Autonomic Applications for Pervasive Environments
|
|
- Angela Edwards
- 6 years ago
- Views:
Transcription
1 Autonomic Applications for Pervasive Environments Manish Parashar WINLAB/TASSL ECE, Rutgers University Ack: NSF (CAREER, KDI, ITR, NGS), DoE (ASCI)
2 Pervasive Computing: Smaller/Cheaper/Faster/Connected. Explosive growth in computation, communication, information and integration technologies computing is ubiquitous, pervasive communication is/will be Pervasive anytime-anywhere access environments ubiquitous access to information via PCs, PDAs, Cells, smart appliances, etc. (billions of devices, millions of users) peers capable of producing/consuming/processing information at different levels and granularities embedded devices in clothes, phones, cars, mile-markers, traffic lights, lamp posts, refrigerators, medical instruments Pervasive on demand computational/storage resources, services the Grid
3 Example scenario : DARPA IXO, A Rapidly Expanding Universe of Sensors, Weapons, and Platforms Approved for Public Release - Distribution Unlimited
4 The bad news Unprecedented scales complexity heterogeneity dynamism and unpredictability lack of guarantees The increasing system complexity is reaching a level beyond human ability to design, manage and secure programming environments and infrastructure are becoming unmanageable, brittle and insecure A fundamental change is required in how applications are formulated, composed and managed autonomic components, dynamic compositions, opportunistic interactions, virtual runtime,
5 Autonomic Computing? Nature has evolved to cope with scale, complexity, heterogeneity, dynamism and unpredictability, lack of guarantees self configuring, self adapting, self optimizing, self healing, self protecting, highly decentralized, heterogeneous architectures that work!!! e.g. the human body the autonomic nervous system tells you heart how fast to beat, checks your blood s sugar and oxygen levels, and controls your pupils so the right amount of light reaches your eyes as you read these words, monitors your temperature and adjusts your blood flow and skin functions to keep it at 98.6ºF coordinates - an increase in heart rate without a corresponding adjustment to breathing and blood pressure would be disastrous is autonomic - you can make a mad dash for the train without having to calculate how much faster to breathe and pump your heart, or if you ll need that little dose of adrenaline to make it through the doors before they close can these strategies inspire solutions? e.g. FlyPhones, AORO/AutoMate, ROC, ELiza, etc. of course, there is a cost lack of controllability, precision, guarantees, comprehensibility, PS: its not AI duplication of human thought is not the ultimate goal
6 Autonomic Living Autonomic living: autonomic peers opportunistically interact, coordinate and collaborate to satisfy goals? scenarios (everyday, b2b coordination, crisis management, homeland security, ) your car in route to the airport estimates that given weather (from meteorological beacons), road conditions (from on-coming cars), traffic patters (from the traffic light), warns that you will miss your flight and you will be better off taking the train the station is coming up do you want to rebook? in a foreign country, your cell phone enlists a locally advertised GPS and translation service as you try to get directions your clock/pda estimates drive time to your next appointment and warns you appropriately your eye glasses sends your current prescription as you happen to drive past your doctor or your PDA collects prices for the bike you promised yourself as you drive around
7 Project overview Investigate fundamental architectures and software paradigms/technologies associated with development of autonomic and pervasive applications pervasive computing system design, based on a challenging application scenario: autonomic living middleware infrastructures and services programming model based on local constraints, opportunistic interactions and consensus based coordination cluster computing model for loosely coupled ac-hoc scenario security/trust architecture and protocols for the above ad-hoc wireless (sensor) network protocol optimizations autonomic living system prototype The group: M. Ott, M. Parashar, D. Raychaudhury, W. Trappe Y, Zhang
8 AutoMate: Enabling Autonomic Applications Objective: Investigate key technologies to enable the development of autonomic Grid applications that are context aware and are capable of self-configuring, selfcomposing, self-optimizing and self-adapting. Research Issues: Definition of Autonomic Components: definition of programming abstractions and supporting infrastructure that will enable the definition of autonomic components autonomic components provide enhanced profiles or contracts that encapsulate their functional, operational, and control aspects Dynamic Composition of Autonomic Applications: mechanisms and supporting infrastructure to enable autonomic applications to be dynamically and opportunistically composed from autonomic components compositions will be based on policies and constraints that are defined, deployed and executed at run time, and will be aware of available Grid resources (systems, services, storage, data) and components, and their current states, requirements, and capabilities Autonomic Middleware Services: design, development, and deployment of key services on top of the Grid middleware infrastructure to support autonomic applications a key requirements for autonomic behavior and dynamic compositions is the ability of the components, applications and resources (systems, services, storage, data) to interact as peers
9 Opportunistic Interactions Interactions based on local goals and objectives local goals and objectives are defined as constraints to be satisfied constraints can updated and new constraints can defined at any time Dynamic and ad-hoc interactions use semantic messaging based on proximity, privileges, capabilities, context, interests, offerings, etc. Opportunistic constraints are long-term and satisfied opportunistically (may not be satisfied) Probabilistic guarantees and soft state no explicit synchronization interaction semantics are achieved using feedback and consensus building
10 Opportunistic Interactions Ontology & Taxonomy Semantic Messaging Semantic P2P Middleware Network Communication 4 n Received Profiles Publish Profiles Constraint Engine Context Environment factors Sensor State Constraints
11 For Example Automata using opportunistic interactions Game of Life simulation using sensor networks Sensors as Sharks and Fishes Shark/Fish behavior encoded as constraints Opportunistic and dynamic interactions based on proximity and interests Semantic messaging based on interest/offer profiles Interaction semantics built on local behavior (no synchronization) Inconsistencies resolved and consensus built incrementally using probabilistic feedback and gossiping Shark thinks it has eaten the fish, fish thinks it got away! Indirect interactions Fish warns another fish of an approaching shark Aggregation Shark does not attack fishes if they are in a school of 10 or more Dynamic goals and constraints Constraint satisfactions is ongoing and probabilistic not absolute Constraints can be updated, removed or new constraints to be defined. Possible a result of constraint satisfaction Shark is full after eating 4 fishes
12 Summary Autonomic applications are necessary to address scale/complexity/heterogeneity/dynamism/reliability challenges Autonomic living: enable autonomic peers to opportunistically interact, coordinate and collaborate to satisfy goals programming/interaction models, messaging substrates, ad hoc clustering mechanisms, security and trust, ad hoc networks More Information
13 Autonomic Computing Workshop/Tutorial Autonomic Computing Workshop In conjunction with the Twelfth International Symposium on High Performance Distributed Computing (HPDC-12), June 25th, 2003 in Seattle Washington. Autonomic Computing Tutorial Global Grid Forum (GGF), June 22nd, 2003 in Seattle Washington.
My View Grid Computing: An Overview
My View Grid Computing: An Overview Manish Parashar The Applied Software Systems Laboratory Rutgers, The State University of New Jersey http://www.caip.rutgers.edu/tassl/ LRIG, September 30, 2003 Ack:
More informationOpportunistic Application Flows in Sensor-based Pervasive Environments
Opportunistic Application Flows in Sensor-based Pervasive Environments N. Jiang, C. Schmidt, V. Matossian, and M. Parashar WINLAB/TASSL ECE, Rutgers University http://www.caip.rutgers.edu/tassl Presented
More informationAutonomic Computing Introduction, Motivations, Overview
Autonomic Computing Introduction, Motivations, Overview Manish Parashar The Applied Software Systems Laboratory Rutgers, The State University of New Jersey http://automate.rutgers.edu Outline Objectives
More informationBuilding Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey
Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom
More informationGPC 2007 Round Table on Pervasive Grids
GPC 2007 Round Table on Pervasive Grids Manish Parashar The Applied Software Systems Laboratory ECE, Rutgers University http://www.caip.rutgers.edu/tassl (Ack: NSF, DoE, NIH) The Grid Concept Resource
More informationAutonomic Computing. Pablo Chacin
Autonomic Computing Pablo Chacin Acknowledgements Some Slides taken from Manish Parashar and Omer Rana presentations Agenda Fundamentals Definitions Objectives Alternative approaches Examples Research
More informationOpportunistic Application Flows in Sensor-based Pervasive Environments
Opportunistic Application Flows in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian, and Manish Parashar ICPS 2004 1 Outline Introduction to pervasive sensor-based
More informationCSE 5306 Distributed Systems. Course Introduction
CSE 5306 Distributed Systems Course Introduction 1 Instructor and TA Dr. Donggang Liu @ CSE Web: http://ranger.uta.edu/~dliu Email: dliu@uta.edu Phone: 817-2720741 Office: ERB 555 Office hours: Tus/Ths
More informationMiddleware Services for Sensors Systems in Dynamic Data-driven Oil Applications
Middleware Services for Sensors Systems in Dynamic Data-driven Oil Applications Manish Parashar The Applied Software Systems Laboratory ECE/CAIP, Rutgers University http://www.caip.rutgers.edu/tassl (Ack:
More informationPervasive Computing. OpenLab Jan 14 04pm L Institute of Networked and Embedded Systems
Pervasive Computing Institute of Networked and Embedded Systems OpenLab 2010 Jan 14 04pm L4.1.01 MISSION STATEMENT Founded in 2007, the Pervasive Computing Group at Klagenfurt University is part of the
More informationDAML: ATLAS Project Carnegie Mellon University
DAML: ATLAS Project Carnegie Mellon University Katia Sycara Anupriya Ankolekar, Massimo Paolucci, Naveen Srinivasan November 2004 0 Overall Program Summary What is the basic problem you are trying to solve?
More informationNetworked CPS: Some Fundamental Challenges
Networked CPS: Some Fundamental Challenges John S. Baras Institute for Systems Research Department of Electrical and Computer Engineering Fischell Department of Bioengineering Department of Mechanical
More informationCore Embedded Systems
Grand Challenges in Cyber Physical The Next Generation Tarek Abdelzaher Department of Computer Science University of Illinois at Urbana Champaign Core Core Challenges: Dependability Hardware/Software Co-Design
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationMobile Computing Introduction
Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?
More informationPart I: Future Internet Foundations: Architectural Issues
Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues 3 Introduction The Internet has evolved from a slow, person-to-machine, communication
More informationEuropean Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105
European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based
More informationInternet of Things (IoT)
Internet of Things (IoT) Yan Zhang Professor, University of Oslo, Norway April 7, 2017 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual
More informationService-Oriented Programming
Service-Oriented Programming by Guy Bieber, Lead Architect, ISD C4I, Motorola ABSTRACT - The Service-Oriented Programming (SOP) model is the most exciting revolution in programming since Object Oriented
More informationA Study of Mountain Environment Monitoring Based Sensor Web in Wireless Sensor Networks
, pp.96-100 http://dx.doi.org/10.14257/astl.2014.60.24 A Study of Mountain Environment Monitoring Based Sensor Web in Wireless Sensor Networks Yeon-Jun An 1, Do-Hyeun Kim 2 1,2 Dept. of Computing Engineering
More informationStudy ON Remote Medical Monitoring System Based ON MSP430 AND CC2530
2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 2015) Study ON Remote Medical Monitoring System Based ON MSP430 AND CC2530 SONG Aijuan, SI Guangyuan, GU Qiongchan
More informationCIO Forum Maximize the value of IT in today s economy
CIO Forum Maximize the value of IT in today s economy Laura Scott, Vice President Service Product Line Sales Global Technology Services IT infrastructure is reaching a breaking point. 85% idle In distributed
More informationAlma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering
Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains
More informationSecure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions
Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions April 26, 2018 The Secure Technology Alliance IoT Security Council is pleased to submit our response to
More informationAn Introduction to Cyber-Physical Systems INF5910/INF9910
An Introduction to Cyber-Physical Systems INF5910/INF9910 1 Outline What is Cyber Physical Systems (CPS)? Applications Challenges Cyber Physical CPS 2 Cyber Systems Cyber is More than just software More
