Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
introduction
Free access

Introduction to special section on formal methods in pervasive computing

Published: 04 May 2012 Publication History

Abstract

Ubiquitous and pervasive applications may present critical requirements from the point of view of functional correctness, reliability, availability, security, and safety. Unlike traditional safety-critical applications, the behavior of ubiquitous and pervasive applications is affected by the movements and location of users and resources. In this article, we first present emerging formal methods for the description of both entities and their behavior in pervasive computing environments; then, we introduce this special issue. Despite many previous works that have focused on modeling the entities, relatively few have concentrated on modeling or verifying behaviors; and almost none has dealt with combining techniques proposed in these two aspects. The articles accepted in this special issue cover some of the topics aforementioned and constitute a representative sample of the latest development of formal methods in pervasive computing environments.

References

[1]
Alur, R. and Henzinger, T. A. 1994. A really temporal logic. J. ACM 41, 181--203.
[2]
Artho, C., Barringer, H., Goldberg, A., Havelund, K., Khurshid, S., Lowry, M., Pasareanu, C., Rosu, G., Sen, K., Visser, W., and Washington, R. 2005. Combining test case generation and runtime verification. Theor. Comput. Sci. 336, 209--234.
[3]
Bakhouya, M. and Gaber, J. 2008. Approaches for ubiquitous computing. In Wireless Ad Hoc and Sensor Networks. H. Labiod, Ed., ISTE Publishing Knowledge, John Wiley and Sons, UK. 111--142.
[4]
Bellini, P., Mattolini, R., and Nesi, P. 2000. Temporal logics for real-time system specification. ACM Comput. Surv. 32, 12--42.
[5]
Bouquet, P., Giunchiglia, F., van Harmelen, F., Serafini, L., and Stuckenschmidt, H. 2004. Contextualizing ontologies. Web Semant. 1, 325--343.
[6]
Cardelli, L. and Gordon, A. D. 2000a. Anyti anywhere: Modal logics for mobile ambients. In Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'00). ACM, New York, 365--377.
[7]
Cardelli, L. and Gordon, A. D. 2000b. Mobile ambients. Theor. Comput. Sci. 240, 177--213.
[8]
Charatonik, W., Zilio, S. D., Gordon, A. D., Mukhopadhyay, S., and Talbot, J.-M. 2003. Model checking mobile ambients. Theor. Comput. Sci. 308, 1-3, 277--331.
[9]
Chen, H., Finin, T., and Joshi, A. 2004a. Semantic web in the context broker architecture. In Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications (PerCom'04). IEEE Computer Society, Los Alamitos, CA, 277--.
[10]
Chen, H., Perich, F., Finin, T., and Joshi, A. 2004b. Soupa: Standard ontology for ubiquitous and pervasive applications. In Proceedings of the 1st Annual Intermational Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS'04). 258--267.
[11]
Clarke, E. M., Emerson, E. A., and Sistla, A. P. 1986. Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8, 244--263.
[12]
Clarke, E. M., Grumberg, O., and Peled, D. A. 1999. Model Checking. The MIT Press.
[13]
Coronato, A. and De Pietro, G. 2010a. Formal design of ambient intelligence applications. Computer 43, 60--68.
[14]
Coronato, A. and De Pietro, G. 2010b. Formal specification of wireless and pervasive healthcare applications. ACM Trans. Embed. Comput. Syst. 10, 12:1--12:18.
[15]
Coronato, A. and De Pietro, G. 2011. Formal specification and verification of ubiquitous and pervasive systems. ACM Trans. Auton. Adapt. Syst. 6, 9:1--9:6.
[16]
Dey, A. K., Mankoff, J., and Abowd, G. D. 2000. Distributed mediation of imperfectly sensed context in aware environments. http://smartech.gatech.edu/jspui/bitstream/1853/3424/1/00-14.pdf.
[17]
Gandon, F. and Sadeh, N. 2003. A semantic e-wallet to reconcile privacy and context awareness. In Proceedings of the Conference on The SemanticWeb (ISWC'03). Lecture Notes in Computer Science, vol. 2870, Springer, 385--401.
[18]
Gray, P. D. and Salber, D. 2001. Modelling and using sensed context information in the design of interactive applications. In Proceedings of the 8th IFIP International Conference on Engineering for Human-Computer Interaction (EHCI'01). Springer, 317--336.
[19]
Gu, T., Wang, X. H., Pung, H. K., and Zhang, D. Q. 2004. An ontology-based context model in intelligent environments. In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. 270--275.
[20]
Henricksen, K. and Indulska, J. 2006. Developing context-aware pervasive computing applications: Models and approach. Pervasive Mob. Comput. 2, 37--64.
[21]
Hoare, C., Misra, J., Leavens, G. T., and Shankar, N. 2009. The verified software initiative: A manifesto. ACM Comput. Surv. 41, 22:1--22:8.
[22]
Holzmann, G. J. 1997. The model checker spin. IEEE Trans. Softw. Engin. 23, 279--295.
[23]
Karlsson, D., Eles, P., and Peng, Z. 2007. Formal verification of component-based designs. Des. Autom. Embedded Syst. 11, 49--90.
[24]
Lei, H., Sow, D. M., Davis, II, J. S., Banavar, G., and Ebling, M. R. 2002. The design and applications of a context service. SIGMOBILE Mob. Comput. Comm. Rev. 6, 45--55.
[25]
Leucker, M. and Schallhart, C. 2009. A brief account of runtime verification. J. Log. Algebr. Program. 78, 5, 293--303.
[26]
Milner, R. 2008. Bigraphs and their algebra. Electr. Notes Theor. Comput. Sci. 209, 5--19.
[27]
Ostroff, J. S. and Wohnham, W. 1987. Modeling and verifying real-time embedded computer systems. In Proceedings of the IEEE Real-Time Systems Symposium.
[28]
Ranganathan, A., Al-Muhtadi, J., Chetan, S., Campbell, R., and Mickunas, M. D. 2004. Middlewhere: a middleware for location awareness in ubiquitous computing applications. In Proceedings of the 5th ACM/IFIP/USENIX International Conference on Middleware (Middleware'04). Springer, 397--416.
[29]
Ranganathan, A. and Campbell, R. H. 2008. Provably correct pervasive computing environments. In Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications. IEEE Computer Society, Los Alamitos, CA, 160--169.
[30]
Ranganathan, A., McGrath, R. E., Campbell, R. H., and Mickunas, M. D. 2003. Use of ontologies in a pervasive computing environment. Knowl. Engin. Rev. 18, 209--220.
[31]
Roşu, G. and Havelund, K. 2005. Rewriting-based techniques for runtime verification. Autom. Softw. Eng. 12, 151--197.
[32]
Sobel, A. E. K. and Clarkson, M. R. 2002. Formal methods application: An empirical tale of software development. IEEE Trans. Softw. Engin. 28, 308--320.
[33]
Weis, T., Becker, C., and Brndle, E. 2006. Towards a programming paradigm for pervasive applications based on the ambient calculus. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.2617.
[34]
Weiser, M. 1993. Some computer science issues in ubiquitous computing. Comm. ACM 36, 7484.
[35]
Yin, X. and Knight, J. 2010. Formal verification of large software systems. In Proceedings of the 2nd NASA Formal Methods Symposium (NFM 2010), NASA/CP-2010-216215, C. Muñoz, Ed. 192--201.
[36]
Zhang, D., Gu, T., and Wang, X. 2005. Enabling context-aware smart home with semantic technology. Int. J. Hum.-Friend. Welfare Robot. Syst. 6.

