Keywords

Service Discovery Overlay Network Pervasive Computing Service Description Service Broker 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Zhu, F., Mutka, M., and Ni, L., “Classification of Service Discovery in Pervasive Computing Environments,” MSU-CSE-02–24, Michigan State University, East Lansing, 2002.Google Scholar
  2. [2]
    Alex, H., Kumar, M., and Shirazi, B., “Service Discovery in Wireless and Mobile Networks,” Wireless Information Highways, Idea Group Publication, December 2004.Google Scholar
  3. [3]
    Marin-Perianu, R., Hartel, P., and Scholten, H., “A Classification of Service Discovery Protocols,” Technical report TR-CTIT-05-25, Centre for Telematics and Information Technology, University of Twente, The Netherlands, June 2005.Google Scholar
  4. [4]
    Kozat, U. C. and Tassiulas, L., “Network Layer Support for Service Discovery in Mobile Ad Hoc Networks,” IEEE INFOCOM 2003, San Francisco, USA, 2003.Google Scholar
  5. [5]
    Ahmed, R., Boutaba, R., Cuervo, F., Iraqi, Y., Li, D. T., Limam, N., Xiao, J., and Ziembicki, J., “Service Discovery Protocols: A Comparative Study,” IFIP/IEEE International Symposium on Integrated Network Management (IM’2005) Application Sessions, Nice, France, 2005.Google Scholar
  6. [6]
    Bromberg, Y. -D. and Issarny, V., “Service Discovery Protocol Interoperability in the Mobile Environment,” International Workshop Software Engineering and Middleware (SEM), September 2004.Google Scholar
  7. [7]
    Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., and Lilley, J., “The Design and Implementation of an Intentional Naming System,” Symposium on Operating Systems Principles, Charleston, SC, December 1999.Google Scholar
  8. [8]
    Sundramoorthy, V., Scholten, J., Jansen, P. G., and Hartel, P. H., “Service Discovery at Home,” 4th International Conference on Information, Communications & Signal Processing and 4th IEEE Pacific-Rim Conference on Multimedia (ICICS/PCM), IEEE Computer Society Press, December 2003.Google Scholar
  9. [9]
    Cheng, L. and Marsic, I., “Service Discovery and Invocation for Mobile Ad Hoc Networked Appliances,” 2nd International Workshop on Networked Appliances (IWNA 2000), New Brunswick, New Jersey, USA, November 30–December 1, 2000.Google Scholar
  10. [10]
    Microsoft Corporation, White Paper: Understanding Universal Plug and Play, June 2000. http://www.upnp.org/resources/UpnPbkgnd.htm
  11. [11]
    Klein, M., Konig-Ries, B., and Obreiter, P., “Service rings — a semantic overlay for service discovery in ad hoc networks,” DEXA Workshops, 2003.Google Scholar
  12. [12]
    Klein, M., Konig-Ries, B., and Obreiter, P., “Lanes — A Lightweight Overlay for Service Discovery in Mobile Ad Hoc Networks,” Technical Report 2003-6, University of Karlsruhe, 2003.Google Scholar
  13. [13]
    Varshavsky, A., Reid, B., and de Lara, E., “The Need for Cross-Layer Service Discovery in MANETs,” Submitted for conference publication, January 2004. Available at: http://www.cs.toronto.edu/~delara/papers/crosslayer.pdf
  14. [14]
    Gao, J. and Steenkiste, P., “Rendezvous Points-Based Scalable Content Discovery with Load Balancing,” Fourth International Workshop on Networked Group Communication (NGC’02), Boston, MA, October 2002.Google Scholar
  15. [15]
    Lee, C. and Helal, S., “A Multi-Tier Ubiquitous Service Discovery Protocol for Mobile Clients,” 2003 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2003), Canada, 2003.Google Scholar
  16. [16]
    Zhu, F., Mutka, M., and Ni, L., “Facilitating Secure Ad hoc Service Discovery in Public Environments,” 2003 IEEE Computer Software and Applications Conference (Compsac 2003), Dallas, Texas, USA, November 2003.Google Scholar
  17. [17]
    Yuan, Y. and Agrawala, A., “A Secure Service Discovery Protocol for MANET,” Computer Science Technical Report CS-TR-4498 and UMIACS Technical Report UMIACS-TR-4498, Computer Science Department, University of Maryland, 2003.Google Scholar
  18. [18]
    Handorean, R. and Roman, G. -C., “Secure Service Provision in Ad Hoc Networks,” The First International Conference on Service Oriented Computing, Trento, Italy, December 2003.Google Scholar
  19. [19]
    Almenarez, F. and Campo, C., “SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks,” EUNICE 2003, Budapest, Hungary, September 2003.Google Scholar
  20. [20]
    Balazinska, M., Balakrishnan, H., and Karger, D., “INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery,” International Conference on Pervasive Computing 2002, August 2002.Google Scholar
  21. [21]
    Salutation Consortium, Salutation Architecture Specification Version 2.1, Part 1, 1999.Google Scholar
  22. [22]
    Guttman, E., Perkins, C., Veizades, J., and Day, M., “Service Location Protocol, Version 2,” RFC 2608, IETF, June 1999.Google Scholar
  23. [23]
    Hodes, T. D., Czerwinski, S. E., Zhao, B. Y., Joseph, A. D., and Randy H. Katz, “An Architecture for Secure Wide-Area Service Discovery,” Wireless Networks, 8(2/3):213–230, 2002.CrossRefMATHGoogle Scholar
  24. [24]
    Sun Microsystems. Jini architecture specification version 2.0, June 2003.Google Scholar
  25. [25]
    Zhu, F., Mutka, M., and Ni, L., “Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services”, in First IEEE International Conference on Pervasive Computing and Communications (Percom’03), Dallas-Fort Worth, Texas, USA, March 2003.Google Scholar
  26. [26]
    Zhu, F., Mutka, M., and Ni, L., “Facilitating Secure Ad hoc Service Discovery in Public Environments,” 2003 IEEE Computer Software and Applications Conference (Compsac 2003), Dallas, Texas, USA, November 2003.Google Scholar
  27. [27]
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D., “SPINS: Security Protocols for Sensor Networks,” ACM Mobile Computing and Networking, Rome, Italy, 2001.Google Scholar
  28. [28]
    Kozat, U. C. and Tassiulas, L., “Service Discovery in Mobile Ad Hoc Networks: An Overall Perspective on Architectural Choices and Network Layer Support Issues,” Ad Hoc Networks Journal, 2(1): 23–44, Elsevier, June 2003.CrossRefGoogle Scholar
  29. [29]
    Jacobsson, M., Hoebeke, J., Heemstra de Groot, S., Lo, A., Moerman, I., Niemegeers, I., Munoz, L., Alutoin, M., Louati, W., and Zeghlache, D., “A Network Architecture for Personal Networks,” IST Summit 2005, Dresden, Germany, 2005.Google Scholar
  30. [30]
    Engelstad, P. E., Zheng, Y., Koodli, R., and Perkins, C. E., “Service Discovery Architecture for On-Demand Ad Hoc Networks,” International Journal of Ad Hoc and Sensor Networks, Old City Publishing (OCP Science), 1 (3), March 2005, pp. 27–58.Google Scholar
  31. [31]
    My personal Adaptive Global NET, MAGNET (IST-507102), http://www.ist-magnet.org
  32. [32]
    Helal, S., Desai, N., Verma, V., and Lee, C., “Konark — A Service Discovery and Delivery Protocol for Ad-Hoc Networks,” 3rd IEEE Conference on Wireless Communication Networks (WCNC), New Orleans, Louisiana, March, 2003.Google Scholar
  33. [33]
    Nidd, M., “Service Discovery in DEAPspace,” IEEE Personal Communications Magazine, 8(4): 39–45, August 2001.CrossRefGoogle Scholar
  34. [34]
    Wu, J. and Zitterbart, M., “Service Awareness in Mobile Ad Hoc Networks,” 11th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN), Boulder, Colorado, USA, March 2001.Google Scholar
  35. [35]
    Chakraborty, D., Joshi, A., Finin, T., and Yesha, Y., “GSD: A Novel Group-Based Service Discovery Protocol for MANETs,” 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002.Google Scholar
  36. [36]
    Lee, C. and Helal, S., “A Multi-Tier Ubiquitous Service Discovery Protocol for Mobile Clients,” 2003 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2003), Canada, 2003.Google Scholar
  37. [37]
    Ratnasamy, S., Francis, P., Handley, M., Karp, R. M., and Schenker, S., “A Scalable Content-Addressable Network,” Technical Report TR-00-010, University of California, Berkeley, Berkeley, CA, August 2001.Google Scholar
  38. [38]
    Stoica, I., Morris, R., Karger, D. R., Frans Kaashoek, M., and Balakrishnan, H., “Chord: A Scalable Peer-to-Peer Lookup Service for internet applications,” 2001 ACM SIGCOMM Conference, August 2001.Google Scholar
  39. [39]
    Rowstron, A. and Druschel, P., “Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems,” Lecture Notes in Computer Science, 2218: 329–350, November 2001.CrossRefGoogle Scholar
  40. [40]
    Zhao, B. Y., Kubiatowicz, J. D., and Joseph, A. D., “Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing,” Technical Report UCB/CSD-01-1141, UC Berkeley, April 2001.Google Scholar
  41. [41]
    Traversat, B., Abdelaziz, M., and Pouyoul, E., “A Loosely-Consistent DHT Rendezvous Walker,” White Paper, May 2003. Available at: http://www.jxta.org/docs/jxta-dht.pdf
  42. [42]
    Ahmed, R., Boutaba, R., Cuervo, F., Iraqi, Y., Li, D. T., Limam, N., Xiao, J., and Ziembicki, J., “Service Discovery Protocols: A Comparative Study,” IFIP/IEEE International Symposium on Integrated Network Management (IM’2005) Application Sessions, Nice, France, 2005.Google Scholar
  43. [43]
    Gnutella. The gnutella home page: http://gnutella.wego.com/, 2002.
  44. [44]
    Napster. Napster home page. http://www.napster.com/, 2001.
  45. [45]
    Clarke, I., Sandberg, O., Wiley, B., and Hong, T. W., “Freenet: A Distributed Anonymous Information Storage and Retrieval System,” ICSI Workshop on Design Issues in Anonymity and Unobservability, San Diego, CA, USA, July 2000.Google Scholar
  46. [46]
    Rowstron, A. and Druschel, P., “Pastry: Scalable, Decentralized Object Location and Routing for Largescale Peer-to-Peer Systems,” IFIP/ACM International Conference on Distributed Systems Platforms, November 2001.Google Scholar
  47. [47]
    Zhao, B. Y., Kubiatowicz, J. D., and Joseph, A. D., “Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing,” Technical Report UCB/CSD-01-1141, U. C. Berkeley, April 2001.Google Scholar
  48. [48]
    Gedik, B. and Liu, L., “PeerCQ: A Decentralized and Self-Configuring Peer-to-Peer Information Monitoring System,” 23rd International Conference on Distributed Computing Systems, Providence, Rhode Island, USA, 2003.Google Scholar
  49. [49]
    Xiong, L. and Liu, L., “A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities,” 4th ACM conference on Electronic commerce, San Diego, California, USA, 2003.Google Scholar
  50. [50]
    Nakauchi, K., Morikawa, H., and Aoyama, T., “Design and Implementation of a Semantic Peer-to-Peer Network,” 7th IEEE International Conference on High Speed Networks and Multimedia Communications, Toulouse, France, 2004.Google Scholar
  51. [51]
    Dyrna, M., “Peer2peer Network Service Discovery for Ad hoc Networks,” Seminar on Ad Hoc Networking — Technical University of Munich, 2003/2004.Google Scholar
  52. [52]
    Zahn, T., Winter, R., and Schiller, J., Vladimir A., “Simple, Efficient Peer-to-Peer Overlay Clustering in Mobile, Ad-Hoc Networks,” IEEE International Conference on Networks (ICON 2004), Singapore, November 2004.Google Scholar
  53. [53]
    Kapur, A., Gautam, N., Brooks, R., and Rai, S., “Performance and Design of P2P Networks for Efficient File Sharing,” Industrial Engineering Research Conference, Portland, USA, 2003.Google Scholar
  54. [54]
    Kapur, A., Gautam, N., Brooks, R., and Rai, S., “Design, Performance and Dependability of a Peer-to-Peer Network supporting QoS for Mobile Code Application,” Tenth International Conference on Telecommunications Systems, Modeling and Analysis, Monterey, Califonia, USA, October 2002.Google Scholar
  55. [55]
    Xiong, L. and Liu, L., “A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities,” 4th ACM conference on Electronic commerce, San Diego, California, USA, 2003.Google Scholar
  56. [56]
    Zhou, D., “Semantic Clustering for Peer to Peer Network,” Colloqium Report CSE 590, The Pennsylvania State University, September 2004.Google Scholar
  57. [57]
    Ramaswamy, L., Gedik, B., and Liu, L., “A Distributed Approach to Node Clustering in Decentralized Peer-to-Peer Networks,” Accepted for publication in IEEE Transactions on Parallel and Distributed Systems (TPDS), 16(9), September 2005.Google Scholar
  58. [58]
    Castro, M., Costa, M., and Rowstron, A., “Performance and Dependability of Structured Peer-to-Peer Overlays,” International Conference on Dependable Systems and Networks (DSN’04), Florence, Italy, 2004.Google Scholar
  59. [59]
    Lawrence, J., “LEAP for Ad-hoc Networks,” Workshop on Agents in Ubiquitous and Wearable Computing AAMAS 2002, Bologna, Italy, 2002.Google Scholar
  60. [60]
    Pirker, M., Berger, M., and Watzke, M., “An Approach for FIPA Agent Service Discovery in Mobile Ad Hoc Environments,” Workshop on Agents for Ubiquitous Computing, Columbia University, USA, July 2004.Google Scholar
  61. [61]
    Farkas, K., Ruf, L., May, M., and Plattner, B., “Framework for Service Provisioning in Mobile Ad Hoc Networks,” First International Conference on Telecommunications and Computer Networks, San Sebastian, Spain, December 2004.Google Scholar
  62. [62]
    Olesen, H. Jiang, B., Thongthammachart, S., and Butkus, A., “User-Centric Factors of Context Aware Services,” Workshop on “My personal Adaptive Global NET: Visions and beyond” IST-FP6-IP MAGNET, Shanghai, China, November 2004.Google Scholar
  63. [63]
    Khedr, M. and Karmouch, A., “Context Based Service Discovery Protocol,” 21th Biennial Symposium on Communications, Kingston, Ontario, Canada, June 2002.Google Scholar
  64. [64]
    Murakami, H., Olsen, R. L., Schwefel, H. -P., and Prasad, R., “User-Centric Name Services for Personal Networks,” 7th International Symposium on Wireless Personal Multimedia Communications — WPMC 2004, Abano Terme, Italy, September 2004.Google Scholar
  65. [65]
    Lee, C. and Helal, S., “Context Attributes: An Approach to Enable Context-Awareness for Service Discovery,” 2003 ACM Symposium on Applications and the Internet, 2003.Google Scholar
  66. [66]
    Riva, O., Nadeem, T., Borcea, C., and Iftode, L., “Mobile Services: Context-Aware Service Migration in Ad Hoc Networks,” Submitted for publication, Available at: http://www.cs.rutgers.edu/~iftode/mobservice.pdf
  67. [67]
    Mostefaoui, S. K. and Mostefaoui, G. K., “Towards a Contextualisation of Service Discovery and Composition for Pervasive Environments,” Workshop on Web Services and Agent-based Engineering AAMAS’2003, Melbourne, Australia, July 2003.Google Scholar
