A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fujaba-Based Tool Development for eHome Systems
2005
Electronical Notes in Theoretical Computer Science
Based on our experience, we consider this approach as a possibility to improve the productivity of the eHome system tool development. ...
This tool can serve as a base for a wider range of tools supporting eHome systems. ...
Systems implementing the value-added services are called eHome systems. An eHome-related scenario is supported by instances of different value-added services in a specific eHome. ...
doi:10.1016/j.entcs.2004.12.038
fatcat:mbk5sargevgndi4iehwpafguf4
Dependency Management in Smart Homes
[chapter]
2009
Lecture Notes in Computer Science
In this paper we describe how we extended our existing dependency management approach for smart home services with a mechanism for monitoring service bindings and handling access control based on priority ...
All respective services have to be executed based on a limited number of devices, which will result in resource conflicts. ...
Furthermore only top-level services with a rule-based implementation can be considered in this approach. ...
doi:10.1007/978-3-642-02164-0_11
fatcat:xhe2sgghqbebvbfzu6bl3jxrsq
uDesign: End-User Design Applied to Monitoring and Control Applications for Smart Spaces
2008
Seventh Working IEEE/IFIP Conference on Software Architecture (WICSA 2008)
The style offers an intuitive metaphor based on boxes, pipes, and wires, but retains enough preciseness that systems can be automatically assembled and dynamically reconfigured based on uDesign descriptions ...
The paper presents validation of uDesign along the following aspects: (a) expressiveness, by means of two case studies, one in health care, and one in home security, (b) soundness, by providing uDesign's ...
enough to enable the automatic assembly of a running system based on a description provided by the end-user. ...
doi:10.1109/wicsa.2008.46
dblp:conf/wicsa/SousaSPB08
fatcat:3afuisbccfc6bbmoowfdbku55e
Modeling and optimizing content-based publish/subscribe systems
2009
Proceedings of the 6th Middleware Doctoral Symposium on - MDS '09
System Model A publish/subscribe system consists of a notification service and a set of clients that interact via this service. ...
Due to the excepted complexity, each composition approach should be checked by a (formal) calculus. As a long term goal also a generic framework for compositions is interesting but hard to reach. ...
Appendix 159 Appendix Appendix A
List of Abbreviations and Symbols In the whole thesis we introduced a lot of abbreviations to shorten the presentation. ...
doi:10.1145/1659753.1659758
fatcat:nugwuie4xraxjfxxlp5vs7we3q
Home automation in the wild
2011
Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11
further research, which include eliminating the need for structural changes for installing home automation, providing users with simple security primitives that they can confidently configure, and enabling composition ...
In rule-based automation, rules trigger automation based on events or at certain times. These rules are configured by the guru or professional installer. ...
monitored by a service company (e.g., ADT [16] ). ...
doi:10.1145/1978942.1979249
dblp:conf/chi/BrushLMASD11
fatcat:ebg7azurbngsnorpbzpp3um7ge
Future Spaces: Reinventing the Home Network for Better Security and Automation in the IoT Era
2018
Sensors
Cyber-Physical Systems (CPSs) are complex systems comprising computation, physical, and networking assets. ...
Smart homes are a peculiar type of CPS where the local networking fundamentals have seen little evolution in the past decades, while the context in which home networks operate has drastically evolved. ...
Acknowledgments: The authors would like to thank their Nokia Bell Labs colleagues who have also contributed to this work at some point in time, in particular Erwin Six, Paul Cautereels, Werner Liekens ...
doi:10.3390/s18092986
pmid:30205437
pmcid:PMC6163927
fatcat:yzjvetsiizcmzkhfdtf6k7pbqi
An agile framework for variability management in software product line engineering
[article]
2012
and reactive approach. ...
This dissertation presents a novel framework to manage variability in software product lines in an agile context. ...
Component-
based software engineering [Heineman2001] is a technique for packaging software in a
way that allows flexible reuse and composition of software. ...
doi:10.11575/prism/24810
fatcat:ynn6uzzjmnc65csta6y2s2wure
SPECIAL ISSUE 2 : 2017
2017
PLANNING MALAYSIA JOURNAL
A reviewer should also call to the chief editor's attention any ...
Deepest appreciation to all participants involved in the data collection process, from both the government agencies and the communities of Melaka Heritage City. ...
Proposing New Shorter Routes Based on the findings discussed above, an analysis was carried out to identify shorter routes for KL Hop-On Hop-Off service based on the following criteria: a) Number of bus ...
doi:10.21837/pmjournal.v15.i2.348
fatcat:25hpkexe4ngbbfd3k5itkzxsh4
SEVENTY-EIGHTH ANNUAL MEETING OF THE British Medical Association
1910
BMJ (Clinical Research Edition)
the pocket in any position or kept suspended by a lanyard. ...
Hooper, dispenser-incharge, Royal Naval Hospital, Haslar-has been adopted by the Admiralty for issue in field chests and to the service afloat. ...
Kilda by basing their economics on a, system of living on their children. ...
doi:10.1136/bmj.2.2590.431
fatcat:zrd6wbiwvre5hlxq5tg2gjx6s4
Canadian Society for Chemistry (CSC)
[chapter]
2020
The Grants Register 2021
Founded by Royal Charter in 1883, the University today combines impressive modern facilities and a dynamic approach to teaching and research with its proud heritage of service and achievement. ...
industry, commerce or public service in a Commonwealth country. ...
The scholarship is awarded to conduct health services research that focuses on health systems and implementation science at the School of Public Health Eligibility: International students can apply for ...
doi:10.1057/978-1-349-95988-4_227
fatcat:4dzaecnokvghden66ighektib4
Introduction to Ubiquitous Computing
[chapter]
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
being compositions of services. ...
Although already outdated, ODSI was influential since it fostered the move away from ODP's more top-down approach to a component-based, that is service based approach that supports the concept of applications ...
In addition, a holistic approach needed for UC systems raises issues such as security, which are important when trying to find important node types at different levels of granularity. ...
doi:10.4018/978-1-59904-832-1.ch001
fatcat:dolf7tdc7nbi5lypmif45tulaq
Introduction to Ubiquitous Computing
[chapter]
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
being compositions of services. ...
Although already outdated, ODSI was influential since it fostered the move away from ODP's more top-down approach to a component-based, that is service based approach that supports the concept of applications ...
In addition, a holistic approach needed for UC systems raises issues such as security, which are important when trying to find important node types at different levels of granularity. ...
doi:10.4018/9781599048321.ch001
fatcat:3h67vov2frfnviosjslp636snm
Introduction to Ubiquitous Computing
[chapter]
Human Computer Interaction
being compositions of services. ...
Although already outdated, ODSI was influential since it fostered the move away from ODP's more top-down approach to a component-based, that is service based approach that supports the concept of applications ...
In addition, a holistic approach needed for UC systems raises issues such as security, which are important when trying to find important node types at different levels of granularity. ...
doi:10.4018/9781878289919.ch001
fatcat:vb7m36etabhjxpfjumymgbo3ke
Introduction to Ubiquitous Computing
[chapter]
Ubiquitous and Pervasive Computing
being compositions of services. ...
Although already outdated, ODSI was influential since it fostered the move away from ODP's more top-down approach to a component-based, that is service based approach that supports the concept of applications ...
In addition, a holistic approach needed for UC systems raises issues such as security, which are important when trying to find important node types at different levels of granularity. ...
doi:10.4018/978-1-60566-960-1.ch001
fatcat:gxhoyj2ekzhvpjzt7tdp4etsdy
Introduction to Ubiquitous Computing
[chapter]
Human Computer Interaction
being compositions of services. ...
Although already outdated, ODSI was influential since it fostered the move away from ODP's more top-down approach to a component-based, that is service based approach that supports the concept of applications ...
In addition, a holistic approach needed for UC systems raises issues such as security, which are important when trying to find important node types at different levels of granularity. ...
doi:10.4018/978-1-87828-991-9.ch001
fatcat:pdoug3wfgfcbrpad6ua5ialdrq
« Previous
Showing results 1 — 15 out of 24 results