Information Agents for Mobile and Embedded Devices
- 203 Downloads
The pervasive computing environments of the near future will involve the interactions, coordination and cooperation of numerous, casually accessible, and often invisible computing devices. These devices, whether carried on our person or embedded in our homes, businesses and classrooms, will connect via wireless and wired links to one another and to the global networking infrastructure. The result will be a networking milieu with a new level of openness. The localized and dynamic nature of their interactions raises many new issues that draw on and challenge the disciplines of agents, distributed systems, and security. This paper describes recent work by the UMBC Ebiquity research groupwhic h addresses some of these issues. p ]This research was supported in part by the NIST Advanced Technology Program, DARPA contract F30602-97-1-0215, and NSF grants CCR0070802 and IIS9875433.
KeywordsService Manager Service Discovery Trust Management Communication Manager Coverage Region
Unable to display preview. Download preview PDF.
- 1.A FIPA platform for handheld and mobile devices. In Proceedings of the 2001 Workshop on Agent Theories, Architectures, and Languages, 2001.Google Scholar
- 2.G. Abowd, C. Atkeson, J. Hong, S. Long, R. Kooper, and M. Pinkerton. Cyberguide: A mobile context-aware tour guide. ACM Wireless Networks, 3:421–433.Google Scholar
- 3.Harini Bharadvaj, A. Joshi, and Sansanee Auephanwiriyakyl. An active transcoding proxy to support mobile web access. In Proc. IEEE Sumposium on Reliable Distributed Systems, October 1998.Google Scholar
- 4.Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. The role of trust management in distributed systems security. In Secure Internet Programming, pages 185–210, 1999.Google Scholar
- 6.Harry Chen, Anupam Joshi, Tim Finin, and Dipanjan Chakraborty. Dynamic service discovery for mobile computing: Intelligent agents meet jini in the aether. Baltzer Science Journal on Cluster Computing, Special Issue on Advances in Distributed and Mobile Systems and Communications, 2001.Google Scholar
- 7.R. Scott Cost, Tim Finin, Yannis Labrou, Xiaocheng Luan, Ian Soboroff Yun Peng, James Mayfield, and Akram Boughannam. An agent-based infrastructure for enterprise integration. In First International Symposium on Agent Systems and Applications, October 1999.Google Scholar
- 8.Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, and Randy H. Katz. An architecture for a secure service discovery service. In Fifth Annual International Conference on Mobile Computing and Networks (MobiCom’ 99), pages 24–35, Seattle, 1999.Google Scholar
- 9.DAML. Darpa agent markup language specification, http://www.daml.org/.
- 10.M. Dunham, P. Chrysanthis, A. Joshi, V. Kumar, K. Ramamritham, O. Wolfson, and S. Zdonik. Issues in wireless data management. Discussion of the wireless data management panel at NSF IDM PIs Meeting, March 2000.Google Scholar
- 12.Carl M. Ellison, Bill Frantz, and Brian M. Thomas. Simple public key certificate. Internet document, 1996.Google Scholar
- 13.Mike Esler, Jeffrey Hightower, Tom Anderson, and Gaetano Borriello. Next century challenges: Data-centric networking for invisible computing. In Mobile Computing and Networking, pages 256–262, 1999.Google Scholar
- 14.FIPA. FIPA 97 specification part 2: Agent communication language. Technical report, FIPA-Foundation for Intelligent Physical Agents, october 1997.Google Scholar
- 15.Internet Engineering Task Force. Public-key infrastructure (x.509), http://www.ietf.org/html.charters/pkix-charter.html.
- 16.Armando Fox, Brad Johanson, Pat Hanrahan, and Terry Winograd. Integrating information appliances into an interactive workspace. IEEE Computer Graphics and Applications, 20(3), 2000.Google Scholar
- 17.Benjamin Grosof and Yannis Labrou. An approach to using xml and a rule-based content language with an agent communication language, 1999.Google Scholar
- 18.Z. J. Has. Panel report on ad hoc networks-MILCOM’97. Mobile Computing and Communications Review, 2(1), January 1998.Google Scholar
- 19.A. Helal, M. Wang, A. Jagatheesan, and R. Krithivasan. Brokering based self-organizing e-service communities. In Fifth International Symposium on Autonomous Decentralized Systems (ISADS), Dallas, Texas, March 2001.Google Scholar
- 20.T. Hodes and R. H. Katz. A document-based framework for internet application control. In Proceedings of the Second USENIX Symposium on Internet Technologies and Systems, October 1999.Google Scholar
- 21.W. Johnston and C. Larsen. A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments. Technical Report Technical Report 3885, Lawrence Berkeley National Laboratory, 1996.Google Scholar
- 22.A. Joshi, S. Weerawarana, and E. N. Houstis. Disconnected Browsing of Distributed Information. In Proc. Seventh IEEE Intl. Workshop on Research Issues in Data Engineering, pages 101–108. IEEE, April 1997.Google Scholar
- 23.Anupam Joshi. On proxy agents, mobility and web access. ACM/Baltzer Journal of Mobile Networks and Applications, 2000. (accepted for publication, also availbe as UMBC CS TR 99-02).Google Scholar
- 24.Lalana Kagal, Tim Finin, and Yun Peng. A framework for distributed trust management. In To appear in proceedings of IJCAI-01 Workshop on Autonomy, Delegation and Control, 2001.Google Scholar
- 25.Lalana Kagal, Vlad Korolev, Harry Chen, Anupam Joshi, and Tim Finin. Centaurus: A framework for intelligent services in a mobile environment. In Proceedings of International Workshop on Smart Appliances and Wearable Computing (IWSAWC), The 21st International Conference on Distributed Computing Systems (ICDCS-21) April 16-19, 2001.Google Scholar
- 26.Lalana Kagal, Vladimir Korolev, Sasikanth Avancha, Anupam Joshi, Timothy Finin, and Yelena Yesha. A highly adaptable infrastructure for service discovery and management in ubiquitous computing. Technical Report TR CS-01-06, Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, 2001.Google Scholar
- 27.R. H. Katz, E. A. Brewer, E. Amir, H. Balakrishnan, A. Fox, S. Gribble, T. Hodes, D. Jiang, G. T. Nguyen, V. Padmanabhan, and M. Stemm. The bay area research wireless access network (barwan). In Proceedings Spring COMPCON Conference, 1996.Google Scholar
- 29.Li, Feigenbaum, and Grosof. A logic-based knowledge representation for authorization with delegation. In PCSFW: Proceedings of The 12th Computer Security Foundations Workshop. IEEE Computer Society Press, 1999.Google Scholar
- 30.M. Liljeberg, M. Kojo, and K. Raatikainen. Enhanced services for world-wide web in mobile wan environment. http://www.cs.Helsinki.FI/research/mowgli/mowglipapers.html, 1996.
- 31.D. Maltz and P. Bhagwat. Msocks: An architecture for transport layer mobility. In Proc. IEEE Infocom 98, San Francisco, pages 1037–1045, April 1998.Google Scholar
- 32.M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. IEEE Proceedings of the 17th Symposium, 1996.Google Scholar
- 33.S. Muthukrishnan, Rittwik Jana, Theodore Johnson, and Andrea Vitaletti. Location based services in a wireless wan using cellular digital packet data (cdpd). In Proceedings of the 2nd ACM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDE01), May 2001.Google Scholar
- 34.B. D. Noble, M. Satyanarayanan, D. Narayanan, J. E. Tilton, J. Flinn, and K. R.Walker. Agile application-aware adaptation for mobility. In Proceedings of the 16th ACM Symposium on Operating System Principles.Google Scholar
- 35.Bill Schilit, Norman Adams, and Roy Want. Context-aware computing applications. In IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, US, 1994.Google Scholar
- 36.Reticular Systems. The yellowstone project.Google Scholar
- 37.Mark Taylor, William Waung, and Mohsen Banan. Internetwork Mobility: The CDPD Approach. Professional Technical Reference. Prentice Hall, 1996.Google Scholar
- 38.W. J. Tolone, B. Chu, J. Long, T. Finin, and Y. Peng. Supporting human interactions within integrated manufacturing systems. International Journal of Agile Manufacturing, 1998. To appear.Google Scholar
- 39.W3C. Xml signature http://www.w3.org/signature/.
- 40.PhilipR. Zimmermann. The Official PGP Userx2019;s Guide. MIT Press, Cambridge, MA, USA, 1995.Google Scholar