Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
PREMIUM
Số trang
640
Kích thước
11.0 MB
Định dạng
PDF
Lượt xem
1848

Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises

Nội dung xem thử

Mô tả chi tiết

Handbook of Research on

Ubiquitous Computing

Technology for Real Time

Enterprises

Max Mühlhäuser

Technische Universität Darmstadt, Germany

Iryna Gurevych

Technische Universität Darmstadt, Germany

Hershey • New York

InformatIon scIence reference

Acquisitions Editor: Kristin Klinger

Development Editor: Kristin Roth

Editorial Assistants: Ross Miller, Deborah Yahnke

Senior Managing Editor: Jennifer Neidig

Managing Editor: Sara Reed

Copy Editors: Alana Bubnis, Erin Meyer

Typesetter: Michael Brehm

Cover Design: Lisa Tosheff

Printed at: Yurchak Printing Inc.

Published in the United States of America by

Information Science Reference (an imprint of IGI Global)

701 E. Chocolate Avenue, Suite 200

Hershey PA 17033

Tel: 717-533-8845

Fax: 717-533-8661

E-mail: [email protected]

Web site: http://www.igi-global.com

and in the United Kingdom by

Information Science Reference (an imprint of IGI Global)

3 Henrietta Street

Covent Garden

London WC2E 8LU

Tel: 44 20 7240 0856

Fax: 44 20 7379 0609

Web site: http://www.eurospanonline.com

Copyright © 2008 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by

any means, electronic or mechanical, including photocopying, without written permission from the publisher.

Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does

not indicate a claim of ownership by IGI Global of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data

Handbook of research on ubiquitous computing technology for real time enterprises / Max Muhlhauser and Iryna Gurevych, editors.

p. cm.

Summary: "This book combines the fundamental methods, algorithms, and concepts of pervasive computing with current innovations and

solutions to emerging challenges. It systemically covers such topics as network and application scalability, wireless network connectivity,

adaptability and "context-aware" computing, information technology security and liability, and human-computer interaction"--Provided by

publisher.

Includes bibliographical references and index.

ISBN-13: 978-1-59904-832-1 (hardcover)

ISBN-13: 978-1-59904-835-2 (ebook)

1. Ubiquitous computing--Handbooks, manuals, etc. 2. Real-time data processing--Handbooks, manuals, etc. I. Mühlhäuser, Max. II.

Gurevych, Iryna.

QA76.5915.H35 2007

004--dc22

2007032050

British Cataloguing in Publication Data

A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book set is original material. The views expressed in this book are those of the authors, but not necessarily of

the publisher.

If a library purchased a print copy of this publication, please go to http://www.igi-global.com/reference/assets/IGR-eAccess-agreement.pdf

for information on activating the library's complimentary electronic access to this publication.

Editorial Advisory Board

Erwin Aitenbichler

Technische Universität Darmstadt, Germany

Hidir Aras

University of Bremen, Germany

Gerhard Austaller

Technische Universität Darmstadt, Germany

Alexander Behring

Technische Universität Darmstadt, Germany

Dirk Bradler

Technische Universität Darmstadt, Germany

Martin Faust

University of Bremen, Germany

Iryna Gurevych

Technische Universität Darmstadt, Germany

Andreas Hartl

Technische Universität Darmstadt, Germany

Melanie Hartmann

Technische Universität Darmstadt, Germany

Andreas Heinemann

Technische Universität Darmstadt, Germany

Marc Herrlich

University of Bremen, Germany

Jussi Kangasharju

Technische Universität Darmstadt, Germany

Tobias Klug

Technische Universität Darmstadt, Germany

Tobias Limberger

Technische Universität Darmstadt, Germany

Fernando Lyardet

Technische Universität Darmstadt, Germany

Max Mühlhäuser

Technische Universität Darmstadt, Germany

Christof Müller

Technische Universität Darmstadt, Germany

Daniel Oberle

SAP Research, Germany

Andreas Petter

Technische Universität Darmstadt, Germany

Robert Porzel

University of Bremen, Germany

Sebastian Ries

Technische Universität Darmstadt, Germany

Dirk Schnelle

Technische Universität Darmstadt, Germany

Daniel Schreiber

Technische Universität Darmstadt, Germany

Julian Schröder-Bernhardi

Technische Universität Darmstadt, Germany

Jürgen Steimle

Technische Universität Darmstadt, Germany

Joachim Steinmetz

Technische Universität Darmstadt, Germany

Stefan-Georg Weber

Technische Universität Darmstadt, Germany

Markus Weimar

Technische Universität Darmstadt, Germany

Torsten Zesch

Technische Universität Darmstadt, Germany

Detailed Table of Contents................................................................................................................viii

Foreword ............................................................................................................................................ xvi

Preface ................................................................................................................................................ xix

Acknowledgment ................................................................................................................................xli

Chapter I

Introduction to Ubiquitous Computing / Max Mühlhäuser and Iryna Gurevych ................................... 1

Section I

Scalability: Two Issues of Global Scale

Chapter II

Bionics: Learning from “The Born” / Tobias Limberger...................................................................... 38

Chapter III

Ubiquitous Services and Business Processes / Alistair Barros............................................................. 57

Chapter IV

Ontologies for Scalable Services-Based Ubiquitous Computing / Daniel Oberle,

Christof Bornhövd, and Michael Altenhofen ........................................................................................ 88

Chapter V

Service Discovery / Gerhard Austaller............................................................................................... 107

Table of Contents

Section II

Connectivity: Tapping into Humans and Items

Chapter VI

Wireless and Mobile Communications / Jochen H. Schiller.............................................................. 133

Chapter VII

Event-Based and Publish/Subscribe Communication / Erwin Aitenbichler....................................... 152

Chapter VIII

Peer-to-Peer Systems / Jussi Kangasharju ......................................................................................... 172

Chapter IX

Opportunistic Networks / Andreas Heinemann .................................................................................. 190

Chapter X

Smart Items in Real Time Enterprises / Zoltán Nochta ...................................................................... 211

Section III

Adaptability: What is (Not) Content?

Chapter XI

Context Models and Context Awareness / Melanie Hartmann and Gerhard Austaller...................... 235

Chapter XII

A Focus on Location Context / Erwin Aitenbichler............................................................................ 257

Chapter XIII

Adapting to the User / Matthias Jöst .................................................................................................. 282

Section IV

Liability: From IT Security to Liability

Chapter XIV

Accounting and Charging: Guarantees and Contracts / Burkhard Stiller, David Hausheer,

Jan Gerke, Peter Racz, Cristian Morariu, and Martin Waldburger................................................... 302

Chapter XV

Security for Ubiquitous Computing / Tobias Straub and Andreas Heinemann.................................. 337

Chapter XVI

Trust and Accountability / Sebastian Ries .......................................................................................... 363

Section V

Ease-of-Use: Natural and Multimodal Interaction

Chapter XVII

Mobile Speech Recognition / Dirk Schnelle....................................................................................... 397

Chapter XVIII

Mouth and Ear Interaction / Dirk Schnelle ......................................................................................... 421

Chapter XIX

Advanced Hands and Eyes Interaction / Michael Weber and Marc Hermann ................................... 445

Chapter XX

Intelligent User Interfaces for Ubiquitous Computing / Rainer Malaka ............................................ 470

Chapter XXI

Multimodal and Federated Interaction / Frankie James and Rama Gurram...................................... 487

Chapter XXII

Multimodal Software Engineering / Andreas Hartl............................................................................ 508

Chapter XXIII

Ambient Learning / Fernando Lyardet............................................................................................... 530

Section VI

Pilots and Trends at SAP Research

Chapter XXIV

CoBIs: Collaborative Business Items / Patrik Spieß and Jens Müller ............................................... 551

Chapter XXV

PROMISE: Product Lifecycle Management and Information Tracking

Using Smart Embedded Systems / Jürgen Anke, Bernhard Wolf, Gregor Hackenbroich,

Hong-Hai Do, Mario Neugebauer, and Anja Klein ............................................................................ 559

Chapter XXVI

Real-Time Location Tracking Mashup for Enterprise / Louenas Hamdi, Rama Gurram, ,

and Samir Raiyani............................................................................................................................... 567

Chapter XXVII

Towards Adaptive Security for Ubiquitous Computing Systems: MOSQUITO and Serenity / Volkmar

Lotz,

Luca Compagna, and Konrad Wrona ................................................................................................. 574

Chapter XXVIII

Multimodal Warehouse Project / Samir Raiyani and Matthias Winkler ............................................585

Chapter XXIX

Business Grids: Grid Computing for Business Applications / Wolfgang Gerteis............................... 591

About the Contributors ................................................................................................................... 601

Index................................................................................................................................................... 611

Foreword ............................................................................................................................................ xvi

Preface ................................................................................................................................................ xix

Acknowledgment ................................................................................................................................xli

Chapter I

Introduction to Ubiquitous Computing / Max Mühlhäuser and Iryna Gurevych ................................... 1

The authors briefly describe the history of ubiquitous computing. Some terms and a few important

standards are subsequently introduced. In the last part, two kinds of reference architectures for ubiquitous

computing systems are discussed by way of example.

