Architecturing Conflict Handling of Pervasive Computing Resources

  • Henner Jakob
  • Charles Consel
  • Nicolas Loriant
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6723)

Abstract

Pervasive computing environments are created to support human activities in different domains (e.g., home automation and healthcare). To do so, applications orchestrate deployed services and devices. In a realistic setting, applications are bound to conflict in their usage of shared resources, e.g., controlling doors for security and fire evacuation purposes. These conflicts can have critical effects on the physical world, putting people and assets at risk.

This paper presents a domain-specific approach to architecturing conflict handling of pervasive computing resources. This approach covers the software development lifecycle and consists of enriching the description of a pervasive computing system with declarations for resource handling. These declarations are used to automate conflict detection, manage the states of a pervasive computing system, and orchestrate resource accesses accordingly at runtime. In effect, our approach separates the application logic from resource conflict handling. Our approach has been implemented and validated on various building automation applications.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bruneau, J., Jouve, W., Consel, C.: DiaSim, a parameterized simulator for pervasive computing applications. In: International Conference on Mobile and Ubiquitous Systems (2009)Google Scholar
  2. 2.
    Calder, M., Miller, A.: Feature interaction detection by pairwise analysis of LTL properties - A case study. Formal Methods in System Design 28(3), 213–261 (2006)CrossRefMATHGoogle Scholar
  3. 3.
    Cassou, D., Balland, E., Consel, C., Lawall, J.: Architecture-driven programming for sense/compute/control applications. In: International Conference on Systems, Programming, Languages, and Applications: Software for Humanity (2010)Google Scholar
  4. 4.
    Cassou, D., Balland, E., Consel, C., Lawall, J.: Leveraging software architectures to guide and verify the development of sense/compute/control applications. In: International Conference on Software Engineering (2011)Google Scholar
  5. 5.
    Cassou, D., Bertran, B., Loriant, N., Consel, C.: A generative programming approach to developing pervasive computing systems. In: International Conference on Generative Programming and Component Engineering (2009)Google Scholar
  6. 6.
    Dey, A.K., Abowd, G.D., Salber, D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. H.-C. I. 16(2), 97–166 (2001)Google Scholar
  7. 7.
    Gatti, S., Balland, E., Consel, C.: A step-wise approach for integrating qoS throughout software development. In: Giannakopoulou, D., Orejas, F. (eds.) FASE 2011. LNCS, vol. 6603, pp. 217–231. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  8. 8.
    Gupta, S.K.S., Mukherjee, T., Venkatasubramanian, K.: Criticality aware access control model for pervasive applications. In: International Conference on Pervasive Computing and Communications (2006)Google Scholar
  9. 9.
    Haya, P.A., Montoro, G., Esquivel, A., Garíca-Herranz, M., Alamán, X.: A mechanism for solving conflicts in ambient intelligent environments. J. UCS 12(3), 284–296 (2006)Google Scholar
  10. 10.
    Keck, D.O., Kuehn, P.J.: The feature and service interaction problem in telecommunications systems: A survey. IEEE Transactions on Software Engineering 24, 779–796 (1998)CrossRefGoogle Scholar
  11. 11.
    Retkowitz, D., Kulle, S.: Dependency management in smart homes. In: Senivongse, T., Oliveira, R. (eds.) DAIS 2009. LNCS, vol. 5523, pp. 143–156. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  12. 12.
    Sampemane, G.: Access Control For Active Spaces. PhD thesis, University of Illinois (2005)Google Scholar
  13. 13.
    Shin, C., Dey, A.K., Woo, W.: Mixed-initiative conflict resolution for context-aware applications. In: International Conference on Ubiquitous Computing, pp. 262–271 (2008)Google Scholar
  14. 14.
    Tolone, W., Ahn, G.-J., Pai, T., Hong, S.-P.: Access control in collaborative systems. ACM Computing Surveys 37, 29–41 (2005)CrossRefGoogle Scholar
  15. 15.
    Tuttlies, V., Schiele, G., Becker, C.: Comity - conflict avoidance in pervasive computing environments. In: International Workshop on Pervasive Systems (2007)Google Scholar
  16. 16.
    Weiser, M.: The computer for the twenty-first century. Scientific American 265, 94–104 (1991)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Henner Jakob
    • 1
  • Charles Consel
    • 1
  • Nicolas Loriant
    • 2
  1. 1.INRIA Sud-OuestBordeauxFrance
  2. 2.Imperial CollegeLondonUK

Personalised recommendations