Please use this identifier to cite or link to this item:
|Title:||Service adaptation using fuzzy theory in context-aware mobile computing middleware|
|Authors:||Cao, J |
|Keywords:||Fuzzy set theory|
Real-time and embedded systems
System analysis and design
|Publisher:||IEEE Computer Society|
|Source:||Proceedings : 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications : 17-19 August 2005, Hong Kong, China, p. 496-501 How to cite?|
|Abstract:||Context-aware mobile computing middleware is designed to automatically adapt its behavior to changing environment. To achieve this, an important issue to be addressed is how to effectively select services for adaptation according to the user's current context. Existing work does not adequately address this issue. In this paper, we propose a Fuzzy-based Service Adaptation Model (FSAM) that can be used in context-aware middleware. We formulate the service adaptation process by using fuzzy linguistic variables and membership degrees to define the context situations and the rules for adopting the policies of implementing a service. We propose three fitness functions to calculate the fitness degree for each policy based on the distance of fuzzy status between the policy and the current context situation. The decision for service adaptation is achieved by selecting the policy with the largest fitness degree. A context-aware application scenario called Campus Assistant is used to exemplify the proposed service adaptation process and demonstrate its effectiveness.|
|Rights:||© 2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.|
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
|Appears in Collections:||Conference Paper|
Show full item record
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.