Section I

Scalability: Two Issues of Global Scale

Chapter II

Bionics: Learning from “The Born” / Tobias Limberger...................................................................... 38

The chapter focuses on distributed approaches to address the scalability challenges in ubiquitous

computing by means of bio-analog algorithms, which draw upon the realm of biology. The author

describes the algorithms based on the phenomena found on the organism level of biological systems

and examines the algorithms imitating procedures both on the cell and the molecular levels. Bio-analog

approaches are finally extrapolated to data management as a novel field.

Chapter III

Ubiquitous Services and Business Processes / Alistair Barros............................................................. 57

The author describes service-oriented architecture (SOA) based on Web services interfaces and messaging,

and service composition through single-party process orchestration and multi-party choreography

languages. For the latter, concrete patterns are used to describe the capabilities of prospective standards.

Ways in which SOA needs to be extended to allow wider and more flexible service trading, typified in

Detailed Table of Contents

current developments through service marketplaces, are then discussed. Such extensions converge

with directions in ubiquitous computing through so-called ubiquitous service networks and service

ecosystems.

Chapter IV

Ontologies for Scalable Services-Based Ubiquitous Computing / Daniel Oberle,

Christof Bornhövd, and Michael Altenhofen ........................................................................................ 88

Ontologies are proposed to address the scalability problems in ubiquitous computing, such as: (i)

identifying relevant services for deployment, (ii) verifying a composition by a logical rule framework,

and (iii) enabling the mapping of required services to the “best” available device. The authors focus

on the ontology languages emerging from the corresponding W3C Semantic Web Activity. The pros and

cons of ontologies are contrasted at a general level and the benefits and challenges in concrete smart

items middleware are demonstrated.

Chapter V

Service Discovery / Gerhard Austaller............................................................................................... 107

The chapter briefly discusses the attributes that define SOA and the roles of the participants in a service

oriented environment. In essence, SOA permits clients in open systems to use services offered by a

service provider in the context of a workflow or complex task. Services are offered with a description at

well-known “places” (also called registries, repositories), where clients choose services according to

their needs. The chapter discusses several approaches to describing services and to searching for them.

Moreover, some well-known systems and current related research are discussed.

Section II

Connectivity: Tapping into Humans and items

Chapter VI

Wireless and Mobile Communications / Jochen H. Schiller.............................................................. 133

The chapter focuses on different wireless and mobile communication systems that form the technological

basis for ubiquitous computing applications. Depending on many parameters, such as transmission

range, desired data rates, cost, mobility, power consumption, scalability in the number of users, and

so forth, different communication systems have been developed. They are surveyed and compared and

future directions are highlighted.

Chapter VII

Event-Based and Publish/Subscribe Communication / Erwin Aitenbichler....................................... 152

The chapter introduces a taxonomy of communication models and emphasizes the event-based model and

publish-subscribe paradigm that will supersede the client-server paradigm in the ubiquitous computing

era. The relevant aspects of the publish-subscribe paradigm are introduced along with known approaches.

The inner working of distributed event-based systems is thoroughly treated.

Chapter VIII

Peer-to-Peer Systems / Jussi Kangasharju ......................................................................................... 172

Wide-spread and novel application domains for peer-to-peer technology are described; challenges for

appropriate support of the latter are pointed out. Unstructured peer-to-peer networks and their variants

are contrasted with structured ones. The suitability and open issues in the context of ubiquitous computing

are highlighted.

Chapter IX

Opportunistic Networks / Andreas Heinemann .................................................................................. 190

Opportunistic networks support an increasingly interesting class of ubiquitous computing applications,

which deliberately limit connectivity to physical proximity of users. This application class and its variants

are described and contrasted with wireless ad hoc networks and mobile peer-to-peer systems. Important

human factors are treated, in particular privacy conservation and incentive schemes. Pertinent approaches

are introduced by way of examples.

Chapter X

Smart Items in Real Time Enterprises / Zoltán Nochta ...................................................................... 211

This chapter deals with the idea of how smart items, that is, electronically labeled and augmented physical

entities, can contribute to the overall vision of the real time enterprise by utilizing different ubiquitous

computing technologies. The main components of the smart items middleware are described.

Section III

Adaptability: What is (Not) Content?

Chapter XI

Context Models and Context Awareness / Melanie Hartmann and Gerhard Austaller...................... 235

This chapter gives an overview of how knowledge of the current context, that is, information characterizing

the situation, can be represented and how this knowledge can be used for enhancing applications. The

definitions of “context” and “context-aware applications” are given. The authors present guidelines

on how to build a context-aware application and some challenges in using context information are

discussed.

Chapter XII

A Focus on Location Context / Erwin Aitenbichler............................................................................ 257

With respect to the important ubiquitous computing issue “context awareness,” location is presently

considered the most important and best supported context. Accordingly, the chapter starts with an overview

of relevant location determination technologies. A thorough treatment of the physical and mathematical

foundations of location determination follows. Both indoor and outdoor position are treated in detail.

The chapter also provides insight into a broad range of available positioning systems.

Chapter XIII

Adapting to the User / Matthias Jöst .................................................................................................. 282

Adaptation is needed to handle the increasing complexity in today’s computing environments. The chapter

focuses on the aspect of adaptation that puts the user into focus. It thus provides an important complement

to the adaptation via context-awareness that is emphasized in the ubiquitous computing community and

in the two preceding chapters. It introduces different adaptation types possible in ubiquitous computing,

like interaction, content, and presentation. Basic requirements for appropriately modelling the users

and approaches to personalize applications are presented.

Section IV

Liability: From IT Security to Liability

Chapter XIV

Accounting and Charging: Guarantees and Contracts / Burkhard Stiller, David Hausheer,

Jan Gerke, Peter Racz, Cristian Morariu, and Martin Waldburger................................................... 302

For IP-based communications, charging is used as a comprehensive term for metering or monitoring,

accounting, pricing, charge calculation, and billing. These five actions are detailed in the chapter to

provide a clear view on their interdependencies as well as their relations to distributed computing. The

legal and contractual relationships between customers and providers as well as technological choices of

protocols, mechanisms, and parameters define the area of interest here. With their background purpose

of assuring and verifying exactly the flow of service provision and service remuneration intended,

the concepts described represent an important ingredient of future liability concepts for ubiquitous

computing

Chapter XV

Security for Ubiquitous Computing / Tobias Straub and Andreas Heinemann.................................. 337

The chapter motivates the need for a dedicated treatment of security in the context of ubiquitous

computing. It systematically discusses the particular security challenges and predominant security risks

in the ubiquitous computing context. The major part of the chapter is dedicated to the description of

sample solutions in order to illustrate the wealth of protection mechanisms required – and increasingly

available. An overview of cryptographic tools is given.

Chapter XVI

Trust and Accountability / Sebastian Ries .......................................................................................... 363

The chapter focuses on the concepts of trust and accountability. The author first introduces the semantics

of both concepts and then explains why trust is relevant for ubiquitous computing and what the main

issues for dealing with trust in computer science are. Then, the chapter discusses how accountability

can be achieved in distributed systems using reputation and micropayment mechanisms.

Section V

Ease-of-Use: Natural and Multimodal Interaction

Chapter XVII

Mobile Speech Recognition / Dirk Schnelle....................................................................................... 397

This chapter is considered as a prerequisite for deeper understanding of the subsequent chapter. It gives

an overview of the main architectures to enable speech recognition on embedded devices, including

their characteristic features and properties. A description of the main challenges for the use of speech

recognition on embedded devices—and thus, in the ubiquitous computing context—is given. The author

provides a solid base for the selection of the most appropriate architecture for the business case of real

time enterprises.

Chapter XVIII

Mouth and Ear Interaction / Dirk Schnelle ......................................................................................... 421

Ubiquitous computing involves users on the move, suggesting hands-and-eyes-free operation, for which

speech is an obvious choice. The chapter gives an overview of the challenges that have to be mastered

in ubiquitous computing while working with audio, which is not easy to handle as a medium. To make

things worse, mouth and ear interaction is often performed without focusing attention on the device.

The author explains why audio-based interfaces are challenging to handle and shows how to master the

challenges and to improve the quality of applications involving mouth and ear interaction.

Chapter XIX

Advanced Hands and Eyes Interaction / Michael Weber and Marc Hermann ................................... 445

While mouth-and-ears interaction is becoming more important for ubiquitous computing, hands-and-eyes

interaction, especially in novel forms, remains essential. The chapter gives an overview of the broad

range of pertinent interaction techniques. The chapter gives a short introduction to the fundamentals

of human-computer interaction and the traditional user interfaces. It then surveys multi-scale output

devices, gives a general idea of hands and eyes input, specializes them by merging the virtual and real

world, and introduces attention and affection for enhancing the interaction with computers and especially

with disappearing computers.

Chapter XX

Intelligent User Interfaces for Ubiquitous Computing/ Rainer Malaka ............................................. 470

The chapter introduces a set of general approaches for designing user interfaces with a special focus

on the specific needs for ubiquitous computing scenarios. The author learns from good interface design

for other—classical—devices and applies many of those user interface design principles to ubiquitous

computing as well. A central aspect is the design process that helps to find the right sequence of steps

in building a good user interface.

Chapter XXI

Multimodal and Federated Interaction / Frankie James and Rama Gurram...................................... 487

The authors first introduce some of the various modalities available for human-computer interaction.

Then, they discuss how multimodality can be used both in desktop and mobile computing environments.

The goal of the chapter is to familiarize scholars and researchers with the range of topics covered under

the heading “multimodality” and suggest new areas of research around the combination of modalities,

as well as the combination of mobile and stationary computing devices to improve usability.

Chapter XXII

Multimodal Software Engineering / Andreas Hartl............................................................................ 508

Ubiquitous computing makes it necessary to supplant the desktop metaphor of graphical user interfaces

by other kinds of user interfaces for a multitude of devices and interaction modalities. The chapter

presents three different software engineering approaches that address this challenge: extensions to

Web-based approaches, abstract user interface definitions that add a level of abstraction to the user

interface definition, and model-based approaches that extend model-based application development to

integrate user interface issues as well.

Chapter XXIII

Ambient Learning / Fernando Lyardet............................................................................................... 530

Ambient learning is a new area in ubiquitous computing, dealing with the different learning processes

that occur between people and smart technology environments. The chapter provides a definition of what

ambient learning is and discusses its relevance to ubiquitous computing. It presents the learning concepts

behind ambient learning and a detailed example of training a user. The technological building blocks

behind the smart products supporting their ability to learn from each other and assemble or “compose”

their functionality are examined in detail.

Section V

Pilots and Trends at SAP Research

Chapter XXIV

CoBIs: Collaborative Business Items / Patrik Spieß and Jens Müller ............................................... 551

The chapter describes an example of ubiquitous computing technology in a corporate environment. The

goal of the pilot was reduction of the risk in handling hazardous substances by detecting potentially

dangerous storage situations and raising alarms if certain rules are violated. The lesson learnt: if

employed in a shop floor, warehouse, or retail environment, UC technology can improve real-world

business processes, making them safer and more efficient.

Chapter XXV

PROMISE: Product Lifecycle Management and Information Tracking

Using Smart Embedded Systems / Jürgen Anke, Bernhard Wolf, Gregor Hackenbroich,

Hong-Hai Do, Mario Neugebauer, and Anja Klein ............................................................................ 559

The goals and application scenarios of the PROMISE project are presented. The PROMISE project aims to

close the information loop in product lifecycle management by employing product embedded information

devices (PEIDs) in products. Special attention is given to the middleware design and implementation

well as the role of universal plug and play (UPnP) as device-level protocol.

Chapter XXVI

Real-Time Location Tracking Mashup for Enterprise / Louenas Hamdi, Rama Gurram,

and Samir Raiyani............................................................................................................................... 567

The chapter describes a new automatic vehicle location (AVL) system designed to take advantage of

technologies that are currently gaining popularity in the enterprise, namely, online maps, real time GPS

location tracking, and service-oriented architectures. The system uses a service-oriented architecture and

Ajax-style user interface technology. The authors show that for Ajax technology to be widely adopted in

the applications involving real time data updates, a server-side push mechanism is needed.

Chapter XXVII

Towards Adaptive Security for Ubiquitous Computing Systems: MOSQUITO and Serenity / Volkmar

Lotz, Luca Compagna, and Konrad Wrona ........................................................................................ 574

The authors introduce two example projects that contribute to meeting the challenges in adaptive security.

The first project focuses on an architecture that allows for adaptive security in mobile environments based

on security services whose adaptation is guided by context information derived from sensor networks.

The second project addresses engineering aspects of secure ubiquitous computing systems through

making security solutions accessible and deployable on demand and following emerging application￾level requirements.

Chapter XXVIII

Multimodal Warehouse Project / Samir Raiyani and Matthias Winkler...............................................585

The Multimodal Warehouse Project is presented, which aims at applying multimodal interaction to a

warehouse picking process. The authors provide an overview of the warehouse picking procedure as well

as the overall architecture of the multimodal picking application and technologies applied to design the

application. Then, they describe the execution of user tests of the picking application at a warehouse

and present the results of these tests.

Tải ngay đi em, còn do dự, trời tối mất!