Skip to main content

Architecturing Conflict Handling of Pervasive Computing Resources

  • Conference paper
Distributed Applications and Interoperable Systems (DAIS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6723))

Abstract

Pervasive computing environments are created to support human activities in different domains (e.g., home automation and healthcare). To do so, applications orchestrate deployed services and devices. In a realistic setting, applications are bound to conflict in their usage of shared resources, e.g., controlling doors for security and fire evacuation purposes. These conflicts can have critical effects on the physical world, putting people and assets at risk.

This paper presents a domain-specific approach to architecturing conflict handling of pervasive computing resources. This approach covers the software development lifecycle and consists of enriching the description of a pervasive computing system with declarations for resource handling. These declarations are used to automate conflict detection, manage the states of a pervasive computing system, and orchestrate resource accesses accordingly at runtime. In effect, our approach separates the application logic from resource conflict handling. Our approach has been implemented and validated on various building automation applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bruneau, J., Jouve, W., Consel, C.: DiaSim, a parameterized simulator for pervasive computing applications. In: International Conference on Mobile and Ubiquitous Systems (2009)

    Google Scholar 

  2. Calder, M., Miller, A.: Feature interaction detection by pairwise analysis of LTL properties - A case study. Formal Methods in System Design 28(3), 213–261 (2006)

    Article  MATH  Google Scholar 

  3. Cassou, D., Balland, E., Consel, C., Lawall, J.: Architecture-driven programming for sense/compute/control applications. In: International Conference on Systems, Programming, Languages, and Applications: Software for Humanity (2010)

    Google Scholar 

  4. Cassou, D., Balland, E., Consel, C., Lawall, J.: Leveraging software architectures to guide and verify the development of sense/compute/control applications. In: International Conference on Software Engineering (2011)

    Google Scholar 

  5. Cassou, D., Bertran, B., Loriant, N., Consel, C.: A generative programming approach to developing pervasive computing systems. In: International Conference on Generative Programming and Component Engineering (2009)

    Google Scholar 

  6. Dey, A.K., Abowd, G.D., Salber, D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. H.-C. I. 16(2), 97–166 (2001)

    Google Scholar 

  7. Gatti, S., Balland, E., Consel, C.: A step-wise approach for integrating qoS throughout software development. In: Giannakopoulou, D., Orejas, F. (eds.) FASE 2011. LNCS, vol. 6603, pp. 217–231. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Gupta, S.K.S., Mukherjee, T., Venkatasubramanian, K.: Criticality aware access control model for pervasive applications. In: International Conference on Pervasive Computing and Communications (2006)

    Google Scholar 

  9. Haya, P.A., Montoro, G., Esquivel, A., Garíca-Herranz, M., Alamán, X.: A mechanism for solving conflicts in ambient intelligent environments. J. UCS 12(3), 284–296 (2006)

    Google Scholar 

  10. Keck, D.O., Kuehn, P.J.: The feature and service interaction problem in telecommunications systems: A survey. IEEE Transactions on Software Engineering 24, 779–796 (1998)

    Article  Google Scholar 

  11. Retkowitz, D., Kulle, S.: Dependency management in smart homes. In: Senivongse, T., Oliveira, R. (eds.) DAIS 2009. LNCS, vol. 5523, pp. 143–156. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Sampemane, G.: Access Control For Active Spaces. PhD thesis, University of Illinois (2005)

    Google Scholar 

  13. Shin, C., Dey, A.K., Woo, W.: Mixed-initiative conflict resolution for context-aware applications. In: International Conference on Ubiquitous Computing, pp. 262–271 (2008)

    Google Scholar 

  14. Tolone, W., Ahn, G.-J., Pai, T., Hong, S.-P.: Access control in collaborative systems. ACM Computing Surveys 37, 29–41 (2005)

    Article  Google Scholar 

  15. Tuttlies, V., Schiele, G., Becker, C.: Comity - conflict avoidance in pervasive computing environments. In: International Workshop on Pervasive Systems (2007)

    Google Scholar 

  16. Weiser, M.: The computer for the twenty-first century. Scientific American 265, 94–104 (1991)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 IFIP International Federation for Information Processing

About this paper

Cite this paper

Jakob, H., Consel, C., Loriant, N. (2011). Architecturing Conflict Handling of Pervasive Computing Resources. In: Felber, P., Rouvoy, R. (eds) Distributed Applications and Interoperable Systems. DAIS 2011. Lecture Notes in Computer Science, vol 6723. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21387-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21387-8_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21386-1

  • Online ISBN: 978-3-642-21387-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics