To see the other types of publications on this topic, follow the link: Pervasive computing.

Dissertations / Theses on the topic 'Pervasive computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Pervasive computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Long, Nguyen Hoang. "Authentication protocols in pervasive computing." Thesis, University of Oxford, 2009. https://ora.ox.ac.uk/objects/uuid:d21c0ce6-5dd6-43ef-b6c6-01346d02031b.

Full text
Abstract:
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably identity theft, and creates new requirements for secure communication. A recently proposed approach to creating secure communication is to use human trust and human interactions. These approaches potentially eliminate the need for passwords as in Bluetooth, shared secrets or trusted parties, which are often too complex and expensive to use in portable devices. In this new technology, handheld devices exchange data (e.g. payment, heart rates or public keys) over some medium (e.g. WiFi) and then displ
APA, Harvard, Vancouver, ISO, and other styles
2

Abukmail, Ahmed Ahed. "Pervasive computing approach to energy management." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0013060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Malik, Yasir. "Towards Evaluation of Pervasive Computing System." Thèse, Université de Sherbrooke, 2014. http://hdl.handle.net/11143/6020.

Full text
Abstract:
Résumé : L’informatique diffuse est le passage du paradigme informatique vers l’informatique partout. L’émergence couvre principalement l’informatique mobile et distribuée, les réseaux de capteurs, l’interaction homme-machine et l’intelligence artificielle sous l’égide de l’informatique diffuse. Des efforts considérables ont été mis sur les recherches dans ce domaine, mais il n’existe pas de normes ou des méthodologies communément acceptées pour évaluer ces systèmes et de définir des nouvelles orientations de recherche dans le futur. Cette thèse s’attaque au problème d’évaluation des systèmes
APA, Harvard, Vancouver, ISO, and other styles
4

Thompson, Michael Stewart. "Service Discovery in Pervasive Computing Environments." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/29133.

Full text
Abstract:
Service discovery is a driving force in realizing pervasive computing. It provides a way for users and services to locate and interact with other services in a pervasive computing environment. Unfortunately, current service discovery solutions do not capture the effects of the human or physical world and do not deal well with diverse device populations; both of which are characteristics of pervasive computing environments. This research concentrates on the examination and fulfillment of the goals of two of the four components of service discovery, service description and dissemination. It
APA, Harvard, Vancouver, ISO, and other styles
5

Schiele, Gregor Alexander. "System support for spontaneous pervasive computing environments." kostenfrei, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?idn=985989661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nigam, Atish 1981. "Analytical techniques for debugging pervasive computing environments." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17962.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.<br>Includes bibliographical references (p. 63-65).<br>User level debugging of pervasive environments is important as it provides the ability to observe changes that occur in a pervasive environment and fix problems that result from these changes, especially since pervasive environments may from time to time exhibit unexpected behavior. Simple keepalive messages can not always uncover the source of this behavior because systems can be in an incorrect state while continuing to out
APA, Harvard, Vancouver, ISO, and other styles
7

O'Keeffe, Daniel Brendan. "Distributed complex event detection for pervasive computing." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Millard, Ian C. "Contextually aware pervasive computing : a semantic approach." Thesis, University of Southampton, 2008. https://eprints.soton.ac.uk/266002/.

Full text
Abstract:
We live in a world which is becoming increasingly rich in technology, with a wide array of portable and embedded devices being readily available and surrounding us in everyday use. Similarly, advances in communications technologies and the explosive growth of data being published on the Internet have provided access to information on an unparalleled scale. However, device interoperability is often poor at best, and accessing data which is relevant to any given situation can be difficult due to the sheer quantity of information which is available. A contextually aware environment is envisioned
APA, Harvard, Vancouver, ISO, and other styles
9

Schiele, Gregor. "System support for spontaneous pervasive computing environments." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-32709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kostakos, Vassilis. "A design framework for pervasive computing systems." Thesis, University of Bath, 2004. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.409882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Grimm, Robert. "System support for pervasive applications /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zeidler, Andreas. "A Distributed Publish/Subscribe Notification Service for Pervasive Environments." Phd thesis, [S.l.] : [s.n.], 2005. http://elib.tu-darmstadt.de/diss/000519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Quintela, Daniel H. "Pervasive sensing and computing for natural disaster mitigation." [Tampa, Fla.] : University of South Florida, 2005. http://purl.fcla.edu/fcla/etd/SFE0001160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dragovic, Boris. "CASPEr : containment-aware security for pervasive computing environments." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.614043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Thompson, Mark Kenneth. "Hypermedia link service architectures for pervasive computing environments." Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bevan, Christopher. "Human to computer trust in urban pervasive computing." Thesis, University of Bath, 2011. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541528.

Full text
Abstract:
How people come to trust computing technology is an important factor in the degree to which they come to accept the services that such technologies are able to provide. This is particularly important where the usage of a technology might risk compromising a person’s private information, making them vulnerable to technologically mediated attack. Research into interpersonal trust development between people has allowed designers of systems deployed using technologies such as the World Wide Web to successfully modulate a number of human interpersonal trust cues into the computer-mediated communica
APA, Harvard, Vancouver, ISO, and other styles
17

Nogueras, Jorge Rafael 1976. "A stream redirection architecture for pervasive computing environments." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86718.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.<br>Includes bibliographical references (p. 69-70).<br>by Jorge Rafael Nogueras.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
18

Pham, Hubert. "A distributed object framework for pervasive computing applications." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33330.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.<br>Includes bibliographical references (p. 79-81).<br>This thesis presents a new architectural abstraction for developing dynamic and adaptive software. Separating application logic from implementation mechanism provides developers with a simple API for constructing new application functionality by connecting together a set of generic, distributed software modules. Developers codify adaptive application structure and logic in a simple, synchronous environment, and use the API to
APA, Harvard, Vancouver, ISO, and other styles
19

Michalakis, Nikolaos 1978. "Location-aware access control for pervasive computing environments." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29698.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.<br>Includes bibliographical references (p. 69-73).<br>In pervasive computing environments certain applications are interested in a user's location in order to provide a service. Such applications would benefit from an architecture that enables users to prove their location prior to requesting a service. We present PA C, an architecture for location-aware access control in pervasive computing environments, where users authenticate their location in order to gain access to resource
APA, Harvard, Vancouver, ISO, and other styles
20

Tseng, Erick N. (Erick Neal) 1979. "Personal health benefits of pervasive computing and feedback." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86732.

Full text
Abstract:
Thesis (M.Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.<br>Includes bibliographical references (leaves 227-230).<br>by Erick N. Tseng.<br>M.Eng.and S.B.
APA, Harvard, Vancouver, ISO, and other styles
21

Covington, Michael J. "A flexible security architecture for pervasive computing environments." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-06072004-131113/unrestricted/covington%5Fmichael%5Fj%5F200405%5Fphd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Nguyen, Tammy. "Context-aware access control in pervasive computing environments." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Thesis/Summer2005/t%5Fnguyen%5F061005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Sheng, Bo. "Building efficient wireless infrastructures for pervasive computing environments." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623557.

Full text
Abstract:
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but networked with each other through wireless channels so that people can easily control and access them. In the architecture of pervasive computing systems, these small and networked computing devices form a wireless infrastructure layer to support various f
APA, Harvard, Vancouver, ISO, and other styles
24

Hu, Haoyu, and 胡昊宇. "ContextTorrent: a context provisioning framewrok for pervasive applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47028488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gauger, Matthias. "Integration of wireless sensor networks in pervasive computing scenarios." Berlin Logos-Verl, 2010. http://d-nb.info/1002361559/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kong, Choi-yu. "Effective partial ontology mapping in a pervasive computing environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B32002737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Adhikari, Sameer. "Programming Idioms and Runtime Mechanisms for Distributed Pervasive Computing." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/4820.

Full text
Abstract:
The emergence of pervasive computing power and networking infrastructure is enabling new applications. Still, many milestones need to be reached before pervasive computing becomes an integral part of our lives. An important missing piece is the middleware that allows developers to easily create interesting pervasive computing applications. This dissertation explores the middleware needs of distributed pervasive applications. The main contributions of this thesis are the design, implementation, and evaluation of tw
APA, Harvard, Vancouver, ISO, and other styles
28

周彧 and Yuk Chow. "A light-weight mobile code system for pervasive computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kong, Choi-yu, and 江采如. "Effective partial ontology mapping in a pervasive computing environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B32002737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Alsiyami, Aeshah Abdulkarim Dammad. "A policy language definition for provenance in pervasive computing." Thesis, University of Sussex, 2012. http://sro.sussex.ac.uk/id/eprint/39401/.

Full text
Abstract:
Recent advances in computing technology have led to the paradigm of pervasive computing, which provides a means of simplifying daily life by integrating information processing into the everyday physical world. Pervasive computing draws its power from knowing the surroundings and creates an environment which combines computing and communication capabilities. Sensors that provide high-resolution spatial and instant measurement are most commonly used for forecasting, monitoring and real-time environmental modelling. Sensor data generated by a sensor network depends on several influences, such as
APA, Harvard, Vancouver, ISO, and other styles
31

Leon, Orlando (Orlando Wing) 1979. "An extensible communication-oriented routing environment for pervasive computing." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/16848.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.<br>Includes bibliographical references (p. 59-60).<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>The realm of pervasive computing is expanding at a fast pace, and the need for more generalized protocols and systems is in high demand. Bluetooth is a technology with great potential, but it runs over specific protocols standardized only for other Bluetooth devices. This limits
APA, Harvard, Vancouver, ISO, and other styles
32

Carboni, Davide. "Services in pervasive computing environments : from design to delivery." Thèse, Université de Sherbrooke, 2005. http://savoirs.usherbrooke.ca/handle/11143/5047.

Full text
Abstract:
The work presented in this thesis is based on the assumption that modern computer technologies are already potentially pervasive: CPUs are embedded in any sort of device; RAM and storage memory of a modern PDA is comparable to those of a ten years ago Unix workstation; Wi-Fi, GPRS, UMTS are leveraging the development of the wireless Internet. Nevertheless, computing is not pervasive because we do not have a clear conceptual model of the pervasive computer and we have not tools, methodologies, and middleware to write and to seamlessly deliver at once services over a multitude of heterogeneous d
APA, Harvard, Vancouver, ISO, and other styles
33

Xu, Chang. "Inconsistency detection and resolution for context-aware pervasive computing /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20XU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Xu, Fengyuan. "Improving Energy Efficiency and Security for Pervasive Computing Systems." W&M ScholarWorks, 2013. https://scholarworks.wm.edu/etd/1539623629.

Full text
Abstract:
Pervasive computing systems are comprised of various personal mobile devices connected by the wireless networks. Pervasive computing systems have gained soaring popularity because of the rapid proliferation of the personal mobile devices. The number of personal mobile devices increased steeply over years and will surpass world population by 2016.;However, the fast development of pervasive computing systems is facing two critical issues, energy efficiency and security assurance. Power consumption of personal mobile devices keeps increasing while the battery capacity has been hardly improved ove
APA, Harvard, Vancouver, ISO, and other styles
35

Arabi, Agha Ihab. "Distributed and adaptive approaches for ubiquitous and pervasive computing." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCA025.

Full text
Abstract:
Le paradigme d'émergence spontanée de services (Spontaneous Emergence Paradigm, SEP) pour la mise en œuvre de l’informatique omniprésente ou diffuse (pervasive computing), consiste à fournir des services aux utilisateurs en fonction de leur environnement ad hoc. Ce paradigme a prouvé son efficacité et son adéquation aux applications distribuées sensibles au contexte. Ce travail se concentre sur deux aspects liés à la mise en œuvre des services SEP. Le premier se distingue de ce qui est proposé dans la littérature, par une approche physiologique de « Dead Reckoning » (Physiological Pedestrian D
APA, Harvard, Vancouver, ISO, and other styles
36

Gassen, Jonas Bulegon. "UMA METODOLOGIA PARA O USO DE ONTOLOGIAS APLICADAS À DESCRIÇÃO DE CONTEXTO EM AMBIENTES HOSPITALARES PERVASIVOS." Universidade Franciscana, 2010. http://tede.universidadefranciscana.edu.br:8080/handle/UFN-BDTD/245.

Full text
Abstract:
Made available in DSpace on 2018-06-27T18:56:27Z (GMT). No. of bitstreams: 3 Jonas Bulegon Gassen.pdf: 799149 bytes, checksum: 2d5d71d3a957faa5f82feebbf14e88fc (MD5) Jonas Bulegon Gassen.pdf.txt: 183193 bytes, checksum: ac769c0da06ca7ce3b8154b94c90eaf6 (MD5) Jonas Bulegon Gassen.pdf.jpg: 3509 bytes, checksum: dfc698f4611f3e08f6acfc0f11a92b31 (MD5) Previous issue date: 2010-03-25<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior<br>For a hospital environment can be called as "pervasive", it requires that all the entities that are present in this context (like people and equipment
APA, Harvard, Vancouver, ISO, and other styles
37

Siu, Po-lam Pauline. "Context-aware state management for supporting mobility in a pervasive environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B3147858X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Siu, Po-lam Pauline, and 蕭寶琳. "Context-aware state management for supporting mobility in a pervasive environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B3147858X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lu, Heng. "A software testing framework for context-aware applications in pervasive computing." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B41758067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Nordstedt, David Roger. "MicroJini a service discovery and delivery infrastructure for pervasive computing /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000338.

Full text
Abstract:
Thesis (M.E.)--University of Florida, 2001.<br>Title from title page of source document. Document formatted into pages; contains xi, 76 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
42

Bruneau, Julien. "Developing and Testing Pervasive Computing Applications: A Tool-Based Methodology." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2012. http://tel.archives-ouvertes.fr/tel-00767395.

Full text
Abstract:
Malgré des progrès récents, développer une application d'informatique ubiquitaire reste un défi à cause d'un manque de canevas conceptuels et d'outils aidant au développement. Ce défi implique de prendre en charge des objets communicants hétérogènes, de surmonter la complexité des technologies de systèmes distribués, de définir l'architecture d'une application, et d'encoder cela dans un programme. De plus, tester des applications d'informatique ubiquitaire est problématique car cela implique d'acquérir, de tester et d'interfacer une variété d'entités logicielles et matérielles. Ce procédé peut
APA, Harvard, Vancouver, ISO, and other styles
43

Jakob, Henner. "Towards securing pervasive computing systems by design: a language approach." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2011. http://tel.archives-ouvertes.fr/tel-00719170.

Full text
Abstract:
Dans de multiples domaines, un nombre grandissant d'applications interagissant avec des entités ommunicantes apparaissent dans l'environnement pour faciliter les activités quotidiennes (domotique et télémédecine). Leur impact sur la vie de tous les jours des utilisateurs rend ces applications critiques: leur défaillance peut mettre en danger des personnes et leurs biens. Bien que l'impact de ces défaillances puisse être majeur, la sécurité est souvent considérée comme un problème secondaire dans le processus de développement et est traitée par des approches ad hoc. Cette thèse propose d'intégr
APA, Harvard, Vancouver, ISO, and other styles
44

Khedr, Mohamed Essam. "An infrastructure for managing context information in pervasive computing environments." Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/29125.

Full text
Abstract:
The increasing popularity of mobile devices, such as mobile phones and personal digital assistants, and advances in wireless networking technologies, are enabling new classes of applications that raise challenging problems to application developers. These applications have to be aware of the variations in the execution context such as location, time, user activities, and device capabilities in order to tune and adapt their intended functionalities. We argue that developing and managing applications that are context-aware would be extremely hard, tedious, and error-prone if not supported by a c
APA, Harvard, Vancouver, ISO, and other styles
45

Villeda, Enrique Edgar León. "Towards affective pervasive computing : emotion detection in intelligent inhabited environments." Thesis, University of Essex, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Wong, Ford Long. "Protocols and technologies for security in pervasive computing and communications." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cho, Jihoon. "Cryptographic approaches to security and privacy issues in pervasive computing." Thesis, Royal Holloway, University of London, 2014. http://repository.royalholloway.ac.uk/items/7272f105-8c80-462d-95eb-36f3de8ddaad/1/.

Full text
Abstract:
Technological innovation has enabled tiny devices to participate in pervasive com- puting. Such devices are particularly vulnerable to security and privacy threats, because of their limited computing resources and relatively weak physical security. We investigate possible cryptographic solutions to security and privacy problems arising in two kinds of emerging pervasive computing networks: Personal Area Net- works (PANs) and the EPCglobal Network. A number of key management schemes have been proposed for use in PANs, but these schemes only support key management within a PAN. However, as peopl
APA, Harvard, Vancouver, ISO, and other styles
48

Forsyth, Jason Brinkley. "Exploring Electronic Storyboards as Interdisciplinary Design Tools for Pervasive Computing." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/73538.

Full text
Abstract:
Pervasive computing proposes a new paradigm for human-computer interaction. By embedding computation, sensing, and networking into our daily environments, new computing systems can be developed that become helpful, supportive, and invisible elements of our lives. This tight proximity between the human and computational worlds poses challenges for the design of these systems - what disciplines should be involved in their design and what tools and processes should they follow? We address these issues by advocating for interdisciplinary design of pervasive computing systems. Based upon our experi
APA, Harvard, Vancouver, ISO, and other styles
49

Shojanoori, Reza. "Towards formalisation of situation-specific computations in pervasive computing environments." Thesis, University of Westminster, 2013. https://westminsterresearch.westminster.ac.uk/item/8z17x/towards-formalisation-of-situation-specific-computations-in-pervasive-computing-environments.

Full text
Abstract:
We have categorised the characteristics and the content of pervasive computing environments (PCEs), and demonstrated why a non-dynamic approach to knowledge conceptualisation in PCEs does not fulfil the expectations we may have from them. Consequently, we have proposed a formalised computational model, the FCM, for knowledge representation and reasoning in PCEs which, secures the delivery of situation and domain specific services to their users. The proposed model is a user centric model, materialised as a software engineering solution, which uses the computations generated from the FCM, store
APA, Harvard, Vancouver, ISO, and other styles
50

Günalp, Ozan Necati. "Continuous deployment of pervasive applications in dynamic environments." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM052/document.

Full text
Abstract:
L'émergence des nouveaux types d'environnements informatiques amplifie le besoin pour des systèmes logiciels d'être capables d'évoluer dynamiquement. Cependant, ces systèmes rendent très difficile le déploiement de logiciels en utilisant des processus humains. Il y a donc un besoin croissant d'outils d'automatisation qui permettent de déployer et reconfigurer des systèmes logiciels sans en interrompre l'exécution. Le processus de déploiement continu et automatisé permet de mettre à jour ou d'adapter un logiciel en exécution en fonction des changements contextuels et des exigences opérationnell
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!