Steps Towards Pervasive Software: Does Software Engineering Need Reengineering?
Nowadays, the definition of service is demanding machines to turn into human beings. In order to work efficiently, machines need to analyze current situations, perceive user needs and provide users with intelligent, automatic and proactive adaptation that responds to current contexts. System performance will be guaranteed only if we add new features to its behavior, such as: self-adaptation, self-organization, self-configuring, selfhealing, self-optimizing and self-protecting. These challenging automated processes can produce proactive behavior if software engineers change the engineering logic and use the environment context as a solution instead of thinking about it as an obstacle.
KeywordsPervasive systems ubiquitous computing software engineering adaptation context-awareness
Unable to display preview. Download preview PDF.
- Al Kukhun D and Sedes F, “A Taxonomy for Evaluating Pervasive Computing Environments”, MAPS 2006, IEEE Conference on Pervasive Services, 2006, pp 29–34.Google Scholar
- Almenárez F, Marín A, Campo C and García C, “TrustAC: Trust-Based Access Control for Pervasive Devices”. In The 2nd International Conference on Security in Pervasive Computing, Germany, 2005, pp 225–238.Google Scholar
- Campbel R, Al-Muhtadi J, Naldurg P, Sampemane G and Mickunas MD, “Towards Security and Privacy for Pervasive Computing”. Software Security, 2002 p 1–15.Google Scholar
- Chen E, Zhang D, Shi Y and Xu G, “Seamless Mobile Service for Pervasive Multimedia”. In PCM’04, IEEE, 2004, p 194–198.Google Scholar
- Chung ES, Hong JI, Lin J, Prabaker MK, Landay, JA and Liu AL, “Development and evaluation of emerging design patterns for ubiquitous computing”. In 2004 conference on Designing interactive systems, USA, p 233–242.Google Scholar
- Davis J, Tierney A and Chang E, “A User-Adaptable User Interface Model to Support Ubiquitous User Access to EIS Style Applications”. COMPSAC’05, IEEE, p 351–358Google Scholar
- Duan Y and Canny J, “Protecting User Data in Ubiquitous Computing: Towards trustworthy environments”. In PET 2004, Springer, p 167–185.Google Scholar
- Graham L, “The principles of Interactive design”, Delmar Publishing, 1999.Google Scholar
- Gschwind T, Jazayeri M and Oberleitner J, “Pervasive Challenges for Software Components”. In RISSE 2002, Springer, p 152–166.Google Scholar
- Munoz J, Pelechano V, “Building a Software Factory for Pervasive Systems Development”. Advanced Information Systems Engineering, Springer 2005, p 342–356Google Scholar
- Niemela E and Latvakoski J, “Survey of Requirements and Solutions for Ubiquitous Software”. 3rd International Conference Mobile and Ubiquitous Multimedia, pp 71–78.Google Scholar
- OASIS, “A brief Introduction to XACML”, 2003, access on 4/2007, available at www.oasis-open.org/committees/download.php/2713/Brief_Introduction_to_XACMLGoogle Scholar
- Park I, Kim W and Park Y, “A Ubiquitous Streaming Framework for Multimedia Broadcasting Service with QoS based mobility Support”. In Information Networking, Springer, 2004, p 65–74.Google Scholar
- Want R, Pering T, Borriello G and Farkas K, “Disappearing hardware”. In Pervasive Computing, 2002, IEEE, p 36–47.Google Scholar
- Want R, Pering T, “System challenges for ubiquitous & pervasive computing”, Software Engineering Conference, 2005, p 9–14.Google Scholar
- Weiser M, “The computer for the 21st century”, ACM SIGMOBILE Mobile Computing and Communications Review, 1999, p 3–11.Google Scholar
- Yang H, Jansen E and Helal S. “A Comparison of Two Programming Models for Pervasive Computing”. In SAINT 2006, IEEE, p134–137.Google Scholar
- Zimmermann A, Lorenz A and Specht M, “Applications of a Context-Management System”, In Modelling and Using Context, Springer, 2005, p 556–569.Google Scholar