Abstract
The pervasive computing environments of the near future will involve the interactions, coordination and cooperation of numerous, casually accessible, and often invisible computing devices. These devices, whether carried on our person or embedded in our homes, businesses and classrooms, will connect via wireless and wired links to one another and to the global networking infrastructure. The result will be a networking milieu with a new level of openness. The localized and dynamic nature of their interactions raises many new issues that draw on and challenge the disciplines of agents, distributed systems, and security. This paper describes recent work by the UMBC Ebiquity research groupwhic h addresses some of these issues. p ]This research was supported in part by the NIST Advanced Technology Program, DARPA contract F30602-97-1-0215, and NSF grants CCR0070802 and IIS9875433.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
A FIPA platform for handheld and mobile devices. In Proceedings of the 2001 Workshop on Agent Theories, Architectures, and Languages, 2001.
G. Abowd, C. Atkeson, J. Hong, S. Long, R. Kooper, and M. Pinkerton. Cyberguide: A mobile context-aware tour guide. ACM Wireless Networks, 3:421–433.
Harini Bharadvaj, A. Joshi, and Sansanee Auephanwiriyakyl. An active transcoding proxy to support mobile web access. In Proc. IEEE Sumposium on Reliable Distributed Systems, October 1998.
Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. The role of trust management in distributed systems security. In Secure Internet Programming, pages 185–210, 1999.
E.A. Brewer, R.H. Katz, Y. Chawathe, A. Fox, S.D. Gribble, T. Hodes, G. Nguyen, T. Henderson, E. Amir, H. Balakrishnan, A. Fox, V. Padmanabhan, and S. Seshan. A network architecture for heterogeneous mobile computing. IEEE Personal Communications Magazine, 5(5):8–24, 1998.
Harry Chen, Anupam Joshi, Tim Finin, and Dipanjan Chakraborty. Dynamic service discovery for mobile computing: Intelligent agents meet jini in the aether. Baltzer Science Journal on Cluster Computing, Special Issue on Advances in Distributed and Mobile Systems and Communications, 2001.
R. Scott Cost, Tim Finin, Yannis Labrou, Xiaocheng Luan, Ian Soboroff Yun Peng, James Mayfield, and Akram Boughannam. An agent-based infrastructure for enterprise integration. In First International Symposium on Agent Systems and Applications, October 1999.
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, and Randy H. Katz. An architecture for a secure service discovery service. In Fifth Annual International Conference on Mobile Computing and Networks (MobiCom’ 99), pages 24–35, Seattle, 1999.
DAML. Darpa agent markup language specification, http://www.daml.org/.
M. Dunham, P. Chrysanthis, A. Joshi, V. Kumar, K. Ramamritham, O. Wolfson, and S. Zdonik. Issues in wireless data management. Discussion of the wireless data management panel at NSF IDM PIs Meeting, March 2000.
M. Dunham, A. Helal, and S. Balakrishnan. A mobile transaction model that captures both the data and movement behavior. ACM/Baltzer Journal of Mobile Networks and Applications, 2(2):149–162, 1997.
Carl M. Ellison, Bill Frantz, and Brian M. Thomas. Simple public key certificate. Internet document, 1996.
Mike Esler, Jeffrey Hightower, Tom Anderson, and Gaetano Borriello. Next century challenges: Data-centric networking for invisible computing. In Mobile Computing and Networking, pages 256–262, 1999.
FIPA. FIPA 97 specification part 2: Agent communication language. Technical report, FIPA-Foundation for Intelligent Physical Agents, october 1997.
Internet Engineering Task Force. Public-key infrastructure (x.509), http://www.ietf.org/html.charters/pkix-charter.html.
Armando Fox, Brad Johanson, Pat Hanrahan, and Terry Winograd. Integrating information appliances into an interactive workspace. IEEE Computer Graphics and Applications, 20(3), 2000.
Benjamin Grosof and Yannis Labrou. An approach to using xml and a rule-based content language with an agent communication language, 1999.
Z. J. Has. Panel report on ad hoc networks-MILCOM’97. Mobile Computing and Communications Review, 2(1), January 1998.
A. Helal, M. Wang, A. Jagatheesan, and R. Krithivasan. Brokering based self-organizing e-service communities. In Fifth International Symposium on Autonomous Decentralized Systems (ISADS), Dallas, Texas, March 2001.
T. Hodes and R. H. Katz. A document-based framework for internet application control. In Proceedings of the Second USENIX Symposium on Internet Technologies and Systems, October 1999.
W. Johnston and C. Larsen. A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments. Technical Report Technical Report 3885, Lawrence Berkeley National Laboratory, 1996.
A. Joshi, S. Weerawarana, and E. N. Houstis. Disconnected Browsing of Distributed Information. In Proc. Seventh IEEE Intl. Workshop on Research Issues in Data Engineering, pages 101–108. IEEE, April 1997.
Anupam Joshi. On proxy agents, mobility and web access. ACM/Baltzer Journal of Mobile Networks and Applications, 2000. (accepted for publication, also availbe as UMBC CS TR 99-02).
Lalana Kagal, Tim Finin, and Yun Peng. A framework for distributed trust management. In To appear in proceedings of IJCAI-01 Workshop on Autonomy, Delegation and Control, 2001.
Lalana Kagal, Vlad Korolev, Harry Chen, Anupam Joshi, and Tim Finin. Centaurus: A framework for intelligent services in a mobile environment. In Proceedings of International Workshop on Smart Appliances and Wearable Computing (IWSAWC), The 21st International Conference on Distributed Computing Systems (ICDCS-21) April 16-19, 2001.
Lalana Kagal, Vladimir Korolev, Sasikanth Avancha, Anupam Joshi, Timothy Finin, and Yelena Yesha. A highly adaptable infrastructure for service discovery and management in ubiquitous computing. Technical Report TR CS-01-06, Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County, 2001.
R. H. Katz, E. A. Brewer, E. Amir, H. Balakrishnan, A. Fox, S. Gribble, T. Hodes, D. Jiang, G. T. Nguyen, V. Padmanabhan, and M. Stemm. The bay area research wireless access network (barwan). In Proceedings Spring COMPCON Conference, 1996.
Yannis Labrou, Tim Finin, and Yun Peng. Agent communication languages: The current landscape. IEEE Intelligent Systems, 14(2):45–52, / 1999.
Li, Feigenbaum, and Grosof. A logic-based knowledge representation for authorization with delegation. In PCSFW: Proceedings of The 12th Computer Security Foundations Workshop. IEEE Computer Society Press, 1999.
M. Liljeberg, M. Kojo, and K. Raatikainen. Enhanced services for world-wide web in mobile wan environment. http://www.cs.Helsinki.FI/research/mowgli/mowglipapers.html, 1996.
D. Maltz and P. Bhagwat. Msocks: An architecture for transport layer mobility. In Proc. IEEE Infocom 98, San Francisco, pages 1037–1045, April 1998.
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. IEEE Proceedings of the 17th Symposium, 1996.
S. Muthukrishnan, Rittwik Jana, Theodore Johnson, and Andrea Vitaletti. Location based services in a wireless wan using cellular digital packet data (cdpd). In Proceedings of the 2nd ACM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDE01), May 2001.
B. D. Noble, M. Satyanarayanan, D. Narayanan, J. E. Tilton, J. Flinn, and K. R.Walker. Agile application-aware adaptation for mobility. In Proceedings of the 16th ACM Symposium on Operating System Principles.
Bill Schilit, Norman Adams, and Roy Want. Context-aware computing applications. In IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, US, 1994.
Reticular Systems. The yellowstone project.
Mark Taylor, William Waung, and Mohsen Banan. Internetwork Mobility: The CDPD Approach. Professional Technical Reference. Prentice Hall, 1996.
W. J. Tolone, B. Chu, J. Long, T. Finin, and Y. Peng. Supporting human interactions within integrated manufacturing systems. International Journal of Agile Manufacturing, 1998. To appear.
W3C. Xml signature http://www.w3.org/signature/.
PhilipR. Zimmermann. The Official PGP Userx2019;s Guide. MIT Press, Cambridge, MA, USA, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Finin, T., Joshi, A., Kagal, L., Ratsimore, O., Korolev, V., Chen, H. (2001). Information Agents for Mobile and Embedded Devices. In: Klusch, M., Zambonelli, F. (eds) Cooperative Information Agents V. CIA 2001. Lecture Notes in Computer Science(), vol 2182. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44799-7_30
Download citation
DOI: https://doi.org/10.1007/3-540-44799-7_30
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42545-8
Online ISBN: 978-3-540-44799-3
eBook Packages: Springer Book Archive