The Journal of Supercomputing

, Volume 64, Issue 2, pp 256–273 | Cite as

Decentralized checking of context inconsistency in pervasive computing environments

Article

Abstract

Contexts are often inconsistent in pervasive computing environments, owing to many heterogeneous devices with limited processing capabilities, imperfect measurement techniques, and user movement. A variety of schemes have been proposed to check context inconsistency. However, they implicitly require central control. This requirement inhibits their effectiveness in some pervasive computing environments (e.g., transport systems) where all nodes are resource-constrained and cannot act as a centralized node. To this end, we propose in this paper DCCI—a scheme of Decentralized Checking of Context Inconsistency in pervasive computing environments. DCCI exploits a simple, yet efficient, preference-based locality that denotes nodes requiring that the same context can check the inconsistency on this type of contexts. According to this locality, DCCI constructs a preference-based shortcut structure such that it checks context inconsistency within the shortcut structure. Extensive experiments show that DCCI can accurately and efficiently check context inconsistency in the presence of node churns and heterogeneity.

Keywords

Context awareness Context inconsistency Pervasive computing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Baldauf M, Dustdar S, Rosenberg F (2007) A survey on context-aware systems. Int J Ad Hoc Ubiq Comput 2(4):263–277 CrossRefGoogle Scholar
  2. 2.
    Bikakis A, Antoniou F (2008a) Distributed reasoning with conflicts in a multi-context framework. In: Fox D, Gomes CP (eds) Proceedings of the 23rd AAAI conference on artificial intelligence (AAAI ’08), pp 1778–1779 Google Scholar
  3. 3.
    Bikakis A, Antoniou G (2008b) Local and distributed defeasible reasoning in multi-context systems. In: Proceedings of the international RuleML symposium on rule interchange and applications (RuleML ’08). Springer, Berlin, pp 135–149 Google Scholar
  4. 4.
    Bradley NA, Dunlop MD (2009) Toward a multidisciplinary model of context to support context-aware computing. Hum-Comput Interact 20(4):403–446 CrossRefGoogle Scholar
  5. 5.
    Bu Y, Chen S, Tao X, Li J, Lu J (2006a) Context consistency management using ontology based model. In: International conference on extending database technology, pp 741–755 Google Scholar
  6. 6.
    Bu Y, Gu T, Tao X, Li J, Chen S, Lu J (2006b) Managing quality of context in pervasive computing. In: Proceedings of the 6th international conference on quality software (QSIC ’06), pp 193–200 Google Scholar
  7. 7.
    Capra L, Emmerich W, Mascolo C (2003) Carisma: Context-aware reflective middleware system for mobile applications. IEEE Trans Softw Eng 29(10):929–945 CrossRefGoogle Scholar
  8. 8.
    Dey AK, Abowd GD, Salber D (2001) A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Int J Hum-Comput Interact 16(2):97–166 CrossRefGoogle Scholar
  9. 9.
    Elnahrawy E, Nath B (2003) Cleaning and querying noisy sensors. In: Proceedings of the 2nd ACM international conference on wireless sensor networks and applications (WSNA ’03), pp 78–87 CrossRefGoogle Scholar
  10. 10.
    Erramilli V, Crovella M, Chaintreau A, Diot C (2008) Delegation forwarding. In: Proceedings of the 9th ACM international symposium on mobile ad hoc networking and computing (MobiHoc ’08). ACM, New York, pp 251–260 CrossRefGoogle Scholar
  11. 11.
    Garlan D, Siewiorek DP, Steenkiste P (2002) Project aura: toward distraction-free pervasive computing. IEEE Pervasive Comput 1:22–31 CrossRefGoogle Scholar
  12. 12.
    Harter A, Hopper A, Steggles P, Ward A, Webster P (1999) The anatomy of a context-aware application. In: Proceedings of the 5th annual ACM/IEEE international conference on mobile computing and networking (MobiCom ’99), pp 59–68 CrossRefGoogle Scholar
  13. 13.
    Huang Y, Ma X, Cao J, Tao X, Lu J (2009) Concurrent event detection for asynchronous consistency checking of pervasive context. In: Proceedings of the 7th annual IEEE international conference on pervasive computing and communications (Percom ’09), pp 131–139 Google Scholar
  14. 14.
  15. 15.
    Jeffery SR, Garofalakis M, Franklin MJ (2006) Adaptive cleaning for RFID data streams. In: Proceedings of the 32nd international conference on very large data bases (VLDB ’06), pp 163–174 Google Scholar
  16. 16.
    Julien C, Roman GC (2006) Egospaces: facilitating rapid development of context-aware mobile applications. IEEE Trans Softw Eng 32(5):281–298 CrossRefGoogle Scholar
  17. 17.
    Kabadayi S, Julien C, O’Brien W, Stovall D (2007) Virtual sensors: a demonstration. In: The 26th international conference on computer communications: demonstrations track (Infocom), pp 10–12 Google Scholar
  18. 18.
    Liu K, Chen L, Liu Y, Li M (2008) Robust and efficient aggregate query processing in wireless sensor networks. Mob Netw Appl 13(1–2):212–227 CrossRefGoogle Scholar
  19. 19.
    Lu H, Chan W, Tse T (2008) Testing pervasive software in the presence of context inconsistency resolution services. In: Proceedings of the 30th international conference on software engineering (ICSE ’08), New York, NY, USA, pp 61–70 Google Scholar
  20. 20.
    Park I, Lee D Hyun S (2005) A dynamic context-conflict management scheme for group-aware ubiquitous computing environments. In: Proceedings of the 29th annual international computer software and applications conference (COMPSAC ’05), vol 1 Google Scholar
  21. 21.
    Pu C, Schwan K, Walpole J (2001) Infosphere project: system support for information flow applications. SIGMOD Rec 30:25–34 CrossRefGoogle Scholar
  22. 22.
    Ranganathan A, Campbell RH (2003) An infrastructure for context-awareness based on first order logic. Pers Ubiquitous Comput 7(6):353–364 CrossRefGoogle Scholar
  23. 23.
    Ranganathan A, Campbell R, Ravi A, Mahajan A (2002) Conchat: a context-aware chat program. IEEE Pervasive Comput 1(3):51–57 CrossRefGoogle Scholar
  24. 24.
    Ratnasamy S, Francis P, Handley M, Karp R, Schenker S (2001) A scalable content-addressable network. In: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM ’01), New York, NY, USA, pp 161–172 CrossRefGoogle Scholar
  25. 25.
    Román M, Hess C, Cerqueira R, Ranganathan A, Campbell RH, Nahrstedt K (2002) A middleware infrastructure for active spaces. IEEE Pervasive Comput 1(4):74–83 CrossRefGoogle Scholar
  26. 26.
    Satoh I (2009) A context-aware service framework for large-scale ambient computing environments. In: Proceedings of the 2009 international conference on pervasive services (ICPS ’09), New York, NY, USA, pp 199–208 CrossRefGoogle Scholar
  27. 27.
    Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for Internet applications. In: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM ’01), New York, NY, USA, pp 149–160 CrossRefGoogle Scholar
  28. 28.
    Strang T, Popien C (2004) A context modeling survey. In: Proc of the workshop on advanced context modelling, reasoning and management Google Scholar
  29. 29.
    Weiser M (1991) The computer for the 21st century. Sci Am 265:66–75 CrossRefGoogle Scholar
  30. 30.
    Xu C, Cheung SC (2005) Inconsistency detection and resolution for context-aware middleware support. In: Proceedings of the 10th European software engineering conference held jointly with the 13th ACM SIGSOFT international symposium on foundations of software engineering (SIGSOFT ’05), pp 336–345 Google Scholar
  31. 31.
    Xu C, Cheung SC, Chan WK (2006) Incremental consistency checking for pervasive context. In: Proceedings of the 28th international conference on software engineering (ICSE ’06), pp 292–301 Google Scholar
  32. 32.
    Xu C, Cheung SC, Chan WK, Ye C (2008) Heuristics-based strategies for resolving context inconsistencies in pervasive computing applications. In: Proceedings of the 28th IEEE international conference on distributed computing systems (ICDCS ’08), pp 713–721 Google Scholar
  33. 33.
    Xue W, Pung H, Palmes PP, Gu T (2008) Schema matching for context-aware computing. In: Proceedings of the 11th international conference on ubiquitous computing (Ubicomp ’08), pp 292–301 CrossRefGoogle Scholar
  34. 34.
    Yau SS, Karim F (2004) An adaptive middleware for context-sensitive communications for real-time applications in ubiquitous computing environments. Real-Time Syst 26(1):29–61 MATHCrossRefGoogle Scholar
  35. 35.
    Zhang D, Cao J, Zhou J, Guo M (2009) Extended Dempster–Shafer theory in context reasoning for ubiquitous computing environments. In: Proceedings of the 7th IEEE/IFIP international conference on embedded and ubiquitous computing, pp 205–212 Google Scholar
  36. 36.
    Zhang D, Guo M, Zhou J, Kang D, Cao J (2010) Context reasoning using extended evidence theory in pervasive computing environments. Future Gener Comput Syst 26(2):207–216 CrossRefGoogle Scholar
  37. 37.
    Zhang D, Zhou J, Guo M, Cao J, Li T (2011) Tasa: tag-free activity sensing using rfid tag arrays. IEEE Trans Parallel Distrib Syst 22:558–570 CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Daqiang Zhang
    • 1
    • 2
  • Min Chen
    • 3
  • Hongyu Huang
    • 4
  • Minyi Guo
    • 5
  1. 1.School of Computer ScienceNanjing Normal UniversityNanjingChina
  2. 2.Jiangsu Research Center of Information Security & Confidential EngineeringNanjingChina
  3. 3.School of Computer Science and EngineeringSeoul National UniversitySeoulRepublic of Korea
  4. 4.College of Computer ScienceChongqing UniversityChongqingChina
  5. 5.School of Computer ScienceShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations