2005
DOI: 10.1007/11596356_117
|View full text |Cite
|
Sign up to set email alerts
|

Ubiquitous Computing: Challenges in Flexible Data Aggregation

Abstract: Abstract.A dramatic increase of event monitoring capabilities by wireless sensors requires new, more sophisticated, event correlation over time and space. This new paradigm implies composition of events in ubiquitous computing environments and event Correlation will be a multi-step operation from event sources to final subscribers, combining information collected by wireless devices into higher level information or knowledge. We define generic composite event semantics, which extend traditional event compositi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Edge computing, IoT, and wearable devices collaborate to provide ubiquitous services. 93 The miniaturization of electronic devices equipped with information generation and transfer capabilities gave birth to ubiquitous computing. These devices could generate data and transfer it using the Internet autonomously.…”
Section: Ubiquitous Recommendersmentioning
confidence: 99%
“…Edge computing, IoT, and wearable devices collaborate to provide ubiquitous services. 93 The miniaturization of electronic devices equipped with information generation and transfer capabilities gave birth to ubiquitous computing. These devices could generate data and transfer it using the Internet autonomously.…”
Section: Ubiquitous Recommendersmentioning
confidence: 99%
“…To overcome these problems, [9] presented that they had tried to add the network state information for accuracy during computation. In [6], the authors research about information collection in urban environments; they also studied evolution use by collecting them. However there are problems, like the concentration problem by their gathering.…”
Section: Security Problemsmentioning
confidence: 99%
“…In urban computing, each portion of sensors and device systems are connected over a wireless network and an ad hoc network. Eventually, many attackers may put their attacking devices on a street to get users' entire information [6]. Finally they can get them to know what users have by analyzing the captured contexts.…”
Section: Introductionmentioning
confidence: 99%