Mobile Networks and Applications

, Volume 19, Issue 2, pp 210–211 | Cite as

Context-Aware Systems and Applications


1 Foreword

This special issue, with five papers extended from selected contributions to The 1st International Conference on Context-Aware Systems and Applications (ICCASA 2012) held in Ho Chi Minh City of Vietnam, will serve as a reference material for researchers, scientists, professionals and students in computer science and computer engineering as well as developers and practitioners in computing and networking systems design by providing them with state-of-the-art research findings and future opportunities and trends. These papers include some recent advances in context-awareness reflected in this special issue. In particular, the special issue covers various aspects of context-awareness as follows:

Paper 1 by Kaiyu Wan and Vangalur Alagar provides the current state of the art of Cyber-Physical Systems (CPS) security, identifies the issues surrounding secure control, and investigates the extent to which context information may be used to improve security and survivability of CPS.

Paper 2 by Phan Cong Vinh presents agent-based ubiquitous computing (AUC), a form of distributed computing, by which computational processes are executed concurrently by assigning each computational process to one of agents on a ubiquitous computing system (UCS). The overarching goal of AUC is to support the seamless integration of information and services. To this end, taking advantage of the categorical structures, this paper develops a firm formal approach to formalize the AUC for information and service integration.

Paper 3 by Angelo Furno and Eugenio Zimeo proposes a design approach based on a semantic model for context representation. It is an extension of the OWL-S ontology aimed at enriching the expressiveness of each section of a typical OWL-S semantic service description, by means of context conditions and adaptation rules. By having access to continuously updated context information, these descriptions can be exploited by a discovery/composition tool to automatically find the atomic or composite services that can be better-tuned to the requestor’s behaviors and to the particular situations of the surrounding environment.

Paper 4 by Nguyen Thanh Tung proposes two methods to optimize the lifetime of chain-based protocols using Integer Linear Programming (ILP) formulations. Also, a method to determine the bounds of the lifetime for any energy-efficient routing protocol is presented. Furthermore, previous researches assume that the base station position is randomly placed without optimization. In this paper, a non-convex optimization model is developed for solving the base station location optimization problem.

Paper 5 by Areerat Songwattana, Thanaruk Theeramunkong and Phan Cong Vinh presents a so-called Learning Based Replacement (LBR) algorithm, a hybrid approach towards an efficient replacement model for web caching by incorporating a machine learning technique (naive Bayes) into the Least Recently Used (LRU) replacement method to improve prediction of possibility that an existing page will be revised by a succeeding request, from access history in a web log.

We owe our deepest gratitude to Dr. Nguyen Manh Hung—Chairman and Rector of Nguyen Tat Thanh University in Vietnam for his useful support, especially to all the authors for their valuable contribution to this special issue and their great efforts, and also to the referees for ensuring the high quality of the material presented here. All of them are extremely professional and cooperative. We wish to express our thanks to the Editor-in-Chief, Prof. Imrich Chlamtac, for his important assistance with the process of assembling the special issue.

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Lero at University of LimerickLimerickIreland
  2. 2.University of British ColumbiaVancouverCanada

Personalised recommendations