A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Building a scalable and efficient component-oriented system using CORBA - an Active Badge system case study
1998
Distributed Systems Engineering
The presented study is a practical lesson about the implementation of a scalable system oriented towards information dissemination. ...
Fundamental features of the proposed solution are illustrated b y a p erformance study and a representative application. ...
To satisfy the rst requirement, ABng uses the modern component and object-oriented technology. The system is developed in CORBA-compliant e n vironments: Orbix 8 and OrbixWeb 11 . ...
doi:10.1088/0967-1846/5/4/006
fatcat:ywjxh2zgzvbujiakmxjayni3mm
The anatomy of a context-aware application
1999
Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking - MobiCom '99
The platform builds a dynamic model of the environment using these location sensors and resource information gathered by telemetry software, and presents it in a form suitable for application programmers ...
The only item a user is required to carry is a small sensor tag, which identifies them to the system and locates them accurately in three dimensions. ...
Acknowledgements The authors would like to thank their colleagues for innumerable contributions over many years to the discussion about context-aware systems and mobile applications. ...
doi:10.1145/313451.313476
dblp:conf/mobicom/HarterHSWW99
fatcat:nhencmba5zgyxdyzgebanepkdi
A Systematic Overview and Comparative Analysis of Service Discovery Protocols and Middlewares
2020
International Journal of Advanced Computer Science and Applications
The scalability feature is gained at particular domain while DNS-SD does not provide service discovery to use cases, relax queries. Therefore, it relies on DNS defined messages. ...
Eight discovery protocols along with their functionalities (such as DEAPspace, DNS-SD, JXTA, RDP, LDAP, CORBA Trader, UDDI and Superstring) are discussed and compared to evaluate the performance and efficiency ...
Most of the systems have capability of built-in clocks, few uses timestamp like Active badge. ...
doi:10.14569/ijacsa.2020.0110633
fatcat:be5gmbfninao3pxp7fbe2brjvy
Sentient Computing for Everyone
[chapter]
2002
IFIP International Federation for Information Processing
LocALE addresses this issue by providing a CORBA-based solution that deals with heterogeneous object lifecycle and location control. ...
facilitate user-bound software service activation, migration and deactivation. ...
Acknowledgments Diego López de Ipiña is very grateful to the Basque Government's Department of Education for the sponsorship of his PhD studies. ...
doi:10.1007/0-306-47005-5_4
fatcat:wmndpptnt5ak5liopv2jxka7k4
A Survey of Software Infrastructures and Frameworks for Ubiquitous Computing
2005
Mobile Information Systems
It tries to provide a systematic, relatively broad (and necessarily not very deep) overview, while pointing to relevant literature for in-depth study of the systems discussed. ...
In this survey, we discuss 29 software infrastructures and frameworks which support the construction of distributed interactive systems. ...
Research Center for Artificial Intelligence, Saarbrücken, Germany, and the chair for applied software engineering at the Technical University of Munich, Germany. ...
doi:10.1155/2005/654215
fatcat:fdhnm2jwqvbv5dqzllw26pmrzu
Performance Evaluation using Various Models in Distributed Component based Systems
2014
International Journal of Computer Applications
General Terms Distributed component based system ...
Over the years, several models were proposed to analyze the performance of distributed component based system with the view of improving system's performance. ...
Case study-Industrial case study is there on stock Online test application based on two middleware technologies i.e. CORBA and EJB. ...
doi:10.5120/17148-7183
fatcat:ogcldmjzm5d2hidtucnfdntf4q
Survey of Context Provisioning Middleware
2013
IEEE Communications Surveys and Tutorials
Gaia applies I/O operations and file system manipulation for interconnecting active space objects. Eventbased communication is established through both RPC and CORBA. ...
While the system is by design not intended to be used over a large scale and is focussed on utilising context information bound to a geographical area, physical and functional scalability are partly supported ...
doi:10.1109/surv.2013.010413.00207
fatcat:xlt33n5zmvdyjlxhk4kowwz6qe
An architecture to support storage and retrieval of events
[chapter]
1998
Middleware'98
They also support deployment and enhancement of traditionally difficult-to-build active systems such as large-scale collaborative environments and mobility aware architectures. ...
