skip to main content
article

A mobile computing middleware for location- and context-aware internet data services

Published:01 November 2006Publication History
Skip Abstract Section

Abstract

The widespread diffusion of mobile computing calls for novel services capable of providing results that depend on both the current physical position of users (location) and the logical set of accessible resources, subscribed services, preferences, and requirements (context). Leaving the burden of location/context management to applications complicates service design and development. In addition, traditional middleware solutions tend to hide location/context visibility to the application level and are not suitable for supporting novel adaptive services for mobile computing scenarios. The article proposes a flexible middleware for the development and deployment of location/context-aware services for heterogeneous data access in the Internet. A primary design choice is to exploit a high-level policy framework to simplify the specification of services that the middleware dynamically adapts to the client location/context. In addition, the middleware adopts the mobile agent technology to effectively support autonomous, asynchronous, and local access to data resources, and is particularly suitable for temporarily disconnected clients. The article also presents the case study of a museum guide assistant service that provides visitors with location/context-dependent artistic data. The case study points out the flexibility and usability of the proposed middleware that permits automatic service reconfiguration with no impact on the implementation of the application logic.

References

  1. Agarwal, S., Starobinski, D., and Trachtenberg, A. 2002. On the scalability of data synchronization protocols for PDAs and mobile devices. IEEE Network 16, 4, 22--28.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Akyildiz, I., Altunbasak, Y., Fekri, F., and Sivakumar, R. 2004. AdaptNet: an adaptive protocol suite for the next-generation wireless internet. IEEE Comm. Magazine 42, 3, 128--136.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Barbarà, D. 1999. Mobile computing and databases---A survey. IEEE Trans. Knowl. Data Engg., 11, 1, 108--117.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bellavista, P. and Corradi, A. 2003. Active middleware for Internet video on demand: the QoS-aware routing solution in ubiQoS. Elsevier Microproc. Microsyst. J. 27, 2, 73--83.]]Google ScholarGoogle ScholarCross RefCross Ref
  5. Bellavista, P., Corradi, A., and Stefanelli, C. 2000a. An integrated management environment for network resources and services. IEEE J. Select. Areas Comm. 18, 5, 676--85.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bellavista, P., Corradi, A., and Stefanelli, C. 2000b. The mobile agent technology to support and to access museum information. In Proceedings of the ACM Symposium on Applied Computing. Como, Italy.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bellavista, P., Corradi, A., and Stefanelli, C. 2001a. Middleware services for interoperability in open mobile agent systems. Elsevier Microproc. Microsyst. J. 25, 2, 75--83.]]Google ScholarGoogle ScholarCross RefCross Ref
  8. Bellavista, P., Corradi, A., and Stefanelli, C. 2001b. Mobile agent middleware for mobile computing. Computer 34, 3, 73--81.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bellavista, P., Corradi, A., and Stefanelli, C. 2002. The ubiquitous provisioning of Internet services to portable devices. IEEE Pervasive Comput. 1, 3, 81--87.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bellavista, P., Corradi, A., Montanari, R., and Stefanelli, C. 2003. Dynamic binding in mobile applications: a middleware approach. IEEE Internet Comput. 7, 2, 34--42.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Bertino, E., Ferrari, E., and Pitoura, E. 2001. An access control mechanism for large scale data dissemination. In Proceedings of the 11th International Workshop on Research Issues in Data Engineering. Heidelberg, Germany.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Bougant, F., Delmond, F., and Pageot-Millet, C. 2003. The user profile for the virtual home environment. IEEE Comm. Magazine 41, 1, 93--98.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Buchholz, S., Ziegert, T., Schill, A., and Held, A. 2000. Transaction processing in a mobile computing environment with alternating client hosts. In Proceedings of the 10th International Workshop on Research Issues in Data Engineering. San Diego, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Capra, L., Emmerich, W., and Mascolo, C. 2003. CARISMA: Context-aware reflective middleware system for mobile applications. IEEE Trans. Softw. Engin. 29, 10, 929--945.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Chan, B. Y., SI, A., and Leong, H. V. 1998. Cache management for mobile databases: Design and evaluation. In Proceedings of the 14th International Conference on Data Engineering. Orlando, FL.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Chen, G. and Kotz, D. 2002. Context aggregation and dissemination in ubiquitous computing systems. In Proceedings of the 4th IEEE Workshop Mobile Computing Systems and Applications. Callicoon, NY.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. COMPAQ. 2004. iPAQ Compaq PC. http://www.compaq.com/products/handhelds/pocketpc/.]]Google ScholarGoogle Scholar
  18. Corradi, A., Montanari, R., Lupu, E., Sloman, M., and Stefanelli, C. 2000. A flexible access control service for Java mobile code. In Proceedings of the 16th Annual Computer Security Applications Conference. New Orleans, LA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Damianou, N., Dulay, N., Lupu, E., and Sloman, M. 2001. The Ponder Policy Specification Language. In Proceedings of the 2th International Workshop on Policies for Distributed Systems and Networks, Bristol, UK.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. de Vergara, J. E. L., Villagra, V. A., and Berrocal, J. 2004. Applying the Web ontology language to management information definitions. IEEE Comm. Magazine 42, 7, 68--74.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Decker, S., Mitra, P., and Melnik, S. 2000. Framework for the semantic Web: an RDF tutorial. IEEE Internet Comput. 4, 6, 68--73.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Dey, A. K. 2001. Understanding and using context. Springer J. Person. Ubiquitous Comput., 5, 1, 4--7.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Frasincar, F., Houben, G.-J., Barna, P., and Pau C. 2003. RDF/XML-based automatic generation of adaptable hypermedia presentations. In Proceedings of the International Conference of Information Technology: Coding and Computing. Las Vegas, NV.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Fricke, S., Bsufka, K., Keiser, J., Schmidt, T., Sesseler, R., and Albayrak, S. 2001. Agent-based telematic services and telecom applications. Comm. ACM, 44, 4, 43--48.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Fuggetta, A., Picco, G. P., and Vigna, G. 1998. Understanding code mobility. IEEE Trans. Softw. Engin. 24, 5, 342--361.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Gadiraju, S. and Kumar, V. 2004. Recovery in the mobile wireless environment using mobile agents. IEEE Trans. Mobile Comput. 3, 2, 180--191.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Jianliang, X., Qinglong, H., Wang-Chien, H. L., and Lee, D. L. 2004. Performance evaluation of an optimal cache replacement policy for wireless data dissemination. IEEE Trans. Knowl. Data Engin. 16, 1, 125--139.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kam-Yiu, L., Mei-Wai, A., and Chan, E. 1999. Broadcast of consistent data to read-only transactions from mobile clients. In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications. New Orleans, LA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Karmouch, A. Ed. 1998. IEEE Comm. Magazine (Special Section on Mobile Agents). 36, 7.]]Google ScholarGoogle Scholar
  30. Koutsonikola, V. and Vakali, A. 2004. LDAP: Framework, practices, and trends. IEEE Internet Comput. 8, 5, 66--72.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Lee, V. C. S., Lam, K.-W., Son, S. H., and Chan, E. Y. M. 2002. On transaction processing with partial validation and timestamp ordering in mobile broadcast environments. IEEE Trans. Comput., 51, 10, 1196--1211.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Leroy, G., Lally, A. M., and Chen, H. 2003. The use of dynamic contexts to improve casual Internet searching. ACM Trans. Inform. Syst. 21, 3, 229--253.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Lim, J. B. and Hurson, A. R. 2002. Transaction processing in mobile, heterogeneous database systems. IEEE Trans. Knowl. Data Engin. 14, 6, 1330--1346.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Mahon, H., Bernet, Y., Herzog, S., and Schnizlein, J. 2000. Requirements for a policy management system. IETF Internet Draft. http://www.ietf.org/internet-drafts/draft-ietf-policy-req-02.txt.]]Google ScholarGoogle Scholar
