5 Conclusions
In this chapter, we have presented an overview of the enabling technologies for the emergence of pervasive computing and communication infrastructures. While the Internet will perhaps continue to be the backbone of pervasive computing, the tremendous advances in wireless mobile communications allow the creation of ubiquitous networks with very little effort and insignificant cost Moreover, wireless communications offer users the luxury of mobility and provide connectivity on the move. Sensor networks, RFID tags, and embedded devices also help in the deployment of environments that are replete with computing and communicating services. Heterogeneous devices and networks, interoperability among disparate entities, and mobility and security will continue to challenge pervasive computing researchers.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley, The design and implementation of an intentional naming system, ACM SIGOPS Operating Systems Review, Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles, 33(5), 186–201.
G. Banavar, J. Beck, and E. Gluzberg (2000): Challenges: An application model for pervasive computing, in Proceedings of 6th Annual International Conference on Mobile Computing and Networking (MOBICOM 2000), pp. 266–274, Boston, MA, USA.
P. Bellavista, A. Corradi, C. Stefanelli (2000): A mobile agent infrastructure for the mobility support, Proceedings of the 2000 ACM Symposium on Applied Computing, pp. 239–245.
A. Bhattacharya and S. K. Das (1999): LeZi-update: An information-theoretic approach to track mobile users in PCS networks, Proc. 6thAnnu. ACM Int. Conf. on Mobile Computing and Networking (MobiCom), pp. 1–12.
A. Bhattacharya and S. K. Das (2002): Lezi-update: An information-theoretic framework for personal mobility tracking in PCS networks, ACM/Kluwer Wireless Networks Journal, 8(2–3), 121–135.
D. J. Cook and S. K. Das (2003): Health monitoring in an agent-based smart home, International Conf. on Aging, Disability and Independence (ICADI), Washington, Dec.
D. J. Cook and S. K. Das (eds) (2004): Smart Environments: Architectures, Protocols and Applications, John Wiley, to appear.
S. K. Das, D. J. Cook, A. Bhattacharya, E. O. Heierman, and T.-Y. Lin (2002): The role of prediction algorithms on the MavHome smart home architectures, IEEE Wireless Communications (Special Issue on Smart Homes), 9(6), 77–84, Dec.
S. K. Das, A. Bhattacharya, A. Roy, and A. Misra (2003): managing location in ‘universal’ location-aware computing, Handbook of Wireless Internet (Eds. B. Furht and M. Ilyas), Chapter 17, pp. 407–425, CRC Press.
S.K. Das and C. Rose (2004): Coping with uncertainty in mobile wireless networks, Proceedings of 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Barcelona, Spain, Sept (Invited Paper).
W.M. Farmer, J.D. Guttman, and V. Swarup (1996): Security for mobile agents, issues and requirements, Proceedings NISSC’96 National Information Systems Security Conf., pp. 591–597, Baltimore, MD, October.
A. Hopper (1999): Sentient computing, The Royal Society Clifford Patterson Lecture, http://www.uk.research.att.com/~hopper/publications.html.
R. Kambalakatta, M. Kumar, and S. K. Das, Profile based caching to enhance data availability in push/pull mobile environments, International Conference on Mobile and Ubiquitous Computing, MobiQuitous 2004, Boston, August 22–25, Boston, USA.
J.J. Kistler and M. Satyanarayanan (1992): Disconnected Operation in the Coda File System, ACM Trans. Comp. Sys. 5(1), February.
M. Kumar, B. Shirazi, S. K. Das, M. Singhal, B. Sung, and D. Levine (2003): Pervasive Information Communities Organization PICO: A middleware framework for pervasive computing, IEEE Pervasive Computing, 72–79.
L.B. Mummert, M.R. Ebling, and M. Satyanarayanan (1995): Exploring weak connectivity for mobile file access, Proc. 15thACM Symp. Op. Sys. Principles, Copper Mountain Resort, CO, December.
N. B. Priyantha, A. Chakraborty, H. Balakrishnan (2000): The Cricket location-support system, Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August, pp. 32–43.
A. Roy, S. K. Das, and A. Misra (2004): Exploiting information theory for adaptive mobility and resource management in future cellular networks, IEEE Wireless Communications (Special Issue on Mobility and Resource Management), Aug, to appear.
M. Satyanarayanan (2001): Pervasive computing: vision and challenges, IEEE Personal Computing.
E. Shih, P. Bahl, and M.J. Sinclair (2002): Wake on wireless: an event driven energy saving strategy for battery operated devices, Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 160–171.
D.L. Tenenhouse (2000): Proactive computing, Communications of the ACM 43:5 (May).
M. Weiser (1991): The computer for the 21st century, Scientific American, 265(3), 94–104.
http://oxygen.lcs.mit.edu/
http://www-2.cs.cmu.edu/~aura/
http://www.cse.uta.edu/~pico@cse
http://ailab.uta.edu/mavhome/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Kumar, M., Das, S.K. (2006). Pervasive Computing: Enabling Technologies and Challenges. In: Zomaya, A.Y. (eds) Handbook of Nature-Inspired and Innovative Computing. Springer, Boston, MA. https://doi.org/10.1007/0-387-27705-6_19
Download citation
DOI: https://doi.org/10.1007/0-387-27705-6_19
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-40532-2
Online ISBN: 978-0-387-27705-9
eBook Packages: Computer ScienceComputer Science (R0)