Middleware for Distributed Context-Aware Systems

  • Karen Henricksen
  • Jadwiga Indulska
  • Ted McFadden
  • Sasitharan Balasubramaniam
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3760)

Abstract

Context-aware systems represent extremely complex and heterogeneous distributed systems, composed of sensors, actuators, application components, and a variety of context processing components that manage the flow of context information between the sensors/actuators and applications. The need for middleware to seamlessly bind these components together is well recognised. Numerous attempts to build middleware or infrastructure for context-aware systems have been made, but these have provided only partial solutions; for instance, most have not adequately addressed issues such as mobility, fault tolerance or privacy. One of the goals of this paper is to provide an analysis of the requirements of a middleware for context-aware systems, drawing from both traditional distributed system goals and our experiences with developing context-aware applications. The paper also provides a critical review of several middleware solutions, followed by a comprehensive discussion of our own PACE middleware. Finally, it provides a comparison of our solution with the previous work, highlighting both the advantages of our middleware and important topics for future research.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dey, A.K., Salber, D., Abowd, G.D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human-Computer Interaction 16, 97–166 (2001)CrossRefGoogle Scholar
  2. 2.
    Newberger, A., Dey, A.: Designer support for context monitoring and control. Technical Report IRB-TR-03-017, Intel Research Berkeley (2003)Google Scholar
  3. 3.
    Chen, G., Li, M., Kotz, D.: Design and implementation of a large-scale context fusion network. In: 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous), pp. 246–255. IEEE Computer Society Press, Los Alamitos (2004)CrossRefGoogle Scholar
  4. 4.
    Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys), Boston (2004)Google Scholar
  5. 5.
    Román, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R.H., Nahrstedt, K.: Gaia: A middleware infrastructure for active spaces. IEEE Pervasive Computing, Special Issue on Wearable Computing 1, 74–83 (2002)Google Scholar
  6. 6.
    Al-Muhtadi, J., Chetan, S., Ranganathan, A., Campbell, R.: Super spaces: A middleware for large-scale pervasive computing environments. In: Proceedings of Workshop on Middleware Support for Pervasive Computing (PerWare), PerCom 2004 Workshop, Orlando, March 2004, pp. 198–202 (2004)Google Scholar
  7. 7.
    Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: A context-aware security scheme for smart spaces. In: 1st IEEE International Conference on Pervasive Computing and Communications (PerCom), Fort Worth, pp. 489–496 (2003)Google Scholar
  8. 8.
    Yau, S.S., Huang, D., Gong, H., Seth, S.: Development and runtime support for situation-aware application software in ubiquitous computing environments. In: 28th Annual International Computer Software and Application Conference (COMPSAC), Hong Kong, pp. 452–457 (2004)Google Scholar
  9. 9.
    Henricksen, K., Indulska, J.: A software engineering framework for context-aware pervasive computing. In: 2nd IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 77–86. IEEE Computer Society Press, Los Alamitos (2004)Google Scholar
  10. 10.
    Indulska, J., Henricksen, K., McFadden, T., Mascaro, P.: Towards a common context model for virtual community applications. In: 2nd International Conference on Smart Homes and Health Telematics (ICOST). Assistive Technology Research Series, vol. 14, pp. 154–161. IOS Press, Amsterdam (2004)Google Scholar
  11. 11.
    Segall, B., Arnold, D., Boot, J., Henderson, M., Phelps, T.: Content based routing with Elvin4. In: AUUG2K Conference, Canberra (2000)Google Scholar
  12. 12.
    McFadden, T., Henricksen, K., Indulska, J., Mascaro, P.: Applying a disciplined approach to the development of a context-aware communication application. In: 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2005, pp. 300–306. IEEE Computer Society Press, Los Alamitos (2005)CrossRefGoogle Scholar
  13. 13.
    Navas, J.C., Imielinski, T.: Geographic addressing and routing. In: 3rd ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), Budapest (1997)Google Scholar
  14. 14.
    McFadden, T., Henricksen, K., Indulska, J.: Automating context-aware application development. In: UbiComp 1st International Workshop on Advanced Context Modelling, Reasoning and Management, Nottingham, pp. 90–95 (2004)Google Scholar
  15. 15.
    Henricksen, K., Wishart, R., McFadden, T., Indulska, J.: Extending context models for privacy in pervasive computing environments. In: 2nd International Workshop on Context Modelling and Reasoning (CoMoRea), PerCom 2005 Workshop Proceedings, pp. 20–24. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  16. 16.
    Wishart, R., Henricksen, K., Indulska, J.: Context obfuscation for privacy via ontological descriptions. In: Strang, T., Linnhoff-Popien, C. (eds.) LoCA 2005. LNCS, vol. 3479, pp. 276–288. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Karen Henricksen
    • 1
  • Jadwiga Indulska
    • 2
  • Ted McFadden
    • 1
  • Sasitharan Balasubramaniam
    • 2
  1. 1.CRC for Enterprise Distributed Systems Technology (DSTC) 
  2. 2.School of Information Technology and Electrical EngineeringThe University of Queensland 

Personalised recommendations