Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Fast track article: Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence

Published: 01 February 2012 Publication History
  • Get Citation Alerts
  • Abstract

    The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users: virtually everything will be enabled to source information and respond to appropriate stimuli. In this technology-rich scenario, real-world components interact with cyberspace via sensing, computing and communication elements, thus driving towards what is called the Cyber-Physical World (CPW) convergence. Information flows from the physical to the cyber world, and vice-versa, adapting the converged world to human behavior and social dynamics. Indeed humans are at the center of this converged world since information about the context in which they operate is the key element to adapt the CPW applications and services. Alongside, a new wave of (human) social networks and structures are emerging as important drivers for the development of novel communication and computing paradigms. In this article we present some of the research issues, challenges and opportunities in the convergence between the cyber and physical worlds. This article is not a comprehensive survey of all aspects of the CPW convergence. Instead, it presents some exciting research challenges and opportunities identified by members of the journal's editorial board with a goal to stimulate new research activities in the emerging areas of CPW convergence.

    References

    [1]
    Cook, D.J. and Das, S.K., How smart are our environments? An updated look at the state of the art. Pervasive and Mobile Computing (Special Issue on Smart Environments). v3 i2. 53-73.
    [2]
    Das, S.K., Roy, N. and Roy, A., Context-aware resource management in multi-inhabitant smart homes: a framework based on Nash H-learning. Pervasive and Mobile Computing (Special Issue on IEEE PerCom 2006 Selected Papers). v2 i4. 372-404.
    [3]
    Cook, D.J. and Das, S.K., Smart Environments: Technology, Protocols and Applications. 2005. John Wiley.
    [4]
    Wu, F.-J., Kao, Y.-F. and Tseng, Y.-C., From wireless sensor networks towards cyber-physical systems. Pervasive and Mobile Computing. v7 i4. 397-413.
    [5]
    Cook, D.J., Augusto, J.C. and Jakkula, V.R., Ambient intelligence: technologies, applications, and opportunities. Pervasive and Mobile Computing. v5 i4. 277-298.
    [6]
    Pelusi, L., Passarella, A. and Conti, M., Opportunistic networking: capitalize or not? Consistent data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine. 134-141.
    [7]
    Conti, M., Giordano, S., Martin May, and Passarella, A., From opportunistic networks to opportunistic computing. IEEE Communications Magazine. v48 i9. 126-139.
    [8]
    Conti, M., Special section on mobile opportunistic networking. Pervasive and Mobile Computing. v7 i2. 159-222.
    [9]
    Conti, M. and Kumar, M., Opportunities in opportunistic computing. IEEE Computer. v43 i1. 42-50.
    [10]
    Das, S.K., Kant, K. and Zhang, N., Handbook on Securing Cyber-Physical Critical Infrastructure. 2012. Morgan Kauffman.
    [11]
    Li, N., Zhang, N. and Das, S.K., Preserving relation privacy in online social network data. IEEE Internet Computing (Special Issue on Security and Privacy in Social Networks). v15 i3.
    [12]
    Dobson, S., Denazis, S., Fernández, A., Gaiti, D., Gelenbe, E., Massacci, F., Nixon, P., Saffre, F., Schmidt, N. and Zambonelli, F., A survey of autonomic communications. ACM Transactions on Autonomous and Adaptive Systems. v1 i2. 223-259.
    [13]
    Kephart, J. and Chess, D.M., The vision of autonomic computing. IEEE Computer. v36 i1. 41-50.
    [14]
    Baboglu, O., Design patterns from biology to distributed computing. ACM Transaction on Autonomous and Adaptive Systems. v1 i1. 26-66.
    [15]
    Yuen, M.C., Chen, L.J. and King, I., A survey of human computation systems. In: Proceedings of the International Conference on Computational Science and Engineering, Vancouver, CA.
    [16]
    Bettini, C., A survey of context modeling and reasoning techniques. Pervasive and Mobile Computing. v6 i2. 161-180.
    [17]
    Bicocchi, N., Self-organized data ecologies for situation-aware pervasive services: the knowledge networks approach. IEEE Transactions on Systems, Man, and Cybernetics-Part A. v40 i4. 789-802.
    [18]
    Cheng, B.H.C., Software engineering for self-adaptive systems: a research roadmap. In: LNCS, vol. 5525. Springer-Verlag. pp. 1-16.
    [19]
    Halevy, A., Norvig, P. and Pereira, F., The unreasonable effectiveness of data. IEEE Intelligent Systems. v24 i2. 8-12.
    [20]
    Zambonelli, F., Self-management and the many facets of nonself. IEEE Intelligent Systems. v21 i2. 50-58.
    [21]
    Di Ferdinando, A., MyAds, a system for adaptive pervasive advertisement. Pervasive and Mobile Computing. v5 i5. 385-401.
    [22]
    Lee, J.-S. and Hoh, B., Dynamic pricing incentive for participatory sensing. Pervasive and Mobile Computing. v6 i6. 693-708.
    [23]
    Hendler, J., Shadbolt, N., Hall, W., Berners-Lee, T. and Weitzner, D., Web science: an interdisciplinary approach to understanding the web. Communication of the ACM. v51 i7. 60-69.
    [24]
    Song, L., Deshpande, U., Kozat, U.C., Kotz, D. and Jain, R., Predictability of WLAN mobility and its effects on bandwidth provisioning. INFOCOM.
    [25]
    Kostakos, V., O'Neill, E., Penn, A., Roussos, G. and Papadogkonas, D., Brief encounters: sensing, modeling and visualizing urban mobility and copresence networks. ACM Transactions Computer and Human Interaction. v17 i1.
    [26]
    Angus, A., Papadogkonas, D., Papamarkos, G., Roussos, G., Lane, G., Martin, K., West, N., Thelwall, S., Sujon, Z. and Silverstone, R., Urban social tapestries. IEEE Pervasive Computing (PERVASIVE). v7 i4. 44-51.
    [27]
    Calabrese, F., Reades, J. and Ratti, C., Eigenplaces: segmenting space through digital signatures. IEEE Pervasive Computing (PERVASIVE). v9. 78-84.
    [28]
    Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R. and Scott, J., Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions of Mobile Computing. v6 i6. 606-620.
    [29]
    Boldrini, C. and Passarella, A., HCMM: modelling spatial and temporal properties of human mobility driven by users' social relationships. Computer Communications (COMCOM). v33 i9. 1056-1074.
    [30]
    Gonzalez, M.C., Hidalgo R, C.A. and Barabási, A.-L., Understanding individual human mobility patterns. Nature. v453. 779-782.
    [31]
    Roussos, G., Musolesi, M. and Magoulas, G.D., Human behavior in ubiquitous environments. Modeling of Human Mobility Patterns. v6 i4. 399-496.
    [32]
    Lazer, D., Pentland, A., Adamic, L., Aral, S., Barabási, A.-L., Brewer, D. and Christakis, N., Computational social science. Science. v323 i5915. 721-723.
    [33]
    P. Norvig, Practice makes perfect: how billions of examples lead to better models, ETech Conference, March 3-9, San Diego, CA, USA 2008.
    [34]
    Linn, J. and Dyer, C., Data-intensive text processing with mapreduce. In: Synthesis Lectures on Human Language Technologies, Morgan and Claypool Publishers.
    [35]
    A. Narayanan, V. Shmatikov, Robust de-anonymization of large sparse datasets, in: Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP '08, IEEE Computer Society, Washington, DC, USA, 111-125 2008.
    [36]
    D. Quercia, N. Lathia, F. Calabrese, G. Di Lorenzo, J. Crowcroft, Recommending social events from mobile phone location data, 10th IEEE International Conference on Data Mining, ICDM 10, Sydney, Australia 2010.
    [37]
    Grossglauser, M. and Tse, D., Mobility increases the capacity of ad-hoc wireless networks. IEEE/ACM Transactions on Networking. v10 i4.