  35. Mazumdar, S. and Chrysanthis, P. K. 1999. Achieving consistency in mobile databases through localization in PRO-MOTION. In Proceedings of the 10th International Workshop on Database and Expert Systems Applications. Florence, Italy.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Milutinovic, V. Ed. 2000. IEEE Concurrency (Special Issue on Caching in Distributed Systems). 8, 3.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Moffett, J. and Sloman, M. 1993. Policy Hierarchies for distributed systems management. IEEE J. Select. Areas Comm. 11, 9, 1404--1414.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Perkins, C. Ed. 1999. IEEE Internet Comput., (Special Section on Autoconfiguration). 3, 4.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Pitoura, E. and Bhargava, B. 1999. Data consistency in intermittently connected distributed systems. IEEE Trans. Knowl. Data Eng. 11, 6, 896--915.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Pitt, E. and Mcniff, K. 2001. Java RMI: The Remote Method Invocation Guide. Addison Wesley Longman, Boston, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. PONDER. 2004. Imperial College. http://www.dse,ie.ac.uk/research/policies/software/.]]Google ScholarGoogle Scholar
  42. Rutledge, L. 2001. SMIL 2.0: XML for Web Multimedia. IEEE Internet Comput., 5, 5, 78--84.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Saha, D. And Mukherjee, A. 2003. Pervasive computing: A paradigm for the 21st century. Computer 36, 3, 25--31.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Samaras, G., Dikaiakos, M. D., Spyrou, C., and Liverdos, A. 1999. Mobile agent platforms for Web databases: a qualitative and quantitative assessment. In Proceedings of the Joint Symposium on Agent Systems and Application and Mobile Agents, Palm Springs, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Seydim, A. Y., Dunham, M. H., and Kumar, V. 2001. An architecture for location dependent query processing. In Proceedings of the 12th International Workshop Database and Expert Systems Applications. Munich, Germany.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Sloman, M. 1994. Policy driven management for distributed systems. J. Netw. Syst. Manag. 2, 4.]]Google ScholarGoogle ScholarCross RefCross Ref
  47. SOMA. 2004. Secure and open mobile agents (SOMA). University of Bologna. http://lia.deis.unibo.it/Research/SOMA/.]]Google ScholarGoogle Scholar
  48. Steen, M. V., Homburg, P., and Tanenbaum, A. S. 1999. Globe: A wide-area distributed system. IEEE Concurrency 7, 1, 70--78.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Theilmann, W. and Rothermel, K. 1999. Disseminating mobile agents for distributed information filtering. In Proceedings of the Joint Symposium on Agent Systems and Application and Mobile Agents. Palm Springs, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Vogels, W. 2003. Web services are not distributed objects. IEEE Internet Comput., 7, 6, 59--66.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. W3 CONSORTIUM. 2004. Composite capability/preference profiles (CC/PP). http://www.w3.org/Mobile/.]]Google ScholarGoogle Scholar
  52. Wies, R. 1994. Policies in network and system management---Formal definition and architecture. J. Netw. Syst. Manag. 2, 1.]]Google ScholarGoogle ScholarCross RefCross Ref
  53. Zhuang, W., Gan, Y.-S., Loh, K.-J., and Chua, K.-C. 2003. Policy-based QoS management architecture in an integrated UMTS and WLAN environment. IEEE Comm. Magazine 41, 11, 118--125.]]Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A mobile computing middleware for location- and context-aware internet data services

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Internet Technology
              ACM Transactions on Internet Technology  Volume 6, Issue 4
              November 2006
              197 pages
              ISSN:1533-5399
              EISSN:1557-6051
              DOI:10.1145/1183463
              Issue’s Table of Contents

              Copyright © 2006 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 November 2006
              Published in toit Volume 6, Issue 4

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader