Skip to main content

Descriptive Naming of Context Data Providers

  • Conference paper
Modeling and Using Context (CONTEXT 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3554))

Abstract

Much context data comes from mobile, transient, and unreliable sources. Such resources are best specified by descriptive names identifying what data is needed rather than which source is to provide it. The design of descriptive names has important consequences, but until now little attention has been focused on this problem. We propose a descriptive naming system for providers of context data that provides more flexibility and power than previous naming systems by classifying data providers into “provider kinds” that are organized in an evolving hierarchy of subkinds and superkinds. New provider kinds can be inserted in the hierarchy not only as subkinds, but also as superkinds, of existing provider kinds. Our names can specify arbitrary boolean combinations of arbitrary tests on data-source attributes, yielding expressive power not found in naming schemes based on attribute matching.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bowman, M., Debray, S.K., Peterson, L.L.: Reasoning about naming systems. ACM Transactions on Programming Languages and Systems 15(5), 795–825 (1993)

    Article  Google Scholar 

  2. Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, Massachusetts, August 6–11, pp. 56–67 (2000)

    Google Scholar 

  3. Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., Lilley, J.: The design and implementation of an intentional naming system. In: Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP 1999), December 12-15 (1999); Kiawah Island Resort, South Carolina, published as Operating Systems Review 33(5), pp. 186–201 (December 1999)

    Google Scholar 

  4. Olston, C., Loo, B.T., Widom, J.: Adaptive precision setting for cached approximate values. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Santa Barbara, California, May 21–24, pp. 355–366 (2001)

    Google Scholar 

  5. Cohen, N.H., Black, J., Castro, P., Ebling, M., Leiba, B., Misra, A., Segmuller, W.: Building context-aware applications with Context Weaver. IBM Research Report RC 23388, October 22 (2004)

    Google Scholar 

  6. Fallside, D.C. (ed.): XML Schema Part 0: Primer. W3C Recommendation, May 2 (2001), http://www.w3.org/TR/xmlschema-0/

  7. Boag, S., Chamberlin, D., Fernandez, M.F., Florescu, D., Robie, J., Siméon, J.: XQuery 1.0: An XML Query Language. W3C Working Draft, May 2 (2003), http://www.w3.org/TR/xquery/

  8. Wahl, M., Howes, T., Kille, S.: Lightweight Directory Access Protocol (v3). IETF RFC 2251 (December 1997), http://www.ietf.org/rfc/rfc2251.txt

  9. Guttman, E., Perkins, C., Veizades, J., Day, M.: Service Location Protocol, Version 2. IETF RFC 2608 (June 1999), http://www.ietf.org/rfc/rfc2608.txt

  10. Czerwinski, S.E., Zhao, B.Y., Hodes, T.D., Joseph, A.D., Katz, R.H.: An architecture for a secure service discovery service. In: Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 1999), Seattle, Washington, August 15–19, pp. 24–35 (1999)

    Google Scholar 

  11. Balazinska, M., Balakrishnan, H., Karger, D.: INS/Twine: a scalable peer-to-peer architecture for intentional resource discovery. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol. 2414, pp. 195–210. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Heidemann, J., Silva, F., Intanagonwiwat, C., Govindan, R., Estrin, D., Ganesan, D.: Building efficient wireless sensor networks with low-level naming. In: Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles (SOSP 2001), Banff, Alberta, October 21–24, pp. 146–159 (2001)

    Google Scholar 

  13. Sun Microsystems. Jini Technology Core Platform Specification. Version 2.0 (June 2003), http://wwws.sun.com/software/jini/specs/

  14. Bellwood, T., Clément, L., von Riegen, C. (eds.): UDDI version 3.0.1. UDDI Spec Technical Committee Specification, October 14 (2003), http://uddi.org/pubs/uddi_v3.htm

  15. McGuinness, D.L., van Harmelen, F. (eds.): OWL Web Ontology Language overview. W3C Candidate Recommendation, August 18 (2003), http://www.w3.org/TR/owl-features/

  16. Manola, F., Miller, E. (eds.): RDF Primer. W3C Working Draft, October 10 (2003), http://www.w3.org/TR/rdf-primer/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cohen, N.H., Castro, P., Misra, A. (2005). Descriptive Naming of Context Data Providers. In: Dey, A., Kokinov, B., Leake, D., Turner, R. (eds) Modeling and Using Context. CONTEXT 2005. Lecture Notes in Computer Science(), vol 3554. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11508373_9

Download citation

  • DOI: https://doi.org/10.1007/11508373_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26924-3

  • Online ISBN: 978-3-540-31890-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics