Skip to main content

Information Agents for Mobile and Embedded Devices

  • Conference paper
  • First Online:
Cooperative Information Agents V (CIA 2001)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2182))

Included in the following conference series:

Abstract

The pervasive computing environments of the near future will involve the interactions, coordination and cooperation of numerous, casually accessible, and often invisible computing devices. These devices, whether carried on our person or embedded in our homes, businesses and classrooms, will connect via wireless and wired links to one another and to the global networking infrastructure. The result will be a networking milieu with a new level of openness. The localized and dynamic nature of their interactions raises many new issues that draw on and challenge the disciplines of agents, distributed systems, and security. This paper describes recent work by the UMBC Ebiquity research groupwhic h addresses some of these issues. p ]This research was supported in part by the NIST Advanced Technology Program, DARPA contract F30602-97-1-0215, and NSF grants CCR0070802 and IIS9875433.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A FIPA platform for handheld and mobile devices. In Proceedings of the 2001 Workshop on Agent Theories, Architectures, and Languages, 2001.

    Google Scholar 

  2. G. Abowd, C. Atkeson, J. Hong, S. Long, R. Kooper, and M. Pinkerton. Cyberguide: A mobile context-aware tour guide. ACM Wireless Networks, 3:421–433.

    Google Scholar 

  3. Harini Bharadvaj, A. Joshi, and Sansanee Auephanwiriyakyl. An active transcoding proxy to support mobile web access. In Proc. IEEE Sumposium on Reliable Distributed Systems, October 1998.

    Google Scholar 

  4. Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. The role of trust management in distributed systems security. In Secure Internet Programming, pages 185–210, 1999.

    Google Scholar 

  5. E.A. Brewer, R.H. Katz, Y. Chawathe, A. Fox, S.D. Gribble, T. Hodes, G. Nguyen, T. Henderson, E. Amir, H. Balakrishnan, A. Fox, V. Padmanabhan, and S. Seshan. A network architecture for heterogeneous mobile computing. IEEE Personal Communications Magazine, 5(5):8–24, 1998.

    Article  Google Scholar 

  6. Harry Chen, Anupam Joshi, Tim Finin, and Dipanjan Chakraborty. Dynamic service discovery for mobile computing: Intelligent agents meet jini in the aether. Baltzer Science Journal on Cluster Computing, Special Issue on Advances in Distributed and Mobile Systems and Communications, 2001.

    Google Scholar 

  7. R. Scott Cost, Tim Finin, Yannis Labrou, Xiaocheng Luan, Ian Soboroff Yun Peng, James Mayfield, and Akram Boughannam. An agent-based infrastructure for enterprise integration. In First International Symposium on Agent Systems and Applications, October 1999.

    Google Scholar 

  8. Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, and Randy H. Katz. An architecture for a secure service discovery service. In Fifth Annual International Conference on Mobile Computing and Networks (MobiCom’ 99), pages 24–35, Seattle, 1999.

    Google Scholar 

  9. DAML. Darpa agent markup language specification, http://www.daml.org/.

  10. M. Dunham, P. Chrysanthis, A. Joshi, V. Kumar, K. Ramamritham, O. Wolfson, and S. Zdonik. Issues in wireless data management. Discussion of the wireless data management panel at NSF IDM PIs Meeting, March 2000.

    Google Scholar 

  11. M. Dunham, A. Helal, and S. Balakrishnan. A mobile transaction model that captures both the data and movement behavior. ACM/Baltzer Journal of Mobile Networks and Applications, 2(2):149–162, 1997.

    Article  Google Scholar 

  12. Carl M. Ellison, Bill Frantz, and Brian M. Thomas. Simple public key certificate. Internet document, 1996.

    Google Scholar 

  13. Mike Esler, Jeffrey Hightower, Tom Anderson, and Gaetano Borriello. Next century challenges: Data-centric networking for invisible computing. In Mobile Computing and Networking, pages 256–262, 1999.

    Google Scholar 

  14. FIPA. FIPA 97 specification part 2: Agent communication language. Technical report, FIPA-Foundation for Intelligent Physical Agents, october 1997.

    Google Scholar 

  15. Internet Engineering Task Force. Public-key infrastructure (x.509), http://www.ietf.org/html.charters/pkix-charter.html.

  16. Armando Fox, Brad Johanson, Pat Hanrahan, and Terry Winograd. Integrating information appliances into an interactive workspace. IEEE Computer Graphics and Applications, 20(3), 2000.

    Google Scholar 

  17. Benjamin Grosof and Yannis Labrou. An approach to using xml and a rule-based content language with an agent communication language, 1999.

    Google Scholar 

  18. Z. J. Has. Panel report on ad hoc networks-MILCOM’97. Mobile Computing and Communications Review, 2(1), January 1998.

    Google Scholar 

  19. A. Helal, M. Wang, A. Jagatheesan, and R. Krithivasan. Brokering based self-organizing e-service communities. In Fifth International Symposium on Autonomous Decentralized Systems (ISADS), Dallas, Texas, March 2001.

    Google Scholar 

  20. T. Hodes and R. H. Katz. A document-based framework for internet application control. In Proceedings of the Second USENIX Symposium on Internet Technologies and Systems, October 1999.

    Google Scholar 

  21. W. Johnston and C. Larsen. A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments. Technical Report Technical Report 3885, Lawrence Berkeley National Laboratory, 1996.

    Google Scholar 

  22. A. Joshi, S. Weerawarana, and E. N. Houstis. Disconnected Browsing of Distributed Information. In Proc. Seventh IEEE Intl. Workshop on Research Issues in Data Engineering, pages 101–108. IEEE, April 1997.

    Google Scholar 

  23. Anupam Joshi. On proxy agents, mobility and web access. ACM/Baltzer Journal of Mobile Networks and Applications, 2000. (accepted for publication, also availbe as UMBC CS TR 99-02).

    Google Scholar 

  24. Lalana Kagal, Tim Finin, and Yun Peng. A framework for distributed trust management. In To appear in proceedings of IJCAI-01 Workshop on Autonomy, Delegation and Control, 2001.

    Google Scholar 

  25. Lalana Kagal, Vlad Korolev, Harry Chen, Anupam Joshi, and Tim Finin. Centaurus: A framework for intelligent services in a mobile environment. In Proceedings of International Workshop on Smart Appliances and Wearable Computing (IWSAWC), The 21st International Conference on Distributed Computing Systems (ICDCS-21) April 16-19, 2001.

    Google Scholar 

  26. Lalana Kagal, Vladimir Korolev, Sasikanth Avancha, Anupam Joshi, Timothy Finin, and Yelena Yesha. A highly adaptable infrastructure for service discovery and management in ubiquitous computing. Technical Report TR CS-01-06, Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, 2001.

    Google Scholar 

  27. R. H. Katz, E. A. Brewer, E. Amir, H. Balakrishnan, A. Fox, S. Gribble, T. Hodes, D. Jiang, G. T. Nguyen, V. Padmanabhan, and M. Stemm. The bay area research wireless access network (barwan). In Proceedings Spring COMPCON Conference, 1996.

    Google Scholar 

  28. Yannis Labrou, Tim Finin, and Yun Peng. Agent communication languages: The current landscape. IEEE Intelligent Systems, 14(2):45–52, / 1999.

    Article  Google Scholar 

  29. Li, Feigenbaum, and Grosof. A logic-based knowledge representation for authorization with delegation. In PCSFW: Proceedings of The 12th Computer Security Foundations Workshop. IEEE Computer Society Press, 1999.

    Google Scholar 

  30. M. Liljeberg, M. Kojo, and K. Raatikainen. Enhanced services for world-wide web in mobile wan environment. http://www.cs.Helsinki.FI/research/mowgli/mowglipapers.html, 1996.

  31. D. Maltz and P. Bhagwat. Msocks: An architecture for transport layer mobility. In Proc. IEEE Infocom 98, San Francisco, pages 1037–1045, April 1998.

    Google Scholar 

  32. M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. IEEE Proceedings of the 17th Symposium, 1996.

    Google Scholar 

  33. S. Muthukrishnan, Rittwik Jana, Theodore Johnson, and Andrea Vitaletti. Location based services in a wireless wan using cellular digital packet data (cdpd). In Proceedings of the 2nd ACM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDE01), May 2001.

    Google Scholar 

  34. B. D. Noble, M. Satyanarayanan, D. Narayanan, J. E. Tilton, J. Flinn, and K. R.Walker. Agile application-aware adaptation for mobility. In Proceedings of the 16th ACM Symposium on Operating System Principles.

    Google Scholar 

  35. Bill Schilit, Norman Adams, and Roy Want. Context-aware computing applications. In IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, US, 1994.

    Google Scholar 

  36. Reticular Systems. The yellowstone project.

    Google Scholar 

  37. Mark Taylor, William Waung, and Mohsen Banan. Internetwork Mobility: The CDPD Approach. Professional Technical Reference. Prentice Hall, 1996.

    Google Scholar 

  38. W. J. Tolone, B. Chu, J. Long, T. Finin, and Y. Peng. Supporting human interactions within integrated manufacturing systems. International Journal of Agile Manufacturing, 1998. To appear.

    Google Scholar 

  39. W3C. Xml signature http://www.w3.org/signature/.

  40. PhilipR. Zimmermann. The Official PGP Userx2019;s Guide. MIT Press, Cambridge, MA, USA, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Finin, T., Joshi, A., Kagal, L., Ratsimore, O., Korolev, V., Chen, H. (2001). Information Agents for Mobile and Embedded Devices. In: Klusch, M., Zambonelli, F. (eds) Cooperative Information Agents V. CIA 2001. Lecture Notes in Computer Science(), vol 2182. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44799-7_30

Download citation

  • DOI: https://doi.org/10.1007/3-540-44799-7_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42545-8

  • Online ISBN: 978-3-540-44799-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics