Information Agents for Mobile and Embedded Devices

  • Tim Finin
  • Anupam Joshi
  • Lalana Kagal
  • Olga Ratsimore
  • Vlad Korolev
  • Harry Chen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2182)


The pervasive computing environments of the near future will involve the interactions, coordination and cooperation of numerous, casually accessible, and often invisible computing devices. These devices, whether carried on our person or embedded in our homes, businesses and classrooms, will connect via wireless and wired links to one another and to the global networking infrastructure. The result will be a networking milieu with a new level of openness. The localized and dynamic nature of their interactions raises many new issues that draw on and challenge the disciplines of agents, distributed systems, and security. This paper describes recent work by the UMBC Ebiquity research groupwhic h addresses some of these issues. p ]This research was supported in part by the NIST Advanced Technology Program, DARPA contract F30602-97-1-0215, and NSF grants CCR0070802 and IIS9875433.


Service Manager Service Discovery Trust Management Communication Manager Coverage Region 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    A FIPA platform for handheld and mobile devices. In Proceedings of the 2001 Workshop on Agent Theories, Architectures, and Languages, 2001.Google Scholar
  2. 2.
    G. Abowd, C. Atkeson, J. Hong, S. Long, R. Kooper, and M. Pinkerton. Cyberguide: A mobile context-aware tour guide. ACM Wireless Networks, 3:421–433.Google Scholar
  3. 3.
    Harini Bharadvaj, A. Joshi, and Sansanee Auephanwiriyakyl. An active transcoding proxy to support mobile web access. In Proc. IEEE Sumposium on Reliable Distributed Systems, October 1998.Google Scholar
  4. 4.
    Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. The role of trust management in distributed systems security. In Secure Internet Programming, pages 185–210, 1999.Google Scholar
  5. 5.
    E.A. Brewer, R.H. Katz, Y. Chawathe, A. Fox, S.D. Gribble, T. Hodes, G. Nguyen, T. Henderson, E. Amir, H. Balakrishnan, A. Fox, V. Padmanabhan, and S. Seshan. A network architecture for heterogeneous mobile computing. IEEE Personal Communications Magazine, 5(5):8–24, 1998.CrossRefGoogle Scholar
  6. 6.
    Harry Chen, Anupam Joshi, Tim Finin, and Dipanjan Chakraborty. Dynamic service discovery for mobile computing: Intelligent agents meet jini in the aether. Baltzer Science Journal on Cluster Computing, Special Issue on Advances in Distributed and Mobile Systems and Communications, 2001.Google Scholar
  7. 7.
    R. Scott Cost, Tim Finin, Yannis Labrou, Xiaocheng Luan, Ian Soboroff Yun Peng, James Mayfield, and Akram Boughannam. An agent-based infrastructure for enterprise integration. In First International Symposium on Agent Systems and Applications, October 1999.Google Scholar
  8. 8.
    Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, and Randy H. Katz. An architecture for a secure service discovery service. In Fifth Annual International Conference on Mobile Computing and Networks (MobiCom’ 99), pages 24–35, Seattle, 1999.Google Scholar
  9. 9.
    DAML. Darpa agent markup language specification,
  10. 10.
    M. Dunham, P. Chrysanthis, A. Joshi, V. Kumar, K. Ramamritham, O. Wolfson, and S. Zdonik. Issues in wireless data management. Discussion of the wireless data management panel at NSF IDM PIs Meeting, March 2000.Google Scholar
  11. 11.
    M. Dunham, A. Helal, and S. Balakrishnan. A mobile transaction model that captures both the data and movement behavior. ACM/Baltzer Journal of Mobile Networks and Applications, 2(2):149–162, 1997.CrossRefGoogle Scholar
  12. 12.
    Carl M. Ellison, Bill Frantz, and Brian M. Thomas. Simple public key certificate. Internet document, 1996.Google Scholar
  13. 13.
    Mike Esler, Jeffrey Hightower, Tom Anderson, and Gaetano Borriello. Next century challenges: Data-centric networking for invisible computing. In Mobile Computing and Networking, pages 256–262, 1999.Google Scholar
  14. 14.
    FIPA. FIPA 97 specification part 2: Agent communication language. Technical report, FIPA-Foundation for Intelligent Physical Agents, october 1997.Google Scholar
  15. 15.
    Internet Engineering Task Force. Public-key infrastructure (x.509),
  16. 16.
    Armando Fox, Brad Johanson, Pat Hanrahan, and Terry Winograd. Integrating information appliances into an interactive workspace. IEEE Computer Graphics and Applications, 20(3), 2000.Google Scholar
  17. 17.
    Benjamin Grosof and Yannis Labrou. An approach to using xml and a rule-based content language with an agent communication language, 1999.Google Scholar
  18. 18.
    Z. J. Has. Panel report on ad hoc networks-MILCOM’97. Mobile Computing and Communications Review, 2(1), January 1998.Google Scholar
  19. 19.
    A. Helal, M. Wang, A. Jagatheesan, and R. Krithivasan. Brokering based self-organizing e-service communities. In Fifth International Symposium on Autonomous Decentralized Systems (ISADS), Dallas, Texas, March 2001.Google Scholar
  20. 20.
    T. Hodes and R. H. Katz. A document-based framework for internet application control. In Proceedings of the Second USENIX Symposium on Internet Technologies and Systems, October 1999.Google Scholar
  21. 21.
    W. Johnston and C. Larsen. A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments. Technical Report Technical Report 3885, Lawrence Berkeley National Laboratory, 1996.Google Scholar
  22. 22.
    A. Joshi, S. Weerawarana, and E. N. Houstis. Disconnected Browsing of Distributed Information. In Proc. Seventh IEEE Intl. Workshop on Research Issues in Data Engineering, pages 101–108. IEEE, April 1997.Google Scholar
  23. 23.
    Anupam Joshi. On proxy agents, mobility and web access. ACM/Baltzer Journal of Mobile Networks and Applications, 2000. (accepted for publication, also availbe as UMBC CS TR 99-02).Google Scholar
  24. 24.
    Lalana Kagal, Tim Finin, and Yun Peng. A framework for distributed trust management. In To appear in proceedings of IJCAI-01 Workshop on Autonomy, Delegation and Control, 2001.Google Scholar
  25. 25.
    Lalana Kagal, Vlad Korolev, Harry Chen, Anupam Joshi, and Tim Finin. Centaurus: A framework for intelligent services in a mobile environment. In Proceedings of International Workshop on Smart Appliances and Wearable Computing (IWSAWC), The 21st International Conference on Distributed Computing Systems (ICDCS-21) April 16-19, 2001.Google Scholar
  26. 26.
    Lalana Kagal, Vladimir Korolev, Sasikanth Avancha, Anupam Joshi, Timothy Finin, and Yelena Yesha. A highly adaptable infrastructure for service discovery and management in ubiquitous computing. Technical Report TR CS-01-06, Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, 2001.Google Scholar
  27. 27.
    R. H. Katz, E. A. Brewer, E. Amir, H. Balakrishnan, A. Fox, S. Gribble, T. Hodes, D. Jiang, G. T. Nguyen, V. Padmanabhan, and M. Stemm. The bay area research wireless access network (barwan). In Proceedings Spring COMPCON Conference, 1996.Google Scholar
  28. 28.
    Yannis Labrou, Tim Finin, and Yun Peng. Agent communication languages: The current landscape. IEEE Intelligent Systems, 14(2):45–52, / 1999.CrossRefGoogle Scholar
  29. 29.
    Li, Feigenbaum, and Grosof. A logic-based knowledge representation for authorization with delegation. In PCSFW: Proceedings of The 12th Computer Security Foundations Workshop. IEEE Computer Society Press, 1999.Google Scholar
  30. 30.
    M. Liljeberg, M. Kojo, and K. Raatikainen. Enhanced services for world-wide web in mobile wan environment. http://www.cs.Helsinki.FI/research/mowgli/mowglipapers.html, 1996.
  31. 31.
    D. Maltz and P. Bhagwat. Msocks: An architecture for transport layer mobility. In Proc. IEEE Infocom 98, San Francisco, pages 1037–1045, April 1998.Google Scholar
  32. 32.
    M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. IEEE Proceedings of the 17th Symposium, 1996.Google Scholar
  33. 33.
    S. Muthukrishnan, Rittwik Jana, Theodore Johnson, and Andrea Vitaletti. Location based services in a wireless wan using cellular digital packet data (cdpd). In Proceedings of the 2nd ACM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDE01), May 2001.Google Scholar
  34. 34.
    B. D. Noble, M. Satyanarayanan, D. Narayanan, J. E. Tilton, J. Flinn, and K. R.Walker. Agile application-aware adaptation for mobility. In Proceedings of the 16th ACM Symposium on Operating System Principles.Google Scholar
  35. 35.
    Bill Schilit, Norman Adams, and Roy Want. Context-aware computing applications. In IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, US, 1994.Google Scholar
  36. 36.
    Reticular Systems. The yellowstone project.Google Scholar
  37. 37.
    Mark Taylor, William Waung, and Mohsen Banan. Internetwork Mobility: The CDPD Approach. Professional Technical Reference. Prentice Hall, 1996.Google Scholar
  38. 38.
    W. J. Tolone, B. Chu, J. Long, T. Finin, and Y. Peng. Supporting human interactions within integrated manufacturing systems. International Journal of Agile Manufacturing, 1998. To appear.Google Scholar
  39. 39.
    W3C. Xml signature
  40. 40.
    PhilipR. Zimmermann. The Official PGP Userx2019;s Guide. MIT Press, Cambridge, MA, USA, 1995.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Tim Finin
    • 1
  • Anupam Joshi
    • 1
  • Lalana Kagal
    • 1
  • Olga Ratsimore
    • 1
  • Vlad Korolev
    • 1
  • Harry Chen
    • 1
  1. 1.University of Maryland Baltimore CountyBaltimoreUSA

Personalised recommendations