Advertisement

Steps Towards Pervasive Software: Does Software Engineering Need Reengineering?

  • Dana Amin Al Kukhun
  • Florence Sedes

Abstract

Nowadays, the definition of service is demanding machines to turn into human beings. In order to work efficiently, machines need to analyze current situations, perceive user needs and provide users with intelligent, automatic and proactive adaptation that responds to current contexts. System performance will be guaranteed only if we add new features to its behavior, such as: self-adaptation, self-organization, self-configuring, selfhealing, self-optimizing and self-protecting. These challenging automated processes can produce proactive behavior if software engineers change the engineering logic and use the environment context as a solution instead of thinking about it as an obstacle.

Keywords

Pervasive systems ubiquitous computing software engineering adaptation context-awareness 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

8 References

  1. [1]
    Al Kukhun D and Sedes F, “A Taxonomy for Evaluating Pervasive Computing Environments”, MAPS 2006, IEEE Conference on Pervasive Services, 2006, pp 29–34.Google Scholar
  2. [2]
    Almenárez F, Marín A, Campo C and García C, “TrustAC: Trust-Based Access Control for Pervasive Devices”. In The 2nd International Conference on Security in Pervasive Computing, Germany, 2005, pp 225–238.Google Scholar
  3. [3]
    Campbel R, Al-Muhtadi J, Naldurg P, Sampemane G and Mickunas MD, “Towards Security and Privacy for Pervasive Computing”. Software Security, 2002 p 1–15.Google Scholar
  4. [4]
    Chen E, Zhang D, Shi Y and Xu G, “Seamless Mobile Service for Pervasive Multimedia”. In PCM’04, IEEE, 2004, p 194–198.Google Scholar
  5. [5]
    Chung ES, Hong JI, Lin J, Prabaker MK, Landay, JA and Liu AL, “Development and evaluation of emerging design patterns for ubiquitous computing”. In 2004 conference on Designing interactive systems, USA, p 233–242.Google Scholar
  6. [6]
    Davis J, Tierney A and Chang E, “A User-Adaptable User Interface Model to Support Ubiquitous User Access to EIS Style Applications”. COMPSAC’05, IEEE, p 351–358Google Scholar
  7. [7]
    Duan Y and Canny J, “Protecting User Data in Ubiquitous Computing: Towards trustworthy environments”. In PET 2004, Springer, p 167–185.Google Scholar
  8. [8]
    Graham L, “The principles of Interactive design”, Delmar Publishing, 1999.Google Scholar
  9. [9]
    Gschwind T, Jazayeri M and Oberleitner J, “Pervasive Challenges for Software Components”. In RISSE 2002, Springer, p 152–166.Google Scholar
  10. [10]
    Munoz J, Pelechano V, “Building a Software Factory for Pervasive Systems Development”. Advanced Information Systems Engineering, Springer 2005, p 342–356Google Scholar
  11. [11]
    Niemela E and Latvakoski J, “Survey of Requirements and Solutions for Ubiquitous Software”. 3rd International Conference Mobile and Ubiquitous Multimedia, pp 71–78.Google Scholar
  12. [12]
    OASIS, “A brief Introduction to XACML”, 2003, access on 4/2007, available at www.oasis-open.org/committees/download.php/2713/Brief_Introduction_to_XACMLGoogle Scholar
  13. [13]
    Park I, Kim W and Park Y, “A Ubiquitous Streaming Framework for Multimedia Broadcasting Service with QoS based mobility Support”. In Information Networking, Springer, 2004, p 65–74.Google Scholar
  14. [14]
    Want R, Pering T, Borriello G and Farkas K, “Disappearing hardware”. In Pervasive Computing, 2002, IEEE, p 36–47.Google Scholar
  15. [15]
    Want R, Pering T, “System challenges for ubiquitous & pervasive computing”, Software Engineering Conference, 2005, p 9–14.Google Scholar
  16. [16]
    Weiser M, “The computer for the 21st century”, ACM SIGMOBILE Mobile Computing and Communications Review, 1999, p 3–11.Google Scholar
  17. [17]
    Yang H, Jansen E and Helal S. “A Comparison of Two Programming Models for Pervasive Computing”. In SAINT 2006, IEEE, p134–137.Google Scholar
  18. [18]
    Zimmermann A, Lorenz A and Specht M, “Applications of a Context-Management System”, In Modelling and Using Context, Springer, 2005, p 556–569.Google Scholar

Copyright information

© Springer-Verlag London Limited 2007

Authors and Affiliations

  • Dana Amin Al Kukhun
    • 1
  • Florence Sedes
    • 1
  1. 1.IRITPaul Sabatier UniversityToulouseFrance

Personalised recommendations