請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/10139完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 傅立成(Li-Chen Fu) | |
| dc.contributor.author | Chun-Feng Liao | en |
| dc.contributor.author | 廖峻鋒 | zh_TW |
| dc.date.accessioned | 2021-05-20T21:04:51Z | - |
| dc.date.available | 2014-07-26 | |
| dc.date.available | 2021-05-20T21:04:51Z | - |
| dc.date.copyright | 2011-07-26 | |
| dc.date.issued | 2011 | |
| dc.date.submitted | 2011-07-06 | |
| dc.identifier.citation | [1] Common Object Request Broker Architecture Specifications. Object Management Group (OMG), 1994.
[2] Wireless Application Protocol Architecture Specification. 1998. [3] Salutation Architecture. Salutation Consortium, 1999. [4] Wireless Application Protocol Wireless Session Protocol Specification. 1999. [5] Wireless Application Protocol Wireless Transaction Protocol Specification. 1999. [6] CORBA Trading Object Service Specification, Version 1.0. Object Management Group (OMG), 2000. [7] Bluetooth Service Discovery Application Profile, v.1.1. The Bluetooth Special Interest Group, 2001. [8] OWL Web Ontology Language Overview. W3C Recommendation. World Wide Web Consortium, 2004. [9] Web Services Security: SOAP Message Security 1.1 (WS-Security). 2004. [10] FIPA: The Foundation for Intelligent Physical Agents. IEEE, 2005. [11] OSGi Service Platform Release 4. OSGi Alliance, 2007. [12] Simple Object Access Protocol (SOAP) version 1.2, W3C Recommendation. WWW Consortium, 2007. [13] FIPA Agent Management Specification. IEEE, 2008. [14] SPARQL Query Language for RDF. W3C Recommendation. World Wide Web Consortium, 2008. [15] UPnP Device Architecture 1.1, ISO/IEC DIS 29341. UPnP Forum, 2008. [16] ZigBee Specification 053474r17. 2008. [17] G. D. Abowd. Software engineering issues for ubiquitous computing. In Proc.21st International Conference on Software Engineering (ICSE ’99), pages 75–84, 1999. [18] W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley. The design and implementation of an intentional naming system. In Proc. 17th Symposium on Operating System Principles, 1999. [19] F. K. Aldrich. Inside the Smart Home. Springer-Verlag London Limited, 2003. [20] K. Arnold, B. O’Sullivan, R. Scheifler, J. Waldo, and A. Wollrath. The Jini Specification. Addison-Wesley, 1999. [21] J. C. Augsto and C. D. Nugent. Designing Smart Homes. Springer-Verlag, Berlin,2006. [22] J. W. Backus. The syntax and semantics of the proposed international algebraic language of the zurich acm-gamm conference. In Proc. International Conference on Information Processing, pages 125–132, 1959. [23] H. Balakrishnan, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Looking up data in p2p systems. Communications of the ACM, 46(2), 2003. [24] G. Banavar, T. Chandra, R. Strom, and D. Sturman. A case for message oriented middleware. In Proc. 13th International Symposium on Distributed Computing (DISC’99), 1999. [25] W. C. Barker. NIST 800-67 Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. 2008. [26] A. Bedrouni, R. Mittu, A. Boukhtouta, and J. Berger. Distributed Intelligent Systems: A Coordination Perspective. Springer, 2009. [27] F. Bellifemine, G. Caire, and D. Greenwood. Developing Multi-Agent Systems with JADE. John Wiley & Sons, Ltd., 2007. [28] J. A. Bergstra, A. Ponse, and S. A. Smolka. The Handbook of Process Albegra. Elsevier, 2001. [29] C. Bettini and D. Riboni. Profile aggregation and policy evaluation for adaptive internet service. In Proc. IEEE International Conference on Mobile and Ubiquitous Systems, pages 290–298, 2004. [30] C. M. Bishop. Pattern Recognition and Machine Learning. Springer, 2006. [31] G. Booch, I. Jacobson, and J. Rumbaugh. the Unified Modeling Language Specification, Version 1.3. 2000. [32] A. Bottaro and R. S. Hall. Dynamic selection and ranking in context-aware service composition. In Proc. of the 6th International Conference on Software Composition (LNCS 4829, SC 2007). [33] J. Bronsted, K. M. Hansen, and M. Ingstrup. Service composition issues in pervasive computing. IEEE Pervasive Computing, 9(1):62–70, 2010. [34] B. Cain, S. Deering, and I. Kouvelas. Internet Group Management Protocol, Version 3, RFC 3376. 2002. [35] M. Calder, M. Kolberg, E. H. Magil, and S. R. Marganiec. Feature interaction: a critical review and considered forecast. Computer Networks, 41(1):115–141, 2003. [36] V. Cepa. Attribute Enabled Software Development. VDM Verlag Dr. Mueller, 2007. [37] R. Cerqueira, C. Cassino, and R. Ierusalimschy. Dynamic component gluing across different componentware systems. In Proc. International Symposium on Distributed Objects and Applications (DOA’99), pages 362–371, 1999. [38] D. Chappel. Trouble with CORBA. 1998. [39] H. Chen. An Intelligent Broker Architecture for Pervasive Context-Aware Systems. PhD thesis, 2004. [40] H. Chen, T. Finin, and A. Joshi. Semantic web in in the context broker architecture. In Proc. IEEE International Conference on Pervasive Computer and Communications (PerCom’04), 2004. [41] H. Chen, T. Finin, and A. Joshi. The SOUPA Ontology for PervasiveComputing. Springer-Verlag, 2005. [42] C. Curino, M. Giani, M. Giorgetta, A. Giusti, A. L. Murphy, and G. P. Picco. Mobile data collection in sensor networks: The tinylime middleware. Journal of Pervasive and Mobile Computing, 4(1):446–469, 2005. [43] C. Dabrowski and K. Mills. Understanding self-healing in service discovery systems. In Proc. Workshop on Self-healing systems, 2002. [44] C. Dabrowski, K. Mills, and S. Quirolgico. Understanding failure response in service discovery systems. The Journal of Systems and Software, 80(6):896–917, 2007. [45] J. Daemen. The design of Rijndael: AES-the advanced encryption standard. 2002. [46] A. K. Dey. Providing Architectural Support for Building Context-Aware Applications. PhD thesis, 2000. [47] A. K. Dey. Understanding and using context. Personal and Ubiquitous Computing, 1(5), 2001. [48] A. K. Dey, T. Sohn, S. Streng, and J. Kodama. icap: Interactive prototyping of context-aware applications. In Proc. of International Conference on Pervasive Computing (Pervasive’06). Springer, 2006. [49] T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1, RFC 4346”. 2006. [50] S. Dixit and R. Prasad. Home Networking Challenges. Wiley-Inderscience, 2008. [51] D. Eastlake and P. Jones. RFC 3174 - US Secure Hash Algorithm 1 (SHA1). 2001. [52] W. K. Edwards. Discovery systems in ubiquitous computing. IEEE Pervasive Computing, 5(2), 2006. [53] W. K. Edwards and R. E. Grinter. At home with ubiquitous computing: Seven challenges. In Proc. 3rd International Conference on Ubiquitous Computing (UbiComp’01), pages 256–272, 2001. [54] C. Ellison. UPnP Security Ceremonies Design Document. 2003. [55] P. T. Eugster, P. A. Felber, R. Guerraoui, and A. M. Kermarrec. The many faces of publish-subscribe. ACM Computing Survey, 35(2), 2003. [56] J. Flinn, D. Narayanan, and M. Satyanarayanan. Self-tuned remote execution for pervasive computing. In Proc. IEEE Workshop on Hot Topics in Operating Systems, 2001. [57] S. Floyd, V. Jacobson, C. Liu, S. McCanne, and L. Zhang. A reliable multicast framework for light-weight sessions and application level framing. IEEE/ACM Transactions on Networking, 5(6), 1997. [58] D. Garlan, D. Siewiorek, A. Smailagic, and P. Steenkiste. Project aura: Towards distraction-free pervasive computing. IEEE Pervasive Computing, 21(2), 2002. [59] D. Gelernter. Generative communication in linda. ACM Transactions on Programming Languages and Systems, 7(1), 1985. [60] L. Gong. Jxta: a network programming environment. IEEE Internet Computing, 5(3):88 – 95, 2001. [61] R. Grimm. One.world: Experiences with a pervasive computing architecture. IEEE Pervasive Computing, 3(3), 2004. [62] R. Grimm, J. Davis, B. Hendrickson, E. Lemar, A. MacBeth, S. Swanson, T. Anderson, B. Bershad, G. Borriello, S. Gribble, and D. Wetherall. Systems directions for pervasive computing. In Proc. 8th Workshop on Hot Topics in Operating Systems, 2001. [63] R. Grimm, J. Davis, E. Lemar, A. MacBeth, S. Swanson, T. Anderson, B. Bershad, G. Borriello, S. Gribble, and D. Wetherall. System support for pervasive applications. ACM Trans. on Computer Systems, 22(4), 2004. [64] T. Gu, H. K. Pung, and D. Q. Zhang. Toward an osgi-based infrastructure for context-aware applications. IEEE Pervasive Computing, 3(4), 2004. [65] T. Gu, H. K. Pung, and D. Q. Zhang. A service-oriented middleware for building context-aware services. Journal of Network and Computer Applications, 28, 2005. [66] S. Guan. IGMP-extension User Manual. 2009. [67] E. Guttman. Service location protocol: automatic discovery of ip network services.IEEE Internet Computing, 3(4):71–80, 1999. [68] R. Harper. Inside the Smart Home. Springer-Verlag, London, 2003. [69] M. Henning. The rise and fall of corba. ACM Queue, 2006. [70] C. A. R. Hoare. Communicating sequential processes. Communications of the ACM, 21(8), 1978. [71] G. Hohpe and B. Woolf. Enterprise Integration Patterns. Addison Wesley, MA, 2004. [72] J. I. Hong and J. A. Landay. An infrastructure approach to context-aware computing. Human-Computer Interaction, 16(2):287–303, 2001. [73] C. L. Hu, Y. J. Huang, and W. S. Liao. Multicast complement for efficient upnp eventing in home computing network. In Proc. IEEE International Conference on Portable Information Devices (PORTABLE’07), 2007. [74] T. Issariyakul and E. Hossain. Introduction to Network Simulator NS2. Springer, 2008. [75] J. S. R. Jang. Anfis: adaptive-network-based fuzzy inference system. IEEE Transactions on Systems, Man and Cybernetics, 22(3):665–685, 1993. [76] B. Johanson. Application Coordination Infrastructure for Ubiquitous Computing Rooms. PhD thesis, 2002. [77] B. Johanson and A. Fox. The event heap: A coordination infrastructure for interactive workspaces. In Proc. IEEE Workshop on Mobile Computing Systems and Applications, 2002. [78] Y. W. Jong, C. F. Liao, and L. C. Fu. A rotating roll-call-based adaptive failure detection and recovery protocol for smart home environments. In Proc. 7th International Conference On Smart homes and health Telematics (ICOST’09), 2009. [79] M. B. Juric. Business Process Execution Language for Web Services BPEL and BPEL4WS. Packt Publishing, 2 edition, 2006. [80] S. Kalasapur, M. Kumar, and B. Shirazi. Evaluating service oriented architecture (soa) in pervasive computing. In Proc. IEEE International Conference on Pervasive Computing and Communications (PerCom’06), 2006. [81] D. O. Keck and P. J. Kuehn. The feature and service interaction problem in telecommunications system: A survey. IEEE Transactions on Software Engineering, 24(10):779–796, 1998. [82] T. Kindberg and A. Fox. System software for ubiquitous computing. IEEE Pervasive Computing, 1(1), 2002. [83] M. Klusch and A. Gerber. Fast composition planning of owl-s services and application. In Proc. European Conference on Web Services, 2006. [84] G. Klyne, F. Reynolds, C. Woodrow, H. Ohto, J. Hjelm, M. H. Butler, and L. Tran. Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0. W3C Recommendation. 2004. [85] S. Knauth, R. Kistler, D. Kaslin, and A. Klapproth. Upnp compression implementation for building automation devices. In Proc. 5th IEEE International Conference on Industrial Informatics, 2007. [86] M. Kolberg, E. H. Magill, and M. Wilson. Compatibility issues between services supporting networked appliances. IEEE Communications, 41(11):136–147, 2003. [87] G. Kotz and D. Solar: Towards a flexible and scalable data-fusion infrastructure for ubiquitous computing. In Proc. ACM International Conference on Ubiquitous Computing (UbiComp’01), 2001. [88] S. Kumar, P. R. Cohen, and H. J. Levesque. The adaptive agent architecture: Achieving fault-tolerance using persistent broker teams. In Proc. 4th International Conference on Multi-Agent Systems, pages 159–166, 2000. [89] L. Lamport. The temporal logic of actions. ACM Transactions on Programming Languages and Systems, 16(3), 1994. [90] G. Lee, P. Faratin, S. Bauer, and J. Wroclawski. A user-guided cognitive agent for network service selection in pervasive computing environments. In Proc. of IEEE International Conference on Pervasive Computing and Communications, 2004. [91] Y. Li, J. Huai, H. Sun, T. Deng, and H. Guo. Pass: An approach to personalized automated service composition. In Proc. of IEEE International Conference on Service Computing, pages 283–290, 2008. [92] S. Loke. Context-Aware Pervasive Systems - Architectures for a New Breed of Applications. Auerback Publications, Taylor & Francis Group, 2007. [93] H. K. Low, D. Chieng, A. K. Mustapha, Y. C. Ngeow, and E. Goh. A feature interaction conflicts detection engine for pervasive networked environment. In Proc. International Conference on Multimedia and Ubiquitous Engineering, pages 891–896, 2007. [94] C. H. Lu and L. C. Fu. Robust location-aware activity recognition using wireless sensor networks in an attentive home. IEEE Transactions on Automation Science and Engineering, 2008. [95] E. H. Mamdani and S. Assilian. An experiment in linguistic synthesis with a fuzzy logic controller. International Journal on Man Machine Studies, 7(1), 1975. [96] M. I. Mandel, G. E. Poliner, and D. P. W. Ellis. Support vector machine active learning for music retrieval. ACM Journal of Multimedia System, 21(1):3–13, 2005. [97] W. C. Mann and B. R. Milton. Home Automation and Smart Environments to Support Independence. John Wilery & Sons, 2005. [98] C. D. Manning, P. Raghavan, and H. Schutze. An Introduction to Information Reterival. Cambridge University Press, 2009. [99] D. Martin, M. Burstein, J. Hobbs, O. Lassila, D. M. Dermott, S. Mcllraith, S. Narayanan, M. Paolucci, B. Parsia, T. Payne, E. Sirin, N. Srinivasan, and K. Sycara. OWL-S: Semantic Markup for Web Services. 2004. [100] Y. Mazuryk and J. J. Lukkien. Analysis and improvements of the eventing protocol for universal plug and play. In Proc. IASTED Conference on Communications, Internet and Information Technology, 2004. [101] J. McCarthy. Circumscription a form of non-monotonic reasoning. Artificial Intelligence, 13:27–39, 1980. [102] E. Meshkova, J. Riihijarvi, M. Petrova, and P. Mahonen. A survey on resource discovery mechanisms, peer-to-peer, and service discovery frameworks. Computer Networks, 52(11):2097–2128, 2008. [103] N. Milanovic and M. Malek. Current solutions for web service composition. IEEE Internet Computing, 8(6):51–59, 2004. [104] T. P. Moran and P. Dourish. Human-Computer Interaction, volume 16. Lawrence Erlbaum Associates, 2001. [105] A. L. Murphy, G. P. Picco, and G. C. Roman. Lime: A coordination model and middleware supporting mobility of hosts and agents. ACM Transactions on Software Engineering and Methodology, 15(3):279–328, 2006. [106] K. Nakamura, M. Ogawa, T. Koita, and K. Sato. Implementation and evaluation of caching method to increase the speed of upnp gateway. In Proc. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC’08), 2008. [107] M. Nakamura, H. Igaki, and K. Matsumoto. Feature interactions in integrated services of networked home appliances -an object-oriented approach. In Proceedings of International Conference on Feature Interactions in Telecommunication Networks and Distributed Systems, pages 236–251, 2005. [108] M. Paolucci, T. Kawamura, T. R. Payne, and K. Sycara. Semantic matching of web services capabilities. In Proc. of International Semantic Web Conference (ISWC). [109] V. Poladian, D. Garlan, and M. Shaw. Selection and configuration in mobile environments: A utility-based approach. In Proc. Fourth Workshop on Economics-Driven Software Engineering Research, 2002. [110] S. Ponnekanti, B. Lee, A. Fox, P. Hanrahan, and T. Winograd. Icrafter: A service framework for ubiquitous computing environments. In Proc. 3rd International Conference on Ubiquitous Computing, pages 56–75, 2001. [111] A. Ranganathan, S. Chetan, J. A. Muhtadi, R. H. Campbell, and M. D. Mickunas. Olympus: A high-level programming model for pervasive computing environments. In Proc. 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom’05), pages 7–16, 2005. [112] M. Rausand and A. Hoyland. System Reliability Theory: Models, Statistical Methods, and Applications. Wiley, 2 edition, 2004. [113] C. J. V. Rijsbergen. Information Retrieval. Butterworth, 2 edition, 1979. [114] M. Roman. An Application Framework for Active Space Applications. PhD thesis, 2003. [115] M. Roman, C. Hess, R. Cerqueira, A. Ranganathan, R. H. Campbell, and K. Nahrstedt. A middleware infrastructure for active spaces. IEEE Pervasive Computing, 1(4), 2002. [116] D. Salber, A. K. Dey, and G. D. Abowd. The context toolkit: Aiding the development of context-enabled applications. In Proc. International Conference on Human Factors in Computing Systems (CHI ’99), 1999. [117] M. Sathya, M. Swarnamugi, P. Dhavachelvan, and G. Sureshkumar. Evaluation of qos based web-service selection techniques for service composition. International Journal of Software Engineering, 1(5):73–90, 2010. [118] M. Satyanarayanan. Mobile information access. IEEE Personal Communication, 3(1), 1996. [119] C. S. Shankar, A. Ranganathan, and R. Campbell. An eca-p policy-based framework for managing ubiquitous computing environments. In Proc. IEEE International Conference on Mobile and Ubiquitous Systems, pages 33–42, 2005. [120] R. Sharp. Principles of Protocol Design. Springer-Verlag, 2008. [121] E. Silva, L. F. Pires, and M. v. Sinderen. A framework for the evaluation of semantics-based service composition approaches. In Proc. of 7th IEEE European Conference on Web Services (ECOWS). [122] H. A. Simon. The Sciences of the Artificial. 1996. [123] E. Sirin, B. Parsia, and J. Hendler. Filtering and selecting semantic web services with interactive composition techniques. IEEE Intelligent Systems, 19(4):42–49, 2004. [124] M. E. Smid and D. K. Branstad. Data encryption standard: past and future. Proceedings of the IEEE, 76(5):550–559, 1988. [125] J. P. Sousa. Scaling Task Management in Space and Time:Reducing User Overhead in Ubiquitous-Computing Environments. PhD thesis, 2005. [126] J. P. Sousa, V. Poladian, D. Garlan, B. Schmerl, and M. Shaw. Task-based adaptation for ubiquitous computing. IEEE Transactions on Systems, Man, and Sybernetics - Part C: Applications and Reviews, 36(3), 2006. [127] E. Souto, G. Guimaraes, G. Vasconcelos, M. Vieira, N. Rosa, and C. Ferraz. A message-oriented middleware for sensor networks. In Proc. International Workshop on Middleware for Ubiquitous and Ad-Hoc Computing, 2004. [128] J. Sun, Y. Liu, J. S. Dong, and C. Q. Chen. Integrating specification and programs for system modeling and verification. In Proc. International Symposium on Theoretical Aspects of Software Engineering, 2009. [129] K. Sycara, M. Paolucci, J. Soudry, and N. Srinivasan. Dynamic discovery and coordination of agent-based semantic web services. IEEE Internet Computing, 8(3):66–73, 2004. [130] H. Takeda, P. Veerkamp, T. Tomiyama, and H. Yoshikawam. Modeling design processes. AI Magazine, 11(4):37–48, 1990. [131] I. Taylor, B. Adamson, I. Downard, and J. Macker. Agentj: Enabling java ns-2 simulations for large scale distributed multimedia applications. In Proc. 2nd International Conference on Distributed Frameworks for Multimedia Applications, pages 1–7, 2006. [132] R. Thiagarajan, M. Stumptner, and W. Mayer. Semantic web service composition by consistency-based model refinement. In Proc. IEEE Asia-Pacific Services Computing Conference, pages 336–343, 2008. [133] D. T. Tran and E. Choi. A reliable udp for ubiquitous communication environments. In Proc. WSEAS International Conference on Computer Engineering and Applications, 2007. [134] S. Tsang and E. H. Magil. Learning to detect and avoid run-time feature interactions in intelligent networks. IEEE Transactions on Software Engineering, 24(10), 1998. [135] V. K. Vaishnavi and W. K. Jr. Design Science Research Methods and Patterns - Innovating Information and Communication Technology. Auerbach Publications, Taylor & Francis Group, 2008. [136] K. Vanthournout, G. Deconinck, and R. Belmans. A taxonomy for resource discovery. Personal and Ubiquitous Computing, 9(2):81–89, 2005. [137] X. H. Wang, D. Q. Zhang, T. Gu, and H. K. Pung. Ontology based context modeling and reasoning using owl. In Proc. of the IEEE Conference on Pervasive Computing and Communications Workshops, 2004. [138] M. Weiser. The computer for the twenty-first century. Scientific American, 265(3):94–104, 1991. [139] P. Welch and J. Martin. Formal analysis of concurrent java systems. In Proc. Communicating Process Architectures, 2000. [140] B. Whetten, S. Kaplan, and T. Montgomery. A high performance totally ordered multicast protocol. In Proc. Of INFOCOMM’95, 1995. [141] T. Winograd. Architectures for cotext. Human-Computer Interaction, 16(2- 4):401–419, 2001. [142] C. L. Wu, C. F. Liao, and L. C. Fu. Service-oriented smart home architecture based on osgi and mobile agent technology. IEEE Transactions on Systems, Man and Cybernetics - Part C, 37(2), 2007. [143] K. Yaghmour, J. Masters, G. B. Yossef, and P. Gerum. System Monitoring, page 85. O’reilly Media, Inc., 2008. [144] Z. Yu, Y. Nakamura, D. Zhang, S. Kajita, and K. Mase. Content provisioning for ubiquitous learning. IEEE Pervasive Computing, 7(4):62–70, 2008. [145] A. Zeidler. Event-based Middleware for Pervasive Computing: Foundations, Concepts, Design. VDM Verlag Dr. Muller, 2007. [146] L. Zeng, B. Benatallah, A. H. H. Ngu, M. Dumas, J. Kalagnanam, and H. Chang. Qos-aware middleware for web services composition. IEEE Transaction on Software Engineering, 30(5), 2004. [147] L. J. Zhang, J. Zhang, and H. Cai. Service Computing. Springer and Tsinghua University Press, 2007. [148] F. Zhu, M. W. Mutka, and L. M. Ni. Service discovery in pervasive computing environments. IEEE Pervasive Computing, 4(4):81–90, 2005. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/10139 | - |
| dc.description.abstract | 智慧家庭主要的願景為透過科技使人們的日常生活更加豐富。此一類型的智慧居住空間具備推測居住者意向並據以提供適切智慧居家服務的能力。大部份的智慧居家服務都由許多高異質性的元件所組成。本論文主要的研究目標即在於設計一組服務管理機制,使得智慧居家服務能夠具備高彈性、強健性、高效能及一致性的特色。
首先,系統的彈性與否大部份取決於其底層之架構型式(Architectural Style),在比較過相關系統與文獻之後可發現訊息導向中介軟體架構(Message-Oriented Middleware, MOM)是最具備彈性且適合佈署於家庭網路之架構型式。在另一方面,雖然許多文獻都指出強健性為智慧家庭系統不可或缺之一環,但可發現在現存研究中對於加強訊息導向架構系統強健性著墨較少。因此,本論文提出一個兼具彈性與強健性的服務管理架構。本研究以嚴謹的正規程序代數(Process Algebra)的方式定義了一個可支援自主型組合、錯誤偵測及錯誤回復之訊息導向服務模型與其通訊協定,並對此一服務模型與協定進行強健性的正規驗證及實際的回復率與效能測試實驗。 其次,在智慧家庭中,無目錄式服務管理協定(如通用型隨插即用協定)被認為是較為適合管理智慧家庭服務的機制。此類協定大都以IP群播加以實現,但經常造成網路擁塞的問題。因此,基於前述之訊息導向服務模型,本研究提出一套可有效降低冗餘封包數量,進而提昇網路效能的機制來改善無目錄式服務管理協定所造成之網路擁塞的問題。經過分析與網路模擬實驗,可發現二者之間具有相當高的一致性,且均具備大幅提昇網路效能的效果。 近年來,有不少研究著重於普及服務的組合議題。在組合普及服務之前,使用者必須先行提出偏好(Preference),但使用者之偏好不確定性高且可能彼此衝突。由於居家環境經當變動,也很可能造成所啟動之服務之間的相互衝突。為了解決這些問題,本研究提出一組可同時表達列舉/可數及必要/可商議概念之偏好表示式(Preference Expression)。此一機制配合本研究所發展之一套可驗證的邏輯結合規則(Unification Rules),可將不一致的使用者偏好表示式整合為一致的表示式。接下來並提出一套以模糊邏輯為基礎的方法,基於環境式情境資訊,評估已啟動服務間相互衝突之嚴重程度。經過實驗可發現,藉由整合上述機制,可同時維持相當高的服務組合之品質及成功率。 最後,本研究整合上述機制進行實作,並實際將多個智慧居家服務佈署於二個不同智慧實驗屋,以驗證所提出之各項機制之可行性。 | zh_TW |
| dc.description.abstract | The concept of Smart Home envisions a technology-enriched living space that is capable of anticipating intensions of occupants and providing appropriate services accordingly. Most of the services in such space are context-aware and are realized by an assemblage of heterogeneous components. The objective of this thesis is to design a suite of service management mechanisms that makes such context-aware services flexible, robust, efficient, and consistent.
The flexibility heavily depends on the underlying architecture style. After a thorough review on existing representative pervasive systems, it is concluded that the Message-Oriented Middleware (MOM) is one of the most flexible architecture styles for the Smart Home. Meanwhile, robustness is one of the key challenges for the Smart Home, but few researches have been done to improve the robustness of Message-Oriented Smart Home systems. Hence, this research work attempts to propose a flexible and robust service management framework by formally defining an MOM-based service application model and protocols that facilitate autonomous composition, failure detection and recovery of services. The proposed approach is evaluated by first proving the reliability property and then conducting experiments on recovery rate as well as performance. Decentralized service management protocols such as UPnP are believed to be more suitable for Smart Homes. These protocols are usually realized by using IP multicast, which, if not carefully designed, often suffer from network flooding problems. This research proposes several efficiency boosting techniques that reduce the replications of unnecessary messages. The analytical predictions agree well with the simulated and experimental results, which show that the traffic can be greatly reduced by the proposed approaches. Pervasive service composition also attracts increasing interests. When composing services, the criteria for scoring and electing services are usually specified by users, which tend to be vague and subjective. Moreover, the deployment of services in smart homes is usually not as well-planned as that in traditional enterprise environments. Hence, the criteria can be contradictory and the activated components can interfere with one another. This thesis addresses these issues by first proposing the Preference Expression that is capable of specifying both enumerative/numeric as well as mandatory/negotiable preferences. Then, a set of unification rules for unifying conflicting preferences is presented. Finally, this thesis proposes a Fuzzy-based approach to estimate the degree of interference based on available context information. By incorporating the above-mentioned mechanisms, an integrated service composition framework is presented. Experiments that evaluate the effectiveness of the proposed framework are also conducted and reported. | en |
| dc.description.provenance | Made available in DSpace on 2021-05-20T21:04:51Z (GMT). No. of bitstreams: 1 ntu-100-D93922006-1.pdf: 3330403 bytes, checksum: 6b717a5e6cd4e7e5159f5eca12821c9e (MD5) Previous issue date: 2011 | en |
| dc.description.tableofcontents | Acknowledgements (In Chinese) i
Abstract (In Chinese) iii Abstract v Contents vii List of Figures x List of Tables xiii 1 Introduction 1 1.1 Research Challenges and Objectives . . . . . . . . . . . . . . . . . . . . 3 1.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.3 Research Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 Research Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.5 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2 Background and Related Work 11 2.1 Pervasive Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.1.1 The Context Toolkits (CTK) . . . . . . . . . . . . . . . . . . . 14 2.1.2 Universal Plug and Play (UPnP) . . . . . . . . . . . . . . . . . 16 2.1.3 The Gaia Meta-Operating System (Gaia OS) . . . . . . . . . . . 19 2.1.4 The Aura Platform . . . . . . . . . . . . . . . . . . . . . . . . . 21 2.1.5 CoBra (Context Broker Architecture) . . . . . . . . . . . . . . . 23 2.1.6 SOCAM (Service-Oriented Context-Aware Middleware) . . . . . 24 2.1.7 Tuple Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.1.8 Message-Oriented Middleware (MOM) . . . . . . . . . . . . . . 26 2.2 Pervasive Service Discovery . . . . . . . . . . . . . . . . . . . . . . . . 29 2.2.1 Service Discovery in CTK . . . . . . . . . . . . . . . . . . . . . 31 2.2.2 Service Discovery in GaiaOS . . . . . . . . . . . . . . . . . . . . 33 2.2.3 CoBra/JADE Service Discovery . . . . . . . . . . . . . . . . . . 36 2.2.4 Aura/Jini . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 2.2.5 Service Discovery in One.world . . . . . . . . . . . . . . . . . . 41 2.2.6 Bluetooth SDP (Bluetooth’s Service Discovery Protocol) . . . . 42 2.2.7 Simple Service Discovery Protocol (SSDP) . . . . . . . . . . . . 