More informationInfrastructure for Autonomous Mobile Robots Communication and Coordination
90 Work in Progress Session Infrastructure for Autonomous Mobile Robots Communication and Coordination Marcelo M. Sobral, Leandro B. Becker Dept of Automation and Systems Universidade Federal de Santa
More informationCenter for Cloud and Autonomic Computing (CAC)
A CISE-funded Center University of Florida, Jose Fortes, 352.392.9265, fortes@ufl.edu Rutgers University, Manish Parashar, 732.445.4388, parashar@cac.rutgers.edu University of Arizona, Salim Hariri, 520.621.4378,
More informationWEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS
1 WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS BRUCE CROFT NSF Center for Intelligent Information Retrieval, Computer Science Department, University of Massachusetts,
More informationSelf-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture
Architecting Self-Managing Distributed Systems Workshop ASDS@ECSAW 15 Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture Flávia C. Delicato Federal University of Rio de Janeiro
More informationfor Sensor Overlay Network
APAN 29 th Meeting - Sensor Network Workshop Toward a Federated Framework for Sensor Overlay Network Susumu Takeuchi National Institute of Information and Communications Technology (NICT), Japan Agenda
More informationGRIDS INTRODUCTION TO GRID INFRASTRUCTURES. Fabrizio Gagliardi
GRIDS INTRODUCTION TO GRID INFRASTRUCTURES Fabrizio Gagliardi Dr. Fabrizio Gagliardi is the leader of the EU DataGrid project and designated director of the proposed EGEE (Enabling Grids for E-science
More informationCreate a smarter environment where information becomes insight
Create a smarter environment where information becomes insight How a seamless network can turn data into intelligence for your smart city or factory Contents Introduction 3 Smart city surveillance: From
More informationOn the Design Framework of Context Aware Embedded System
On the Design Framework of Context Aware Embedded System Xian-He Sun With Abhay Daftari, Nehal Mehta, Shubhanan Bakre Illinois Institute of Technology Request Position, View Point Software Engineering
More informationInternet of Things (IoT) CSE237A
Internet of Things (IoT) CSE237A Class Overview What ve covered until now: All material that will be on exam! Where we are going today: IoT & exam review Due today: Article on IoT HW3 at 11:59pm; upload.pdf
More informationNetwork Based Hard/Soft Information Fusion Network Architecture/SOA J. Rimland
Network Based Hard/Soft Information Fusion Network Architecture/SOA J. Rimland Objectives: Develop, demonstrate and evaluate an information architecture, cyber-infrastructure, data standards and tools
More informationIntelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI) April 25.
Intelligent Edge Computing and ML-based Traffic Classifier Kwihoon Kim, Minsuk Kim (ETRI) (kwihooi@etri.re.kr, mskim16@etri.re.kr) April 25. 2018 ITU Workshop on Impact of AI on ICT Infrastructures Cian,
More informationModel-Based Techniques in the Development of Net-Centric Applications. Timothy A. Anderson Basil C. Krikeles. June 20, 2007
Model-Based Techniques in the Development of Net-Centric Applications June 20, 2007 Timothy A. Anderson Basil C. Krikeles BAE-Systems Advanced Information Technologies 6 New England Executive Park Burlington,
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationAir-Synergy 4G Pico Base Station with Integrated Wireless Backhaul
Air-Synergy 4G Pico Base Station with Integrated Wireless Backhaul The world s most compact and versatile 4G Pico Base Station Wireless Broadband Operators are currently experiencing an unprecedented growth
More informationAmbient Service Space
Ambient Service Space Dr. Stefan Arbanowski Fraunhofer FOKUS Institute for Open Communication Systems Berlin, Germany 02.08.2004 1 Developing Next Generation Services Strategic
More informationBrian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos
Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos Cloud Security Alliance, 2015 Agenda 1. Defining the IoT 2. New Challenges introduced by the IoT 3. IoT Privacy Threats
More informationInternet of Things (IoT)
Internet of Things (IoT) INF5050 February 19, 2016 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual entity that exists and moves
More informationComputing in the Continuum: Harnessing Pervasive Data Ecosystems
Computing in the Continuum: Harnessing Pervasive Data Ecosystems Manish Parashar, Ph.D. Director, Rutgers Discovery Informatics Institute RDI 2 Distinguished Professor, Department of Computer Science Moustafa
More informationA Decentralized Content-based Aggregation Service for Pervasive Environments
A Decentralized Content-based Aggregation Service for Pervasive Environments Nanyan Jiang, Cristina Schmidt, Manish Parashar The Applied Software Systems Laboratory Rutgers, The State University of New
More informationPIAX Service Platform and its Applications
The 3 rd EU-J Symposium PIAX Service Platform and its Applications Susumu Takeuchi National Institute of Information and Communications Technology (NICT), Japan Background Pervasive/Ubiquitous Computing
More informationFigure Potential 5G applications
6. 5G Key Concept 6.1 Key Concepts of 5G End-to-end (E2E) quality required by applications and/or users will be far more diversified in the 5G era than what we have seen in the preceding generations. For
More informationIntelligent Transportation Systems (ITS) for Critical Infrastructure Protection
Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Presented at the Transportation Research Board January 2002 Annual Meeting Washington DC, USA HAMED BENOUAR Executive Director
More informationICT-SHOK Project Proposal: PROFI
ICT-SHOK Project Proposal: PROFI Full Title: Proactive Future Internet: Smart Semantic Middleware Overlay Architecture for Declarative Networking ICT-SHOK Programme: Future Internet Project duration: 2+2
More informationComputing Technologies
Computing Technologies Computing CPU, Memory, Communication Ubiquitous everywhere indefinite number of times Not really possible or desirable more than in traditional computing so widespread that unnoticed
More informationOn Demand Web Services with Quality of Service
On Demand Web Services with Quality of Service BRAJESH KOKKONDA Department of Computer Science & Engineering, Vivekananda Institute of Technology and Sciences, Tel: +91-7416322567 E-mail: brajesh.email@gmail.com
More information5G radio access. ericsson White paper Uen June research and vision
ericsson White paper 284 23-3204 Uen June 2013 5G radio access research and vision 5G will enable the long-term Networked Society and realize the vision of unlimited access to information for anyone and
More informationEnabling Internet-of-Things (IoT) Services in MobilityFirst FIA
Enabling Internet-of-Things (IoT) Services in MobilityFirst FIA Jun Li, Rich Martin, John-Austen Francisco and Dipankar Raychaudhuri WINLAB, Rutgers University May 14 th, 2012 A Big Question Does Internet
More informationUbiquitous IoT Perspectives The Power of Connected Sensors and Actuators
Ubiquitous IoT Perspectives The Power of Connected Sensors and Actuators Andrea Onetti Vice President, General Manager MEMS Sensor Division STMicroelectronics Digital Technologies are Transforming nearly
More informationVITP: An Information Transfer Protocol for Vehicular Computing
VITP: An Information Transfer Protocol for Vehicular Computing Marios D. Dikaiakos, Saif Iqbal,Tamer Nadeem, Liviu Iftode Adapted from the work of Marios D. Dikaiakos 2nd ACM International Symposium on
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to
More informationQuick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationMobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK
Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK 1 ETSI 2013. All rights reserved Trends and market drivers Growth in mobile
More informationICT Supporting Aging Society Japanese Government Initiatives and Hitachi Challenges
ICT Supporting Aging Society Japanese Government Initiatives and Hitachi Challenges 26 April, 2008 Mr. Yasushi Fukunaga Corporate Chief Engineer Hitachi, Ltd. v.4.23a ICT Supporting Aging Society Japanese
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]
More informationA Location Model for Ambient Intelligence
A Location Model for Ambient Intelligence National Institute of Informatics, Japan Email: ichiro@nii.ac.jp Outline 1. Motivation 2. Approach 3. Location Model 4. Design and Implementation 5. Applications
More informationConsumer Opinions and Habits A XIRRUS STUDY
Consumer Opinions and Habits A XIRRUS STUDY Executive Summary With more devices on the planet than people, it goes without saying that wireless is no longer a bonus - it s a necessity. By the end of 2015,
More informationRequest for Information Technical Response White Paper for Joint Operational Medicine Information Systems (JOMIS)
Request for Information Technical Response White Paper for Joint Operational Medicine Information Systems (JOMIS) Ensuring Continuity of Data 5 May 2017 Prepared by: Northrop Grumman Systems Corporation
More informationRANtoCoreTM. Delivering the most realistic test environments
RANtoCoreTM Delivering the most realistic test environments We can help propel your network to the next generation Ensuring a high quality, secure and consistent service The requirement for increased bandwidth,
More informationJohann Bourcier Associate Professor University of Rennes 1
Johann Bourcier Associate Professor University of Rennes 1 Johann.Bourcier@irisa.fr PhD in Computer Science from Grenoble University France (2005 2008) Auto-Home: A Framework for Autonomic Pervasive Applications
More informationActive source routing for ad-hoc network: seamless integration of wireless environment
Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots
More informationAutorama, Connecting Your Car to
Autorama, Connecting Your Car to the Internet of Tomorrow Nicholas Sargologos, Senior Marketing Manager, Digital Networking Freescale Semiconductor Overview Automotive OEMs need a secure, managed process
More informationEnabling Autonomic Grid Applications: Requirements, Models and Infrastructure
Enabling Autonomic Grid Applications: Requirements, Models and Infrastructure M. Parashar, H. Liu, Z. Li, C. Schmidt, V. Matossian, N. Jiang The Applied Software Systems Laboratory Rutgers University,
More informationITS (Intelligent Transportation Systems) Solutions
Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society ITS (Intelligent Transportation Systems) Solutions By Makoto MAEKAWA* Worldwide ITS goals for safety and environment
More informationPervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38
Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with
More informationPanel 1 Service Platform and Network Infrastructure for Ubiquitous Services
Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich
More informationSolution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management
Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management Copyright Nuvon, Inc. 2007, All Rights Reserved. Introduction The need to improve the quality and accessibility
More informationBusiness Case for the Cisco ASR 5500 Mobile Multimedia Core Solution
Business Case for the Cisco ASR 5500 Mobile Multimedia Core Solution Executive Summary The scale, use and technologies of mobile broadband networks are changing rapidly. Mobile broadband growth continues
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #4 Wireless Systems II Project proposals: Announcements Written proposal due in 1 week Presentation in class in 1 week Contact me to discuss
More informationCareers in Smart Technologies Jamie McCormick September 17 th, 18 th & 19 th
Careers in Smart Technologies Jamie McCormick September 17 th, 18 th & 19 th 2014 Who I am Worked in the Irish Games Industry for 14 years Began games career during 4 th year (1998-1999) running games
More informationInternet of Things: Services and Applications Categorization
Advances in Internet of Things, 2011, 1, 27-31 doi:10.4236/ait.2011.12004 Published Online July 2011 (http://www.scirp.org/journal/ait) Internet of Things: Services and Applications Categorization Abstract
More informationDepartment of Computer Science. Dr. Shangping Ren. Who are we and what we do. October 4, 2010
Department of Computer Science Dr. Shangping Ren Who are we and what we do October 4, 2010 Computer Science Department Distributed Systems, Real-Time Embedded Systems, and Cyber-Physical Systems Funded
More informationAccelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation
Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated
More informationExploiting peer group concept for adaptive and highly available services
Computing in High Energy and Nuclear Physics, 24-28 March 2003 La Jolla California 1 Exploiting peer group concept for adaptive and highly available services Muhammad Asif Jan Centre for European Nuclear
More informationFeaturing Trust and Reputation Management Systems for Constrained Hardware Devices*
Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Rodrigo Román, M. Carmen Fernández-Gago, Javier López University of Málaga, Spain *(Wireless Sensor Networks) Contents
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationWearable Computing: Possibilities and People
Wearable Computing: Possibilities and People Tom Martin Virginia Tech Electronic Textiles Laboratory & the Institute for Creativity, Arts, and Technology May 2018 Courtesy of Dan Ledger 2 Wearable technology
More informationEnabling a world without wires
Enabling a world without wires Phil Pollok Senior Vice President Contents 1 Wireless connectivity 2 Market opportunity 3 Seizing the opportunity Contents 1 Wireless connectivity 2 Market opportunity 3
More informationChallenges for Future Networked Embedded Systems
Challenges for Future Networked Embedded Systems I.G. Niemegeers Centre for Wireless and Personal Communication (CWPC) Delft University of Technology PROGRESS Workshop 2006 Networks and Connected Systems
More informationNSF-RCN Workshop #2 Panel 2
NSF-RCN Workshop #2 Panel 2 Moonshot mmw Challenges and Opportunities for 2020, 2025, 2030 Tommy Svensson Department of Electrical Engineering, Communication Systems Group Professor, PhD, Leader Wireless
More informationKathleen Fisher Program Manager, Information Innovation Office
Kathleen Fisher Program Manager, Information Innovation Office High Assurance Systems DARPA Cyber Colloquium Arlington, VA November 7, 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public
More informationSmartSantander. Dr srđan KrČo
SmartSantander a Smart City example Dr srđan KrČo Why Smart Cities now? 50% of the world population lives in a city 2010-2050: Urban population will almost double Cities occupy 2% of the world s geography
More informationStandards for V2X Communication and Implications for OEMs and ITS
Standards for V2X Communication and Implications for OEMs and ITS FISITA Jürgen Daunis London Nov. 12, 2015 PACE OF CHANGE >50 billion connected devices Connections (billion) 25 years 5 billion connected
More informationMicrocontroller-Based Wireless Sensor Networks Prof. Kasim M. Al-Aubidy Philadelphia University
Embedded Systems Design (0630414) Lecture 14 Microcontroller-Based Wireless Sensor Networks Prof. Kasim M. Al-Aubidy Philadelphia University Introduction: Wireless Sensor Networks (WSNs) have been identified
More informationThe Internet of Things
The Internet of Things George Debbo Presentation for SASGI Meeting on 22 nd June 2016 1 Agenda What is IoT? How big is it? What effect does it have on telecom networks? Use cases/applications: The connected
More informationHigh Volume Messaging with IBM MessageSight for use in Mobile, Web and M2M solutions
High Volume Messaging with IBM MessageSight for use in Mobile, Web and M2M solutions Dave Locke IBM Software Group Trademark Statement IBM and the IBM logo are trademarks of International Business Machines
More informationA Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things
A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things Xuchao Chang, Chunhong Zhang, Li Sun Beijing University of Posts and Telecommunications, Beijing, 100876, China E-mail:
More informationThe Internet of Things and Security
INTERNAL USE ONLY The Internet of Things and Security Chuck DePalma CISSP CISM Network and Cloud Security Architect The Internet of Things 1998 Adoption of Mosaic Browsers 0ver 250 Millions of Internet
More informationAutonomy & Operational Sustainability
Autonomy & Operational Sustainability Whether you are in the business of Energy, Utilities, Communications, Smart Infrastructure or Commerce, the one thing you want is for your systems to continue working.
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationService Discovery and Invocation for Mobile Ad Hoc Networked Appliances
Service Discovery and Invocation for Ad Hoc Networked Appliances Liang Cheng and Ivan Marsic Department of Electrical and Computer Engineering Rutgers The State University of New Jersey 94 Brett Rd., Piscataway,
More informationWhat is This Thing Called System Configuration?
PAUL ANDERSON dcspaul@inf.ed.ac.uk Alva Couch couch@cs.tufts.edu What is This Thing Called System Configuration? Tufts University Computer Science LISA 2004 (1) Overview Paul says: The configuration problem
More informationA Case Study about IFEZ(Song-do) Smart-City. Ryan LEE
A Case Study about IFEZ(Song-do) Smart-City Ryan LEE Career History Incheon U-City Corporation Incheon, Korea - Director, IFEZ Smart-City Integrated Operation Center * Managing IFEZ Smart City Integrated
More informationPanel: Enabling Consumer Visibility into Energy Usage
Panel: Enabling Consumer Visibility into Energy Usage Matthew Laherty Cisco Systems Shahram Mehraban Intel Mike Ballard Microchip Moderator Clayton Pillion Microchip Wendy Furchak Verizon Wireless A New
More information5g Use Cases. Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015
5g Use Cases Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015 BROADBAND EXPERIENCE EVERYWHERE, ANYTIME 5g USE CASES SMART VEHICLES, TRANSPORT & INFRASTRUCTURE MEDIA EVERYWHERE CRITICAL CONTROL OF
More information