  68. [68]
    Chen, G. and Kotz, D., “Context-Sensitive Resource Discovery,” First IEEE International Conference on Pervasive Computing and Communications, March 2003.Google Scholar
  69. [69]
    Tchakarov, J. B. and Vaidya, N. H., “Efficient Content Location in Mobile Ad Hoc Networks,” IEEE International Conference on Mobile Data Management (MDM), January 2004.Google Scholar
  70. [70]
    Atanasovski, V. and Gavrilovska, L., “Efficient Service Discovery Schemes in Wireless Ad Hoc Networks Implementing Cross-Layer System Design,” 27th International Conference on Information Technology Interfaces ITI 2005, Cavtat, Croatia, June 2005, pp. 527–532.Google Scholar
  71. [71]
    Atanasovski, V. and Gavrilovska, L., “Cross-Layer Optimizations in Wireless Ad-Hoc Networks,” Poster Presentation at the 12th IEEE International Conference on Network Protocols — ICNP 2004, Berlin, Germany, October 2004.Google Scholar
  72. [72]
    Atanasovski, V. and Gavrilovska, L., “Routing Assisted Efficient Service Discovery in Ad-Hoc Networks,” in Proceedings of the 7th International Symposium on Wireless Personal Multimedia CommunicationsWPMC 2004, Abano Terme, Italy, September 2004, pp. 491–495.Google Scholar
  73. [73]
    Ververidis, C. N. and Polyzos, G. C., “Routing Layer Support for Service Discovery in Mobile Ad Hoc Networks,” Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW’05), 2005.Google Scholar
  74. [74]
    Oh, C. -S., Ko, Y. -B., and Roh, Y. -S., “An Integrated Approach for Efficient Routing and Service Discovery in Mobile Ad Hoc Networks,” CCNC 2005, Las Vegas, USA, January 2005.Google Scholar
  75. [75]
    Koponen, T. and Virtanen, T., “A Service Discovery: A Service Broker Approach,” 37th Hawaii International Conference on System Sciences, 2004.Google Scholar
  76. [76]
    Integrated NetwOrks for seaMless And transparent service Discovery, NOMAD (IST-2001–33292), http://www.ist-nomad.net/index.php
  77. [77]
    Klein, M. and Konig-Ries, B., “Multi-Layer Clusters in Ad-Hoc Networks — An Approach to Service Discovery,” International Workshop on Peer-to-Peer Computing, Pisa, Italy, May 2002.Google Scholar
  78. [78]
    Ubiquitous Networks with a Secure Provision of Services, Access, and Content Delivery, UBISEC (IST- 506926), http://jerry.c-lab.de/ubisec/
  79. [79]
    Atanasovski, V. and Gavrilovska, L., “Providing Efficient Service Discovery in Wireless Personal and Ad Hoc Networks,” TELFOR2005, Belgrade, Serbia and Montenegro, November 2005.Google Scholar
  80. [80]
    Detken, K. -O., Fikouras, I., and Phillipopoulos, P., “Service Discovery Integrated Network Platform,” Interworking 2002, October 2002.Google Scholar
  81. [81]
    Blange., M. J., Karkowski, I. P., and Vermeulen, B. C. B., “Service Discovery in Heterogeneous Wireless Networks,” International Workshop on Wireless Ad-Hoc Networks, Oulu, Finland, 2004.Google Scholar
  82. [82]
    Bodanese, E., Gavrilovska, L., Rakocevic, V., and Stewart, R., “Eliminating the Communication Black Spots in Future Disaster Recovery Networks,” 8th International Symposium on Wireless Personal Multimedia CommunicationsWPMC 2005, Aalborg, Denmark, September 2005, pp. 1930–1934.Google Scholar
  83. [83]
    Munoz, M. and Rubio, C. G., “A New Model for Service and Application Convergence in B3G/4G Networks,” IEEE Wireless Communications Magazine, October 2004, pp. 6–12.Google Scholar

Copyright information

© Springer 2006

Personalised recommendations