43 2.3 Pervasive Service Composition . . . . . . . . . . . . . . . . . . . . . . . 46 2.3.1 Unifying Inconsistent User Preferences . . . . . . . . . . . . . . 47 2.3.2 Dealing with Inconsistent Service Effects . . . . . . . . . . . . . 49 2.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 3 Flexible and Robust Service Management in a Smart Home 56 3.1 Pervasive Service Application Model (PerSAM) . . . . . . . . . . . . . 58 3.1.1 The Pervasive Communities . . . . . . . . . . . . . . . . . . . . 61 3.1.2 The Pervasive Managers . . . . . . . . . . . . . . . . . . . . . . 66 3.2 Pervasive Service Management Protocol (PSMP) . . . . . . . . . . . . . 68 3.2.1 Presence Announcement, Leave Announcement, and Life-cycle Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 3.2.2 Service Composition and Activation . . . . . . . . . . . . . . . . 71 3.2.3 Failure Detection and Recovery . . . . . . . . . . . . . . . . . . 76 3.2.4 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 3.3 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 3.3.1 Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 3.3.2 Recovery Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 3.3.3 Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 3.3.4 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 3.4 Summary: A Running Scenario . . . . . . . . . . . . . . . . . . . . . . 96 4 Efficiency Boosting Schemes for UPnP-based Smart Home Networks 98 4.1 Assumptions and Term Definitions . . . . . . . . . . . . . . . . . . . . 100 4.2 Decomposing the Multicast Traffic . . . . . . . . . . . . . . . . . . . . 104 4.3 Service-based Node Searching . . . . . . . . . . . . . . . . . . . . . . . 108 4.4 Reducing the Heartbeat Traffic . . . . . . . . . . . . . . . . . . . . . . 110 4.5 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 4.5.1 Communication Complexity . . . . . . . . . . . . . . . . . . . . 114 4.5.2 NS-2 Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . 117 4.5.3 Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 4.5.4 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 4.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 5 Consistent Service Composition in a Smart Home 132 5.1 Overall Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 5.1.1 Capabilities and Preferences for Service Composition . . . . . . 135 5.1.2 The Enhanced Architecture for Pervasive Service Composition . 140 5.1.3 Dynamic Contextual Node Re-binding . . . . . . . . . . . . . . 141 5.2 Specifying and Unifying User Preferences . . . . . . . . . . . . . . . . . 142 5.2.1 Enumerative Preference Expressions . . . . . . . . . . . . . . . . 143 5.2.2 Numeric Preference Expressions . . . . . . . . . . . . . . . . . . 154 5.3 Type-based Node Searching . . . . . . . . . . . . . . . . . . . . . . . . 166 5.4 Candidate Scoring and Selection . . . . . . . . . . . . . . . . . . . . . . 168 5.4.1 Estimating the Degree of Interference . . . . . . . . . . . . . . . 169 5.4.2 Scoring Candidate Worker Nodes . . . . . . . . . . . . . . . . . 175 5.5 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 5.5.1 Application Scenario . . . . . . . . . . . . . . . . . . . . . . . . 179 5.5.2 Quality Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 5.5.3 Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 5.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 6 Implementation 191 7 Conclusion and Future Work 199 7.1 Summary of Contribution . . . . . . . . . . . . . . . . . . . . . . . . . 199 7.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Bibliography 205 | |
| dc.language.iso | en | |
| dc.title | 智慧家庭中的情境感知普及服務管理機制 | zh_TW |
| dc.title | Context-Aware Pervasive Service Management in Smart Home Environments | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 99-2 | |
| dc.description.degree | 博士 | |
| dc.contributor.oralexamcommittee | 曾煜棋,逄愛君,林風,郭耀煌,李蔡彥,陳良弼,馮明惠 | |
| dc.subject.keyword | 普及計算,通用型隨插即用協定,簡單服務管理協定,智慧家庭,服務模型,服務發現架構,IP群播,服務系統,服務組合,使用者偏好, | zh_TW |
| dc.subject.keyword | Pervasive Computing,UPnP,SSDP,Smart Home,Context-Aware,Services Models,Services Discovery Architecture,IP Multicast,Service Systems,Service Composition,Feature Interaction,Preferences, | en |
| dc.relation.page | 219 | |
| dc.rights.note | 同意授權(全球公開) | |
| dc.date.accepted | 2011-07-06 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
| 顯示於系所單位: | 資訊工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-100-1.pdf | 3.25 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
