A
Access control, 10
Actuators, infrastructure, 12
Adaptive component management service (ACMS), 20
Ajax-based user interface, 136
Application level migration, 57, 58
Application Program Interfaces (APIs), 81, 98, 103–104, 176
Application state persistence/recovery, 61–62
Architecture, 11–12, 28, 49–50, 174–178
Atomicity, consistency, isolation, and durability (ACID) properties, 129
Atomic services, 17
Atomic units, 87
Audio services, 82, 92, 94–95, 100
Autonomic service-provisioning framework, 77
Availability, security management, 10
B
Back end support environment, 99
Belief, evidence theory, 35
Best path prediction, 32
C
Call-back instances, 104
Candidate set generation, 39
Canny algorithm, 31
Certificate authority (CA), 19
Clustering, 113
Collaborative filtering (CF) approaches, 8, 135, 143–152, 163
Communication unit, 129
Compensating transaction generator (CTG), 129
Composite objects, 39
ConcurTask Trees (CTT) model, 78
Confidentiality, 10
Content-based approaches, 8, 135
Context
acquisition, 16
defined context, 27
local service matching, 85
probers, 84
representation, 16
Context awareness
challenges, 3
context category, 26
dynamic transaction management, 121
evaluations, 129
little consideration of, 114
method, HCI, 75
Context-driven service selection, 79–81
Context reasoning prototype, 33–43
Contiki, 180
Control area net (CAN)-based network layer (CBL), 20–21
Coordination algorithm, 121–123
Coordinator, evaluations, 129
CORTEX system, 15
Cosine similarity metric, 85
Coverage, 85
CREDSUP, 136
D
Daily work assisting service, 171
DAML language, 76
Data
processing, 103
producers and consumers, 18
sources, 18
transfer, 123
verification, 123
Decomposition, 49
Deduced objects, 38
Default participant, 125
Defined context, 27
Delay-sensitive migration process, 58
Dempster-Shafer theory, 6
Dempster-Shafer theory, context reasoning (DSCR)
evidence selection strategy, 40–41
recognizing user activity, 39–40
Dempster’s rule, 35
Desktop level migration, 57, 58
Device discovery and evaluation module (DDEM), 64, 66–67, 69
Devices
fault tolerance, 4
matching, 75
pervasive computing systems, 11–14
Digg Web site, 140
Discount rate, sensors, 37
Discovery, see Service registration and discovery
Dispatch requests, 80
Distributed hash table (DHT)-based P2P overlay, 17
Document vector, 138
Dynamic characteristics, 26
Dynamic context, 27
Dynamic transaction management, 121–125
E
Eavesdropping attacks, 177
Effective region, 86
Embedded Web services, 178–181
EMDP approach, 150
Empty processing elements, 52
Environments
context format, 93
context manager, 83
mobile transaction evaluation, 129–130
pervasive computing systems, 19–21
Euclidean distance, 85
Evidence selection strategy, 40–41
Evidence theory, 24, 34–35, 37–39
Exact context reasoning, 16
Extended independent cascade (EIC) model, 157, 159–160
F
Failed ratio (FR), 130
False context information, 3
Fault tolerance, 4
Favorite fraction, 137, 139–142
Feature combinations, 140, 141–142
Fixed host (FH), 116
Fixed infrastructure, uncertain, 112
Fixed networks, 116
Forwarding, 124
Frame of discernment, 24
FriendFeed, 140
Front end support environment, 99
Full function device (FFD), 174–175
Functionality vs. resource usage, 5
Fuzzy characteristics, 26
Fuzzy context reasoning, 16–17
G
Global combination selection, 81, 86, 87, 88–89
Global decisions, 123
Global item similarity (GIS), 146, 148, 149
Global positioning system (GPS), 29, 31–33
Global System for Mobile (GSM) signals, 16
Global transaction states, 121
Greedy algorithms, 152–153, 156–165
H
Heterogeneous characteristics, 4, 58, 112
Hierarchical concurrency control algorithm, 113
High Commit Mobile (HiCoMo) transactions, 113
Historical context database, 33
History-based composition, 17
Hot-swapping, 98
Human-computer interaction (HCI)
context-awareness method, 75
context-driven service selection, 79–89
device matching, 75
global combination selection, 85–89
many users, one device, 75
migration request, 92
scalability of algorithm, 75
service selection, 75
smart office video calls, scenario, 89–97
Web service-based migration framework, 97–104
I
ICluster, 147
Implementation, 68–70, 180–181
Incorrect reasoning, 3
Independent cascade model (IC), 154, 160–161
Indoor techniques, user tracking, 15–16, 29–30
Influence diffusion models, 154
Influence maximization problem, 152, 157
Influence model, 159
Information overload, 74
Infrared technology, 13, 16, 30
Initialization section, 61
Integrity, security management, 10
Intelligent Campus (iCampus), 21, 169–173
Intelligent urban traffic management, 31–33
Interaction devices manager (IDM), 99, 101–104
Interaction requirements description (IRD), 99, 100–101, 104
Interactions
learning from past, 8
migration request, 103
mobile transaction evaluation, 132
rendering, 104
services and service selection, 79–81
termination, 104
Interaction Web service description (IWSD), 101
Interaction Web service (IWS), 102
Interdependent characteristics, 26
Internet, context collection, 28
Interrelation of services, 97
InterSynd system, 136
Inverse update frequency (IUF), 139, 140, 142
I/O adapter management module (IOAMM), 64, 66–67, 69
IPSpace (IPv6-enabled intelligent space), 173–182
Isolation Only Transaction (IOT), 113
ISST vs. IS, 162
Item-to-item collaboration filtering, 135
J
Jawbone UP, 2
JINI discovery system, 77
K
Kangaroo transaction, 113
K-anonymity, 18
Kendall’s notation, 56
Keyboard input service, 81, 94
Kimura and Saito algorithm, 152
K like-minded users, 146, 147, 148–149
K-means algorithm, 146
L
Latency, scalability, 97
Latent semantic indexing (LSI), 153, 155
Lightweight embedded Web services, 178–181
Lightweight modules, 21
Lightweight task migration, 58
Linear threshold model, 154
Link states, mobile transaction evaluation, 130–131
Local service matching, 80–81, 84–85, 94–95
Location information, 6, 116–117
Location services, 29
Long term evolution (LTE) technology, 13
Low-level context, 27
M
Many users, one device, 75
Matrix factorization, 155
Maximum term frequency normalization (NTF), 138
Memory-based schemes, 135
Mesh routers, 14
Micaz, 33
Microsoft SQL servers, 33
Middleware and middleware layer
challenges, 5
concepts, 5
defined, 11
hiding complexity and heterogeneity, 14
iShadow, 170
lightweight embedded Web services, 178–179
resource management, 15
service management, 17
systems, 15
Migration
context-driven service selection, 81
management modules, 64
Migration support environment (MSE), 81, 98–100, 101–104
MixedGreedy algorithm, 152
Mobile ad hoc networks (MANET), 17
Mobile clients, 14
Mobile devices (MD/MDD), 116–117, 121, 129–130; see also Pervasive mobile transactions
Mobile robot position identification, 30–31
Mobile ubiquitous device with/without database (MUD/MUDD), 116
Mobility, 3, 112, 114; see also Pervasive mobile transactions
Modality interchange, 61
Model-based collaborative filtering approaches, 135
Moflex model, 113
Monte Carlo simulations, 157, 160
MovieLens dataset, 150
Mozart Programming System, 58; see also xMozart platform
Multiconstrained optimal path (MCOP) problems, 78
Multimodality representation, 58
Multimodal programming, 67
Multiple modalities, 64, 66–67
Multithreading function, 180
N
Near field communication (NFC) technology, 13
NectraRSS, 136
NewGreedy algorithm, 152
Nike FuelBand, 2
NumInteration, 132
O
Offline phase, CFSF approach, 145–147
Online phase, CFSF approach, 145, 147–149
Outdoor techniques, user tracking, 15–16, 29–30
OZ language, 59–62, 64, 66–68; see also xMozart platform
P
PD approach, 150
Pearson correlation coefficient (PCC), 144, 146, 150
Peer-to-peer structure, 97, 98
Performance
D-S theory, context reasoning, 41–43
RSS content-based recommendations, 140–142
social networks, top-K recommendations, 159–165
Personal area network (PAN), 174–175, 177
Pervasive computing systems, structure and elements
intelligent Campus, 21
overview, 11
context-aware transaction model, 116–120
dynamic transaction management, 121–125
formal transaction verification, 125–129
overview, 111
transaction framework, 114–116
Pervasive multiprocessor (PMP) system, 48–54, 50, 54–57
Photo sharing service, 21, 171
Physical contexts, 5
PICO/SeSCo system, 15
Pipeline-based resource allocation, 49–54
Plausibility, evidence theory, 35
Poisson distribution-based task arrival ratio, 52
Position identification, 29–31; see also Location information
Precision at N, 141
Probabilistic approach-based resource allocation, 54–57
Processing elements (PEs), 48, 52, 54–56
Process level migration, 57, 58, 75
Promotion transaction model, 113
Protoheads, 180
Public key infrastructure (PKI), 19
Pure cosine similarity (PCS), 146
Q
QTK toolkit, 59
Qualified executors, 121
Quality of Service (QoS), 18, 77, 86
R
Radio frequency identification (RFID) technology, 13, 16, 30
Randomly allocating algorithms, 49–54
Real-time road status report, 31–32
Received signal strength indicator (RSSI), 30
Recognition, user activity, 39–40
Reduce function device (RFD), 174–175
Remaining time estimation, 32
Resource abstraction, 15
Resource control, 15
Resource management
application state persistence and recovery, 61–62
implementation and illustrations, 67–70
middleware, 15
overview, 47
OZ source file reorganization, 59
pipeline-based resource allocation, 49–54
probabilistic approach-based resource allocation, 54–57
technology, 6
transparent task migration, 57–70
Resource registration and discovery, 15, 19
Resource router (RR), 49, 54–56
Resources, limited in pervasive environments, 112
Resource transformation schema, 63
Resource usage vs. functionality, 5
Road status report, real-time, 31–32
Routine task predictability, 39
RSS content-based recommendations
average favorite, 141
defined, 136
document vector, 138
favorite fraction, 139
inverse update frequency, 139
overview, 136
PostRank, 140
precision at N, 141
recommendation algorithm features, 138–140
similarity, 138
single feature, 141
S
Scalability
algorithm, HCI, 75
DSCR prototype, 41
intelligent Campus, 21
smart car space, 20
smart office video calls, scenario, 97
Scenes system, 15
Section-based OZ programming, 60
Secure service discovery service (SSDS), 19
Security architecture, 176–178
Semantic context management service (SCMS), 20
Semantics
integration, smart cars, 20
need for ontology languages, 76
Semantic virtual agents (SVAs), 20
Sensed context, 27
Sensing data, 18
Service combinations, 75, 88–89
Service composition, 17
Service-coverage coloring procedure, 88
Service grids and layer, 176–177
Service management, middleware, 17
Service matching procedure, 84–85
Service-oriented architecture (SOA/SOAP), 76, 78, 178–180
Service-oriented middleware support, 81
Service property matching, 84
Service registration and discovery, 17, 19
Shadow functions, 62
Shortest path, executors, 121
Singular value decomposition (SVD), 153, 155, 160
Skeleton representation, 101
Smart car environments, 19–21, 76
Smoothing function, 147
Social networks, top-K recommendations
GAUP vs. CF, 163
influence model, 159
ISST vs. IS, 162
topic drift, HITS algorithm, 163–165
user preferences, computing, 155–156
State persistence, 62
State recovery, 68
State variables, 61
Static context, 27
Strict transactions, 113
Structure and elements, pervasive computing systems
intelligent Campus, 21
overview, 11
Subtransaction execution, 123
Symmetric key AES algorithm, 174
System load, 130
T
Tag-free activity sensing (TASA), 30
Task analysis, PMP systems, 49
Task arrival ratio, 52
Task level migration, 75
Task management, 49
Task migration, 6
TCOT protocol, 113
Term frequency (TF), 138
TF-IDF weighting method, 138
TinyOS, 33
Topic drift, HITS algorithm, 163–165
Top-K selection strategy, 41
Traditional mobile host (TMH), 116
Traffic information and management, 19, 26, 31–33
Transactions, see Pervasive mobile transactions
Transparency, 3
Transparent task migration
application state persistence and recovery, 61–62
implementation and illustrations, 67–70
initialization section, 61
modality interchange, 61
OZ source file reorganization, 59
resource handles, 60
section-based OZ programming, 60
shadow functions, 62
state variables, 61
TSSO ticket, 177
U
Ubiquitous service broker (USB), 49
Unavailable transaction service, 114
Uncertain fixed infrastructure, 112
URI form, 63
Usability, challenges, 4
User active scope (UAS), 87–89, 95, 97
Users
authentication, 176
clustering, 146
context format, 93
HCI migration request, 92
history and preferences, 82–83
preference matching, 84
security management, 10
Users, preference and recommendations
collaborative filtering-based recommendations, 143–152
feature combinations, 140
recommendation algorithm features, 138–140
RSS content-based recommendations, 136–142
social networks, top-K recommendations, 152–165
user preferences, computing, 155–156
Users, tracking
best path prediction, 32
mobile robot position identification, 30–31
overview, 29
position identification, 29–30
real-time road status report, 31–32
remaining time estimation, 32
security management, 19
traffic information, 19, 31–33
User-topic matrix, 156
V
Vector space similarity (VSS), 144
Videos
calls, smart office, 90–93, 95–97
display service, 81
output and output service, 82, 92, 94–95
surveillance, 16
Virtual contexts, 5
Vision-based schemes, 16
Visual position calibration method, 30–31
W
Weak transactions, 113
Web service-based HCI migration framework, 6–7, 75–76, 97–104
Web Service Description Language (WSDL), 76
Web Service Description Language-Semantics (WSDL-S), 102, 103
Web services, lightweight embedded, 178–181
Wireless mesh gateway (WMG), 28–29
Wireless mesh networks (WMNs), 14, 28
Wireless mesh router (WMR), 28
Wireless mesh sensor networks (WMSNs), 13, 28–29
Wireless mesh subnetwork, 116
Wireless networks, 13–14, 116–117
Wireless routing backbone network, 116
Wireless sensor networks (WSNs)
concepts, 13
data management, 17
IPSpace, 174
service layer, 176
WLAN, 33
Word-of-mouth approach, 152; see also Social networks
Work flow, service composition, 17
X
XML language and format, 105–107, 176, 178, 182
xMozart platform, 6, 58–62, 64, 66–67; see also OZ language
Z
Zadeh paradox, 35