively. The findings in this paper would be a theoretical basis for embodying an intelligent office which supports office works efficiently. 展开更多
关键词 ubiquitous office work service model ubiquitous computing context awareness collaboration.
在线阅读 下载PDF
Context-aware smart car: from model to prototype 被引量:4
17
作者 Jie SUN Zhao-hui WU Gang PAN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第7期1049-1059,共11页
Smart cars are promising application domain for ubiquitous computing. Context-awareness is the key feature of a smart car for safer and easier driving. Despite many industrial innovations and academic progresses have ... Smart cars are promising application domain for ubiquitous computing. Context-awareness is the key feature of a smart car for safer and easier driving. Despite many industrial innovations and academic progresses have been made, we find a lack of fully context-aware smart cars. This study presents a general architecture of smart cars from the viewpoint of context- awareness. A hierarchical context model is proposed for description of the complex driving environment. A smart car prototype including software platform and hardware infrastructures is built to provide the running environment for the context model and applications. Two performance metrics were evaluated: accuracy of the context situation recognition and efficiency of the smart car. The whole response time of context situation recognition is nearly 1.4 s for one person, which is acceptable for non-time critical applications in a smart car. 展开更多
关键词 Smart car Intelligent vehicle CONTEXT-AWARE ubiquitous computing
原文传递
Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home 被引量:1
18
作者 Anusha Vangala Ashok Kumar Das +1 位作者 YoungHo Park Sajjad Shaukat Jamal 《Computers, Materials & Continua》 SCIE EI 2022年第8期3549-3570,共22页
The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by ... The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by the user who is outside the home might sound fancy,but it comes with a lot of potential threats.There can be many attackers who will be trying to take advantage of this.So,there is a need for designing a secure scheme whichwill be able to distinguish among genuine/authorized users of the system and attackers.And knowing about the details of when and what IoT devices are used by the user,the attacker can trace the daily activities of user and can plan an attack accordingly.Thus,the designed security scheme should guarantee confidentiality,anonymity and un-traceability.Most of the schemes proposed in the literature are either non-blockchain based which involves inherent problems of storing data in a single-server or assuming weaker attack models.In this work,we propose a novel scheme based on blockchain technology,assuming a stronger Canetti and Krawczyk(CK)-threat model.Through the formal and informal security,and comparative analysis,we show that the proposed scheme provides a superior security and more functionality features,with less communication cost and comparable computational cost as compared to other competent schemes.Moreover,the blockchain based simulation study on the proposed scheme has been conducted to show its feasibility in real-life application. 展开更多
关键词 Internet of things(IoT) smart home ubiquitous computing blockchain SECURITY
在线阅读 下载PDF
Interactive navigation system in smart phone with vibration feedback 被引量:1
19
作者 YU He GU Wen-zhao +5 位作者 SUN Ming-hui QIN Gui-he WANG Li-min PAN Zhi-geng ZHAO Wei SUN Xiao-ying 《Journal of Beijing Institute of Technology》 EI CAS 2016年第3期375-381,共7页
The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous co... The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous computing.And it's an important way to ease the traffic congestion of the city.Intelligent navigation system is an important embodiment of intelligent transportation.So far,there have been many kinds of traditional vehicle navigation systems.But when they are in use,drivers will pay extra attention to get the path information through the visual and auditory cues.It's dangerous for drivers when they drive.At the same time,with the development of science and technology,mobile navigation system has been widely used.The mobile navigation system is a comprehensive system which relates to the field of mobile communication and GPS.The objective of this paper is to develop a smart phone and interaction navigation system based on the feedback of vibration and micro programmed control unit(MCU)control system.When drivers are in the driving process,the new navigation system can avoid the same sense of multiple tasks,which makes each sensory focus on only one independent task.Through the analysis,the system is demonstrated to improve the driving safety. 展开更多
关键词 vibration feedback smart navigation Android platform ubiquitous computing
在线阅读 下载PDF
Context-aware Workflow Model for Supporting Composite Workflows 被引量:1
20
作者 Jong-sun CHOI Jae-young CHOI Yong-yun CHO 《Journal of Measurement Science and Instrumentation》 CAS 2010年第2期161-165,共5页
In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workf... In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workflows in order to get mare large-scale or complicated workflow. They only provide a simple workflow model, not a composite workflow model. In this paper, the autorhs propose a context-aware workflow model to support composite workflows by expanding the patterns of the existing context-aware wrY:flows, which support the basic woddlow patterns. The suggested workflow model of. fers composite workflow patterns for a context-aware workflow, which consists of various flow patterns, such as simple, split, parallel flows, and subflow. With the suggested model, the model can easily reuse few of existing workflows to make a new workflow. As a result, it can save the development efforts and time of context-aware workflows and increase the workflow reusability. Therefore, the suggested model is expected to make it easy to develop applications related to context-aware workflow services on ubiquitous computing environments. 展开更多
关键词 ubiquitous computing context-aware workfiow workflow model multiple workflows
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部