    [38]
    Weiser, M., The computer for the 21st century. Scientific American. v265 i3. 66-75.
    [39]
    Mann, S., Wearable computing: toward humanistic intelligence. IEEE Intelligent Systems. iMay/June. 10-15.
    [40]
    Pentland, A., Healthwear: medical technology becomes wearable. IEEE Computer. iMay. 42-49.
    [41]
    Bächlin, M., Förster, K. and Tröster SwimMaster, G., A wearable assistant for swimmer. Proceedings of Ubicomp. 215-219.
    [42]
    Siewiorek, D., Smailagic, A., Bass, L., Siegel, J., Martin, R., Bennington, B. and Adtranz, A mobile computing system for maintenance and collaboration. Proceedings of ISWC. 25-32.
    [43]
    Smailagic, A. and Siewiorek, D., System level design as applied to CMU wearable computers. Journal of VLSI Signal Processing. v21 i3. 251-263.
    [44]
    R. DeVaul, M. Sung, J. Gips, A. Pentland, MIThril 2003: applications and architecture, Seventh IEEE International Symposium on Wearable Computers, ISWC'03, 2003, p.4.
    [45]
    O. Amft, M. Lauffer, S. Ossevoort, F. Macaluso, P. Lukowicz, G. Tröster, Design of the QBIC wearable computing platform, in: Proceedings of the 15th IEEE International Conference on Application specific Systems, Architectures and Processors, ASAP, Sept 2004.
    [46]
    Lukowicz, P., Amft, O., Roggen, D. and Cheng, J., On-body sensing: from gesture-based input to activity driven interaction. IEEE Computer. iOct. 92-96.
    [47]
    Ling, E.J., Jaharaman, S., Park, S., Rajamanickam, R., Eisler, R., Burghart, G. and McKee, T., A Sensate liner for personal monitoring applications. Proceedings of ISWC. 98-107.
    [48]
    Cherenack, K., Zysset, C., Kinkeldei, T., Münzenrieder, N. and Tröster, G., Woven electronic fibers with sensing and display functions for smart textiles. Advanced Materials. v22. 5178-5182.
    [49]
    Wen Dong, Alex Pentland, Quantifying group problem solving with stochastic analysis, in: Proc. ACM ICMI-MLMI 2010, Beijing, China, November 8-10, 2010.
    [50]
    Lazer, D., Computational social science. Science. v323. 721-723.
    [51]
    Roggen, D., Calatroni, A., Rossi, M., Holleczek, T., Förster, K., Tröster, G., Lukowicz, P., Bannach, D., Pirkl, G., Ferscha, A., Doppler, J., Holzmann, C., Kurz, M., Holl, G., Chavarriaga, R., Creatura, M., del, J. and Millan, R., Collecting complex activity data sets in highly rich networked sensor environments. In: 7th International Conference on Networked Sensing Systems, IEEE Press. pp. 233-240.
    [52]
    Lu, H., Lane, N.D., Eisenman, S.B. and Campbell, A.T., Bubble-sensing: binding sensing tasks to the physical world. Pervasive and Mobile Computing. v6 i1. 58-71.
    [53]
    Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D. and Triandopoulos, N., AnonySense: a system for anonymous opportunistic sensing. Pervasive and Mobile Computing. v7 i1. 16-30.
    [54]
    Lee, J.-S. and Hoh, B., Dynamic pricing incentive for participatory sensing. Pervasive and Mobile Computing. v6 i6. 693-708.
    [55]
    Campbell, A., Eisenman, S.B., Lane, N.D., Miluzzo, E., Peterson, R.A., Lu, H., Zheng, X., Musolesi, M., Fodor, K. and Ahn, G.-S., The rise of people-centric sensing. IEEE Internet Computing. v12 i4. 12-21.
    [56]
    R. Bruno, M. Conti, A. Passarella, Opportunistic networking overlays for ICT services in crisis, in: Proceedings of the 5th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2008, Washington, DC, USA, May 4-7, 2008.
    [57]
    P. Hui, J. Crowcroft, E. Yoneki, BUBBLE Rap: social based forwarding in delay tolerant networks, in: 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Hong Kong, May, 2008.
    [58]
    Daly, E.M. and Haahr, M., Social network analysis for information flow in disconnected delay-tolerant manets. IEEE Transactions in Mobile Computing. iMay.
    [59]
    Koponen, T., Chawla, M., Chun, B., Ermolinskiy, A., Kim, K.H., Shenker, S. and Stoica, I., A data-oriented (and beyond) network architecture. SIGCOMM Computational Communication Review. v37 i4. 181-192.
    [60]
    V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, R.L. Braynard, Networking named content, in: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies Rome, Italy, December 01-04, 2009, CoNEXT '09, 2009.
    [61]
    Coulouris, G., Dollimore, J. and Kindberg, T., Distributed Systems: Concepts and Design. June~2005. ISBN:0201-619-180. Addison Wesely.
    [62]
    N. Li, S.K. Das, A trust-based framework for data forwarding in opportunistic networks, Ad Hoc Networks, in: M.C. Vuran, W. Heinzelman, et al. (Guest Eds.), Special Issue on Wireless Communication in Challenged Environments 2011 (
    [63]
    Shikfa, A., Önen, M. and Molva, R., Privacy and confidentiality in context-based and epidemic forwarding. In: Computer Communications, Elsevier.
    [64]
    N. Li, S.K. Das, RADON: reputation-assisted data forwarding in opportunistic networks, in: Proceedings of 2nd ACM International Workshop on Mobile Opportunistic Networking (MobiOpp), Pisa, Italy, Feb 2010.
    [65]
    Allen, S.M., Colombo, G. and Whitaker, R.M., Cooperation through self similar social networks. ACM Transactions of Autonomous Adaption of System. v5 i1. 1-29.
    [66]
    DeWitt, D. and Gray, J., Parallel database systems: the future of high performance database systems. Communications of the ACM. v35 i6. 85-98.
    [67]
    J. Dean, S. Ghemawat, MapReduce: simplified data processing on large clusters, in: OSDI'04: Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation. San Francisco, CA: USENIX Association, 2004, pp. 1-13.
    [68]
    Barroso, L., Dean, J. and Holzle, U., Web search for a planet: the Google cluster architecture. IEEE Micro. v23 i2. 22-28.
    [69]
    Z. Xiong, W. Luo, L. Chen, L.M. Ni, Data vitalization: a new paradigm for large-scale dataset analysis, in: The IEEE Sixteenth International Conference on Parallel and Distributed Systems, 2010.
    [70]
    Güting, R.H., Ralf, H. and Schneider, M., Moving Objects Databases. 2005. Morgan Kaufmann.
    [71]
    B. Jacek, K.-T. Lim, Report from the 2nd workshop on extremely large databases, Data Science Journal 7 (November) (2008) 196-208.
    [72]
    Simmhan, Y.L., Plale, B. and Gannon, D., A survey of data provenance in e-science. ACM SIGMOD Record. v34 i3. 31-36.
    [73]
    C. Bisdikian, L.M. Kaplan, M.B. Srivastava, D.J. Thornley, D. Verma, R.I. Young, Building principles for a quality of information specification for sensor information, in: 12th International Conference on Information Fusion, FUSION 2009, Seattle, WA, USA, July 6-9 2009.
    [74]
    N. Roy, A. Misra, C. Julien, S.K. Das, J. Biswas, An energy efficient quality adaptive multi-modal sensor framework for context recognition, in: Proceedings of the 11th IEEE International Conference on Pervasive Computing and Communications (PerCom), Seattle, WA, pp. 63-75, Mar 2011. (Best Paper candidate).
    [75]
    N. Roy, S.K. Das, C. Julien, Resource-optimized quality-assured ambiguous context mediation framework in pervasive environments, IEEE Transactions on Mobile Computing, 2011, http://doi.ieeecomputersociety.org/10.1109/TMC.2011.20.
    [76]
    Wang, R.Y. and Strong, D.M., Beyond accuracy: what data quality means to data consumers. Journal of Management Information Systems.
    [77]
    Wand, Y. and Wang, R.Y., Anchoring data quality dimensions in ontological foundations. Communications of ACM. iNov.
    [78]
    S.-A Knight, J. Burn, Developing a framework for assessing information quality on the world wide web, in: Information Science & Information Technology Education Joint Conference (InSITE), Flagstaff, AZ, USA, June 16-19, 2005.
    [79]
    J.W. Branch, J.S. Davis, D.M. Sow, C. Bisdikian, Sentire: a framework for building middleware for sensor and actuator networks, in: 1st Int'l Workshop on Sensor Networks and Systems for Pervasive Computing, PerSeNS 2005, part of IEEE PerCom'05, Kauai Island, HI, USA, Mar. 8-12, 2005.
    [80]
    I. Hwang, Q. Han, Archan Misra, MASTAQ: a middleware architecture for sensor applications with statistical quality constraints, in: 1st Int'l Workshop on Sensor Networks and Systems for Pervasive Computing, PerSeNS 2005, part of IEEE PerCom'05, Kauai Island, HI, USA, Mar. 8-12, 2005.
    [81]
    C.H. Liu, C. Bisdikian, J.W. Branch, K.K. Leung, QoI-aware wireless sensor network management for dynamic multi-task operations, in: IEEE SECON, Boston, MA, USA, June 21-25, 2010.
    [82]
    H.S. Carvalho, W.B. Heinzelman, A.L. Murphy, C.J.N. Coelho, A general data fusion architecture, in: Proc. 6th ISFS Int'l Conf. Of Information Fusion, FUSION 2003, Cairns, Queensland, Australia, July 8-11, 2003.
    [83]
    Bettini, C., Brdiczka, O., Henricksen, K., Indulska, J., Nicklas, D., Ranganathan, A. and Riboni, D., A survey of context modelling and reasoning techniques. Pervasive and Mobile Computing.
    [84]
    Zhao, F., Shin, J. and Reich, J., Information-driven dynamic sensor collaboration for tracking applications. IEEE Signal Processing Magazine.
    [85]
    A. Tolstikov, C.-K. Tham, W. Xiao, J. Biswas, Information quality mapping in resource-constrained multi-modal data fusion system over wireless sensor network with losses, in: 6th Int'l Conf. on Information, Communications & Signal Processing, ICICS 2007, Singapore, Dec. 10-13, 2007.
    [86]
    S. Zahedi, M.B. Srivastava, C. Bisdikian, L.M. Kaplan, Quality tradeoffs in object tracking with duty-cycled sensor networks, in: 31st IEEE Real-Time Systems Symposium, RTSS 2010, San Diego, CA, USA, Nov. 30-Dec. 3, 2010.
    [87]
    L. Yu, L. Yuan, G. Qu, A. Ephremides, Energy-driven detection scheme with guaranteed accuracy, in: Information Processing in Sensor Networks, IPSN 2006, Nashville, TN, USA, April 19-21, 2006.
    [88]
    C. Bisdikian, On sensor sampling and quality of information: a starting point, in: 3rd Int'l Workshop on Sensor Networks and Systems for Pervasive Computing, PerSeNS 2007, White Plains, NY, USA, March 19-23, 2007.
    [89]
    Yates, D.J., Nahum, E.M., Kurose, J.F. and Shenoy, P., Data quality and query cost in pervasive sensing systems. Pervasive and Mobile Computing.
    [90]
    Klein, A. and Lehner, W., Representing data quality in sensor data streaming environments. ACM Journal of Data and Information Quality. v1 i2.
    [91]
    Open Geospatial Consortium, Sensor Model Language, http://www.opengeospatial.org/standards/sensorml.
    [92]
    G. Castelli, A. Rosi, M. Mamei, F. Zambonelli, A simple model and infrastructure for context-aware browsing of the world, in: 5th IEEE Int'l Conf. on Pervasive Computing and Communications, PerCom 2007, White Plain, New York, USA, March 19-23, 2007.
    [93]
    C. Bisdikian, J. Branch, K.K. Leung, R.I. Young, A letter soup for the quality of information in sensor networks, in: 1st Information Quality and Quality of Service Workshop, IQ2S'09, part of IEEE PerCom'09, Galveston, TX, USA, March 9-13, 2009.
    [94]
    G. Tychogiorgos, C. Bisdikian, Selecting relevant sensor providers for meeting 'your' quality information needs, in: 12th Int'l Conf. on Mobile Data Management (MDM 2011), Luleå, Sweden, June 6-9, 2011.
    [95]
    Han, Q., Hakkarinen, D., Boonma, P. and Suzuki, J., Quality-aware sensor data collection. International Journal of Sensor Networks. v7 i3.
    [96]
    Zhang, W., Liu, Y., Das, S.K. and De, P., Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach. Pervasive and Mobile Computing. v4 i5. 658-680.
    [97]
    Trusted Computing Group, Specifications, www.trustedcomputinggroup.org.