Cited By

View all
  • (2022)An AI-Empowered Home-Infrastructure to Minimize Medication ErrorsJournal of Sensor and Actuator Networks10.3390/jsan1101001311:1(13)Online publication date: 9-Feb-2022
  • (2022)Learning and Assessing Optimal Dynamic Treatment Regimes Through Cooperative Imitation LearningIEEE Access10.1109/ACCESS.2022.319349410(78148-78158)Online publication date: 2022
  • (2021)Formal Specification of Non-Functional Properties of Context-Aware SystemsInternational Journal of Organizational and Collective Intelligence10.4018/IJOCI.28617512:2(1-31)Online publication date: 10-Dec-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Autonomous and Adaptive Systems
ACM Transactions on Autonomous and Adaptive Systems  Volume 7, Issue 1
Special section on formal methods in pervasive computing, pervasive adaptation, and self-adaptive systems: Models and algorithms
April 2012
365 pages
ISSN:1556-4665
EISSN:1556-4703
DOI:10.1145/2168260
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 May 2012
Accepted: 01 February 2012
Revised: 01 April 2011
Received: 01 June 2010
Published in TAAS Volume 7, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Formal specification and verification
  2. methodologies and tools
  3. ubiquitous and pervasive safety-critical applications

Qualifiers

  • Introduction
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)25
  • Downloads (Last 6 weeks)3
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)An AI-Empowered Home-Infrastructure to Minimize Medication ErrorsJournal of Sensor and Actuator Networks10.3390/jsan1101001311:1(13)Online publication date: 9-Feb-2022
  • (2022)Learning and Assessing Optimal Dynamic Treatment Regimes Through Cooperative Imitation LearningIEEE Access10.1109/ACCESS.2022.319349410(78148-78158)Online publication date: 2022
  • (2021)Formal Specification of Non-Functional Properties of Context-Aware SystemsInternational Journal of Organizational and Collective Intelligence10.4018/IJOCI.28617512:2(1-31)Online publication date: 10-Dec-2021
  • (2021)Application of Reinforcement Learning and Deep Learning in Multiple-Input and Multiple-Output (MIMO) SystemsSensors10.3390/s2201030922:1(309)Online publication date: 31-Dec-2021
  • (2019)Adaptive Treatment Assisting System for Patients Using Machine Learning2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS)10.1109/SNAMS.2019.8931857(460-465)Online publication date: Oct-2019
  • (2019)Risk management for nuclear medical department using reinforcement learning algorithmsJournal of Reliable Intelligent Environments10.1007/s40860-019-00084-zOnline publication date: 14-May-2019
  • (2019)A context‐aware framework for modelling and verification of smart parking systems in urban citiesConcurrency and Computation: Practice and Experience10.1002/cpe.540133:2Online publication date: 20-Jun-2019
  • (2018)A Reinforcement Learning-Based Approach for the Risk Management of e-Health Environments: A Case Study2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)10.1109/SITIS.2018.00114(711-716)Online publication date: Nov-2018
  • (2016)A formal framework for context-aware systems specification and verificationJournal of Systems and Software10.5555/3044222.3051240122:C(445-462)Online publication date: 1-Dec-2016
  • (2016)A Formal Methodology to Design and Deploy Dependable Wireless Sensor NetworksSensors10.3390/s1701001917:12(19)Online publication date: 23-Dec-2016
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media