您所在位置网站首页 > 海量文档  > 计算机 > 通信/网络

Context Shadow A Person-Centric Infrastructure for Context Aware Computing.pdf 10页

本文档一共被下载: ,您可全文免费在线阅读后下载本文档。

  • 支付并下载
  • 收藏该文档
  • 百度一下本文档
  • 修改文档简介


特别说明: 下载前务必先预览,自己验证一下是不是你要下载的文档。
  • 上传作者 l215322(上传创作收益人)
  • 发布时间:2017-04-06
  • 需要金币100(10金币=人民币1元)
  • 浏览人气
  • 下载次数
  • 收藏次数
  • 文件大小:251.61 KB
Context Shadow A Person-Centric Infrastructure for Context Aware Computing
Context Shadow: A Person-Centric Infrastructure for Context Aware Computing Martin Jonsson The FUSE Research Group, KTH Center for Wireless Systems, KTH DSV, Electrum 230, SE-164 40 Kista, Sweden martinj@dsv.su.se Abstract. In ubiquitous computing environments, hardware and software ser- vices will create huge and ubiquitous service spaces. These service spaces will need to be organized in meaningful ways so that the services can be easily ac- cessed and utilized by other services and humans. Context Shadow is a system that makes it possible for services to ask questions about a person’s current context, and specifically about what services that are relevant to that context. In the system, sensors and services are organized in meaningful collections, creat- ing a searchable topology of context information. 1 Introduction Providing information about the users context to applications is potentially very useful in several ways. The behavior of an application can be adapted to make the interaction more efficient or to increase the ease of use. You can also imagine entirely new types of applications that are designed specifically to make use of some certain context information. Under the notion of context aware computing there have been several attempts both to define what context really is, and how to design applications that use it [1-2]. In this paper context aware computing will be viewed from a ubiquitous- or disap- pearing computing perspective [3]. The assumption we make is that our everyday environments will become increasingly more readable and controllable. This is due to the ability to embed computers into everyday objects, and to connect them to the Internet. We also see an increasing use of personal mobile computing artifacts. These new stationary and mobile artifacts will provide different kinds of services either to a user directly or it will be accessible to other software services over the Internet. This will result in a pote


用户名: 验证码: 点击我更换图片

“原创力文档”前称为“文档投稿赚钱网”,本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有【成交的100%(原创)】。原创力文档是网络服务平台方,若您的权利被侵害,侵权客服QQ:3005833200 电话:19940600175 欢迎举报,上传者QQ群:784321556