    [98]
    R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, Design and implementation of a TCG-based integrity measurement architecture, USENIX Security Symposium, 2004.
    [99]
    C. Castelluccia, A. Francillon, D. Perito, C. Soriente, On the difficulty of software-based attestation of embedded devices, ACM Conference on Computer and Communications Security, CCS'09.
    [100]
    D. Perito, G. Tsudik, Secure code update for embedded devices via proofs of secure erasure, 2010 European Conference on Research in Computer Security, ESORICS'10, pp. 643-662.
    [101]
    Gratzer, V. and Naccache, D., Alien vs. quine. IEEE Security and Privacy. v5. 26-31.
    [102]
    McCune, J., Perrig, A. and Reiter, M., Seeing-is-believing: using camera phones for human-verifiable authentication. IJSN. v4 i1/2. 43-56.
    [103]
    N. Saxena, et al. Secure device pairing based on a visual channel, IEEE Symposium on Security and Privacy, 2006.
    [104]
    Kumar, A., Saxena, N., Tsudik, G. and Uzun, E., Caveat emptor: a comparative study of secure device pairing methods. IEEE PerCom. 1-10.
    [105]
    A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun, Y. Wang, Serial hook-ups: a comparative usability study of secure device pairing methods, SOUPS 2009.
    [106]
    R. Kainda, I. Flechais, A. Roscoe, Usability and security of out-of-band channels in secure device pairing protocols, SOUPS 2009.
    [107]
    R. Prasad, N. Saxena, Efficient device pairing using human-comparable synchronized audiovisual patterns, ACNS 2008.
    [108]
    N. Saxena, M. Uddin, Automated device pairing for asymmetric pairing scenarios, ICICS 2008.
    [109]
    C. Soriente, G. Tsudik, E. Uzun, BEDA: button-enabled device association, Workshop on Security for Spontaneous Interaction (IWSSI) 2007.
    [110]
    C. Soriente, G. Tsudik, E. Uzun, HAPADEP: human-assisted pure audio device pairing, Information Security Conference (ISC) 2008.
    [111]
    Nithyanand, R., Saxena, N., Tsudik, G. and Uzun, E., Groupthink: usability of secure group association for wireless devices. ACM UbiComp. 331-340.
    [112]
    R. Kainda, I. Flechais, A. Roscoe, Two heads are better than one: security and usability of device associations in group scenarios, SOUPS 2010.
    [113]
    Lin, Y., SPATE: small-group PKI-less authenticated trust establishment. IEEE Transactions on Mobile Computing. v9 i12. 1666-1681.
    [114]
    Chen, O., GAnGS: gather, authenticate 'n group securely. ACM MOBICOM. 92-103.
    [115]
    Castelluccia, C. and Mutaf, P., Shake them up!: a movement-based pairing protocol for CPU-constrained devices. ACM MobiSys. 51-64.
    [116]
    Atallah, Louis and Yang, Guang-Zhong, The use of pervasive sensing for behaviour profiling-a survey. Pervasive and Mobile Computing. v5 i5. 447-464.
    [117]
    M. Conti, M. Kumar, Report of the NSF/EU Workshop on Future Directions in Pervasive Computing and Social Networking for Emerging Applications, Mannheim, Germany, March 2010. http://www.percom.org/NSF-EUWorkshop/.
    [118]
    Bettini, C., Brdiczka, O., Henricksen, K., Indulska, J., Nicklas, D., Ranganathan, A. and Riboni, D., A survey of context modelling and reasoning techniques. Pervasive and Mobile Computing. v6 i2. 161-180.
    [119]
    Roy, N., Tao, G. and Das, S.K., Supporting pervasive computing applications with active context fusion and semantic context delivery. Pervasive and Mobile Computing. v6 i1. 21-42.
    [120]
    Santos, A.C., Cardoso, J.M.P., Ferreira, D.R., Diniz, P.C. and Chaaínho, P., Providing user context for mobile and social networking applications. Pervasive and Mobile Computing. v6 i3. 324-341.
    [121]
    http://sensorlab.cs.dartmouth.edu/NSFPervasiveComputingAtScale/ NSF Workshop on Pervasive Computing at Scale, Seattle, Washington, January 2011.

    Cited By

    View all
    • (2023)Towards Post-disaster Damage Assessment using Deep Transfer Learning and GAN-based Data AugmentationProceedings of the 24th International Conference on Distributed Computing and Networking10.1145/3571306.3571438(372-377)Online publication date: 4-Jan-2023
    • (2023)Data management in digital twins: a systematic literature reviewKnowledge and Information Systems10.1007/s10115-023-01870-165:8(3165-3196)Online publication date: 16-Apr-2023
    • (2022)On-device modeling of user’s social context and familiar places from smartphone-embedded sensor dataJournal of Network and Computer Applications10.1016/j.jnca.2022.103438205:COnline publication date: 1-Sep-2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Pervasive and Mobile Computing
    Pervasive and Mobile Computing  Volume 8, Issue 1
    February, 2012
    163 pages

    Publisher

    Elsevier Science Publishers B. V.

    Netherlands

    Publication History

    Published: 01 February 2012

    Author Tags

    1. Cyber-physical convergence
    2. Cyber-world security
    3. Data storage
    4. Opportunistic networking and computing
    5. Pervasive computing
    6. Quality of Information
    7. Self-*
    8. Social networks
    9. Wearable computing

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Towards Post-disaster Damage Assessment using Deep Transfer Learning and GAN-based Data AugmentationProceedings of the 24th International Conference on Distributed Computing and Networking10.1145/3571306.3571438(372-377)Online publication date: 4-Jan-2023
    • (2023)Data management in digital twins: a systematic literature reviewKnowledge and Information Systems10.1007/s10115-023-01870-165:8(3165-3196)Online publication date: 16-Apr-2023
    • (2022)On-device modeling of user’s social context and familiar places from smartphone-embedded sensor dataJournal of Network and Computer Applications10.1016/j.jnca.2022.103438205:COnline publication date: 1-Sep-2022
    • (2022)Context-aware environment monitoring to support LPWAN-based battlefield applicationsComputer Communications10.1016/j.comcom.2022.02.020189:C(18-27)Online publication date: 1-May-2022
    • (2021)Integrating Inter-field Data into Space-Time to Grasp and Analyze Activities in TownDistributed, Ambient and Pervasive Interactions10.1007/978-3-030-77015-0_1(3-14)Online publication date: 24-Jul-2021
    • (2020)Low-Latency Energy-Efficient Cyber-Physical Disaster System Using Edge Deep LearningProceedings of the 21st International Conference on Distributed Computing and Networking10.1145/3369740.3372752(1-6)Online publication date: 4-Jan-2020
    • (2020)Modeling Interactive Smart SpacesConceptual Modeling10.1007/978-3-030-62522-1_30(403-417)Online publication date: 3-Nov-2020
    • (2019)Improving QoE in Multi-layer Social SensingProceedings of the Fourth International Workshop on Social Sensing10.1145/3313294.3313384(18-23)Online publication date: 15-Apr-2019
    • (2019)A hybrid classifier approach to multivariate sensor data for climate smart agriculture cyber-physical systemsProceedings of the 20th International Conference on Distributed Computing and Networking10.1145/3288599.3288621(337-341)Online publication date: 4-Jan-2019
    • (2019)Toward a framework for self-adaptive workflows in cyber-physical systemsSoftware and Systems Modeling (SoSyM)10.1007/s10270-017-0639-018:2(1117-1134)Online publication date: 1-Apr-2019
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media