However, complex systems issues like mobility, scalability, federation and persistence indicate a requirement for more advanced services within these infrastructures. ...
Application integration and building of distributed systems A major motivation of this work is to provide a generic and scalable way for integration of distributed components. ...
doi:10.1007/978-1-4471-1283-9_27
fatcat:5ls3rxqahncf5m5iq4efum3dsy
Middleware for Digital Libraries
1998
D-Lib Magazine
Components of a distributed software system may fail, or become unreachable but continue to work, and we cannot be certain which is the case. ...
Components of a distributed software system may fail, or become unreachable but continue to work, and we cannot be certain which is the case. ...
doi:10.1045/october98-bacon
fatcat:h6ryl73cija6rajwqteoc7t7um
Are our homes ready for services? A domotic infrastructure based on the Web service stack
2008
Pervasive and Mobile Computing
Acknowledgments We thank the colleagues involved in the ITEA project, the students and programmers who contributed to the research and implementation for the case study, most notably Manuel Zanoni, and ...
We are also grateful to the anonymous reviewers for their constructive comments which improved the contents and presentation of the paper. We thank Eirini Kaldeli and ...
Pervading the environment with active landmarks, called Cyber Crumbs, aims at guiding the blind by equipping him/her with a smart badge [39] . ...
doi:10.1016/j.pmcj.2008.01.002
fatcat:gwgisixjxfc2vfqi4qctgsahsa
I-centric Communications
2001
Informatik - Forschung und Entwicklung
This framework is used to design and implement an I-centric communications system. ...
Following this view, a new approach is not to build communication systems based on specific technologies, but on the analysis of the individual communication space. ...
CORBA uses an object-oriented approach for creating software components that can be reused and shared between applications. ...
doi:10.1007/s004500100087
fatcat:eefvlrm6lvf2vhnxn5sk3lhhqu
A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications
2001
Human-Computer Interaction
We illustrate the usefulness of the conceptual framework by describing a number of contextaware applications that have been prototyped using the Context Toolkit. ...
ABSTRACT Computing devices and applications are now used beyond the desktop, in diverse environments, and this trend toward ubiquitous computing is accelerating. ...
This work is supported in part by grants from the National Science Foundation (Career Grant IRI-9703384 and Experimental Systems Software Grant EIA-9806822) and from the University Partnerships in Research ...
doi:10.1207/s15327051hci16234_02
fatcat:76ygda3hkbgcnd2tqt7oxnpw4q
On the use of agent technology in intelligent, multisensory and distributed surveillance
2011
Knowledge engineering review (Print)
communication and coordination between autonomous entities), suggest that the agency is a good choice for solving problems which appear and are dealt with in surveillance systems. 192 ...
Current surveillance systems are noted for using several devices, heterogeneous in many instances, distributed along the observed scenario, while incorporating a certain degree of intelligence to alert ...
Acknowledgments This work was partially supported by the Spanish Ministerio de Ciencia e Innovacio´n under projects TIN2007-67586-C02-02 and TIN2010-20845-C03-01 and by the Spanish Junta de Comunidades ...
doi:10.1017/s0269888911000026
fatcat:72b3jx6wurb6daoylicir2el4a
Security in Pervasive Computing: Current Status and Open Issues
2006
International Journal of Network Security
Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. ...
Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few. ...
Access control In case of access control, the system is based on the role and identity of the user. ...
dblp:journals/ijnsec/HaqueA06
fatcat:qvinqrcjn5gedaribcdjuyl44m
Software engineering for health education and care delivery systems: The Smart Condo project
2009
2009 ICSE Workshop on Software Engineering in Health Care
System (GIS) and a 3D virtual world, namely Second Life (SL). ...
This system is responsible for inferring higher-order information about the activities of the condo's occupant and supporting the visualization of the collected information in a 2D Geographic Information ...
Acknowledgments This research was funded by the IBM Centers for Advanced Studies, NSERC, iCORE, and Alberta Advanced Education and Technology. ...
doi:10.1109/sehc.2009.5069602
dblp:conf/icse/StrouliaCBHGN09
fatcat:zllv4dpjkbaovd7bl4n4ywaq64
« Previous
Showing results 1 — 15 out of 50 results