Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Deploying Pervasive Technologies

View through CrossRef
Communication technologies are currently addressing our daily lives. Internet, fixed-line networks, wireless networks, and sensor technologies are converging, and seamless communication is expected to become widely available. Meanwhile, the miniaturization of devices and the rapid proliferation of handheld devices have paved the path towards pervasive computing and ubiquitous scenarios. The term ubiquitous and pervasive computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user (Weiser, 1991). Thanks to advances in the devices’ processing power, extended battery life, and the proliferation of mobile computing services, the realization of ubiquitous computing has become more apparent, being a major motivation for developing location and context-aware information delivery systems. Strongly related to ubiquitous computing is context-aware computing. In context-aware computing, the applications may change or adapt their functions, information, and user interface depending on the context and the client’s profile (Weiser, 1993). Many research centers and industries are actively working on the issues of context-awareness or more generally on ubiquitous computing (Baldauf, Dustdar, & Rosenberg, 2007). In particular, several proposals focus on smart spaces and intelligent environments (Harter, Hopper, Steggeles, Ward, & Webster, 1999; Kindberg et al., 2002; Smart-its, 2007), where it is expected that smart devices all around us will maintain updated information about their locations, the contexts in which they are being used, and relevant data about the users. Clearly, contextual services represent a milestone in today’s mobile computing paradigm, providing timely information anytime, anywhere. Nevertheless, there are still few examples of pervasive computing environments moving out from academic laboratories into our everyday lives. This occurs since pervasive technologies are still premature, and also because it is hard to define what a real pervasive system should be like. Moreover, despite the wide range of services and potential smart applications that can benefit from using such systems, there is still no clear insight about a realistic killer application.
Title: Deploying Pervasive Technologies
Description:
Communication technologies are currently addressing our daily lives.
Internet, fixed-line networks, wireless networks, and sensor technologies are converging, and seamless communication is expected to become widely available.
Meanwhile, the miniaturization of devices and the rapid proliferation of handheld devices have paved the path towards pervasive computing and ubiquitous scenarios.
The term ubiquitous and pervasive computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user (Weiser, 1991).
Thanks to advances in the devices’ processing power, extended battery life, and the proliferation of mobile computing services, the realization of ubiquitous computing has become more apparent, being a major motivation for developing location and context-aware information delivery systems.
Strongly related to ubiquitous computing is context-aware computing.
In context-aware computing, the applications may change or adapt their functions, information, and user interface depending on the context and the client’s profile (Weiser, 1993).
Many research centers and industries are actively working on the issues of context-awareness or more generally on ubiquitous computing (Baldauf, Dustdar, & Rosenberg, 2007).
In particular, several proposals focus on smart spaces and intelligent environments (Harter, Hopper, Steggeles, Ward, & Webster, 1999; Kindberg et al.
, 2002; Smart-its, 2007), where it is expected that smart devices all around us will maintain updated information about their locations, the contexts in which they are being used, and relevant data about the users.
Clearly, contextual services represent a milestone in today’s mobile computing paradigm, providing timely information anytime, anywhere.
Nevertheless, there are still few examples of pervasive computing environments moving out from academic laboratories into our everyday lives.
This occurs since pervasive technologies are still premature, and also because it is hard to define what a real pervasive system should be like.
Moreover, despite the wide range of services and potential smart applications that can benefit from using such systems, there is still no clear insight about a realistic killer application.

Related Results

Tools for interdisciplinary design of pervasive computing
Tools for interdisciplinary design of pervasive computing
PurposeTo be successful, pervasive computing requires a balance of computing, design, and business requirements to be considered throughout the design process. Achieving this synth...
Pervasive mobile healthcare systems for chronic disease monitoring
Pervasive mobile healthcare systems for chronic disease monitoring
Pervasive mobile healthcare system has the potential to improve healthcare and the quality of life of chronic disease patients through continuous monitoring. Recently, many article...
Lists, Spatial Practice and Assistive Technologies for the Blind
Lists, Spatial Practice and Assistive Technologies for the Blind
IntroductionSupermarkets are functionally challenging environments for people with vision impairments. A supermarket is likely to house an average of 45,000 products in a median fl...
Cognitive Pervasive Service Composition Applied to Predatory Crime Deterrence
Cognitive Pervasive Service Composition Applied to Predatory Crime Deterrence
Pervasive service composition is useful in many scenarios, for instance, in urban planning or controlled harvest. Currently, there is no standard to develop solutions using pervasi...
Security in Pervasive Computing
Security in Pervasive Computing
Security requirements for pervasive computing environments are different from those in fixed networks. This is due to the intensity and complexity of the communication between the ...
Trauma-Informed Care in Digital Health Technologies: Protocol for a Scoping Review (Preprint)
Trauma-Informed Care in Digital Health Technologies: Protocol for a Scoping Review (Preprint)
BACKGROUND The use of digital health technologies is becoming increasingly common across the globe as they offer immense potential to enhance health care de...
Sensor Networks in Pervasive Healthcare Computing
Sensor Networks in Pervasive Healthcare Computing
Advances in wireless sensor networking (WSN) have opened up new opportunities in distributed informatics. Pervasive healthcare, based on WSN, is an emerging technology area with gr...
Service-Oriented Architectures for Pervasive Computing
Service-Oriented Architectures for Pervasive Computing
The vision of pervasive computing is to create and manage computational spaces where large numbers of heterogeneous devices collaborate transparently to serve the user tasks all th...

Back to Top