An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.

Slides:



Advertisements
Similar presentations
ARCHITECTURES FOR ARTIFICIAL INTELLIGENCE SYSTEMS
Advertisements

Martin Wagner and Gudrun Klinker Augmented Reality Group Institut für Informatik Technische Universität München December 19, 2003.
1 What Comes Next ? Tim Finin University of Maryland, Baltimore County February 17, 2004
:: Ebiquity Research Group :: CSEE :: UMBC :: :: :: An Ontology for Context-Aware Pervasive Computing Environments Harry Chen, Tim Finin, Anupam Joshi.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Gaia: A Middleware Platform for Active Spaces Summarized by Dongjoo Lee, IDS Lab., Seoul National University.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
An Approach for Configuring Ontology- based Application Context Model Chung-Seong Hong, Hyun Kim, Hyoung-Sun Kim Electronics and Telecommunication Research.
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Machine Reasoning about Anomalous Sensor Data Matt Calder, Francesco Peri, Bob Morris Center for Coastal Environmental Sensoring Networks CESN University.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
CSC230 Software Design (Engineering)
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
:: Ebiquity Research Group :: CSEE :: UMBC :: :: :: Semantic Web in a Pervasive Context-Aware Architecture Harry Chen U of Maryland Baltimore County.
Smart Learning Services Based on Smart Cloud Computing
There is more to Context than Location Albrecht Schmidt, Michael Beigl, and Hans-W. Gellersen Telecooperation Office (TecO), University of Karlsruhe, Elsevier,
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Context-Aware Middleware for Anytime, Anywhere Social Networks Dario Bottazzi, Rebecca Montanari, and Alessandra Toninelli University of Bologna IEEE Intelligent.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
International Workshop on Web Engineering ACM Hypertext 2004 Santa Cruz, August 9-13 An Engineering Perspective on Structural Computing: Developing Component-Based.
Intelligent Agents Meet the Semantic Web in Smart Spaces Harry Chen,Tim Finin, Anupam Joshi, and Lalana Kagal University of Maryland, Baltimore County.
Knowledge based Learning Experience Management on the Semantic Web Feng (Barry) TAO, Hugh Davis Learning Society Lab University of Southampton.
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications Harry Chen, Filip Perich, Tim Finin, Anupam Joshi Department of Computer Science & Electrical.
Tim Finin University of Maryland, Baltimore County 29 January 2013 Joint work with Anupam Joshi, Laura Zavala and our students SRI Social Media Workshop.
A service-oriented middleware for building context-aware services Center for E-Business Technology Seoul National University Seoul, Korea Tao Gu, Hung.
Pervasive software interoperability for the Operating Room of the Future May 10, 2005.
Odyssey A Reuse Environment based on Domain Models Prepared By: Mahmud Gabareen Eliad Cohen.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
CPET 565 Mobile Computing Systems Context-Aware Computing (2) Lecture 11 Hongli Luo Indiana University-Purdue University Fort Wayne.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
A Study of Context-Awareness - CASS, Hydrogen Context Team Summarized and Presented by Seungseok Kang.
Context-Awareness on Mobile Devices - the Hydrogen Approach Thomas Hofer, Wieland Schwinger, Mario Pichler, Gerhard Leonhartsberger, Josef Altmann (Software.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
Hybrid Approach to Collaborative Context-Aware Service Platform for Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire LIRIS-UMR-CNRS.
Knowledge Representation of Statistic Domain For CBR Application Supervisor : Dr. Aslina Saad Dr. Mashitoh Hashim PM Dr. Nor Hasbiah Ubaidullah.
CASS – Middleware for Mobile Context-Aware Applications Patrick Fahy Siobhan Clarke Trinity College Dublin, Ireland Summarized by Babar Tareen,
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Modeling Context Information in Pervasive Computing System Presented by Karen Henricksen, Jadwiga Indulska, and Andry Raktonirany From University of Queensland.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Christoph F. Eick University of Houston Organization 1. What are Ontologies? 2. What are they good for? 3. Ontologies and.
An Architecture to Support Context-Aware Applications
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
A Study of Context-Awareness: Gaia & SOCAM Presented by Dongjoo Lee IDS Lab., Seoul National University Gaia: A Middleware Infrastructure to.
Temporal Ontology Shervin Daneshpajouh ce.sharif.edu/~daneshpajouh.
CoOL: A Context Ontology Language to Enable Contextual Interoperability Thomas Strang, Claudia Linnhoff-Popien, and Korbinian Frank German Aerospace Centor.
Authors: Xiao Hang Wang, Da Qing Zhang, Tao Gu, Hung Keng Pung Institute for Infocom Research, Singapore Some slides adopted from earlier presentation.
CoCA: A Collaborative Context- Aware Service Platform for Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire LIRIS-UMR-CNRS.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Toward a cooperative programming framework for context-aware applications B. Guo, D. Zhang Telecom. Network and Service Dept. Institut TELECOM SudParis.
Smart Campus System a Proposal for a Context-Aware Application Sangkeun Lee Sungchan Park IDS Lab, SNU 1.
:: eBiquity Research Group :: CSEE :: UMBC :: :: :: A Context Broker for Building Smart Meeting Rooms Harry Chen, Tim Finin, Anupam Joshi Univ. of Maryland,
An Ontology-based Approach to Context Modeling and Reasoning in Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire INSA de Lyon,
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Feb 12, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Context Aware Computing 3 of 3 Lecture 12 Paul I-Hai Lin, Professor Electrical.
Is Context-Aware Computing Taking Control Away from the User? Three Levels of Interactivity Examined Louise Barkhuus and Anind Dey The IT University of.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
GAS ontology: an ontology for collaboration among ubiquitous computing devices International Journal of Human-Computer Studies (May 2005) Presented By.
A Study of Context-Awareness: The Context Fusion Network, The Context Fabric Presented by Sangkeun Lee IDS Lab., Seoul National University Solar:
Developing a Distributed Dynamic Intelligent Agent Framework Based on the Jini Architecture Harry Chen Department of CSEE U. Of Maryland Baltimore County.
Implementation of Ontology Based Context-awareness Framework Ki-Chul Lee, Jung-Hoon Kim International Conference on Multimedia and Ubiquitous Engineering.
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
A Context Framework for Ambient Intelligence
Software Design Refinement Using Design Patterns
1st Draft for Defining IoT (1)
Model-Driven Analysis Frameworks for Embedded Systems
Pervasive and wearable computing research 13 September 2006
3rd Studierstube Workshop TU Wien
Presentation transcript:

An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County January 2003 Presented by Sangkeun Lee IDS Lab.

Copyright  2008 by CEBT About this Paper  CoBrA Is one of well-known context-aware systems by Harry Chen Is an agent based architecture for supporting context-aware systems in smart spaces There are more than 14 papers related to CoBrA – Is the topic of Chen’s PhD thesis, and he’s achieved his PhD. Degree in Dec, 2004  This Paper Is a PhD. Dissertation Proposal Is a very early research related to CoBrA Describes a research plan to develop a broker-centric agent architecture May help us preparing our degree papers IDS Lab. Seminar - 2Center for E-Business Technology

Copyright  2008 by CEBT Contents  1 Introduction 1.1 What’s Context-Aware Computing? 1.2 Problems in Context-Aware Computing – Lack of Reusable Context-Aware Mechanisms – Limited Resources in Mobile Devices – Privacy Issues in Accessing User Information 1.3 Proposed Solution: Context Broker Architecture – Use Case – Research Contribution 1.4 Proposal Outline  2 Background 2.1 Reasons to Study Context 2.2 Definitions of Context 2.3 Aspects of Context-Aware Computing – Enhancing User Interfaces – Guiding the Adaptation of System Behavior – Enabling Smart Space Applications 2.4 How Do Applications Acquire Contexts? – Direct Access to Hardware Sensors – Facilitated by a Middle-ware Infrastructure – Acquiring Contexts from a Context Server 2.5 Context-Aware Computing Meets Semantic Web  3 Context Broker Architecture 3.1 Objectives 3.2 Modeling the Physical World in Domains 3.3 An Example System of the Context Broker Architecture 3.4 The Design of Domain Context Broker – Knowledge Base – Inference Engine – Context Acquisition Component – Broker Behavior  4 Summary and Research Plan 4.1 Initial Approach to Implementation – Modeling Ontology and Policy using OWL – Building the Inference Engine using Jess – Implementing the Broker Behavior using JADE 4.2 Feasibility Study 4.3 Milestones IDS Lab. Seminar - 3Center for E-Business Technology I will skip some of the contents that we’ve already discussed many times (e.g. What’s Context-aware computing?, Definitions of Context)

Copyright  2008 by CEBT Problems in Context-Aware Computing  Limited Resources in Mobile Devices Battery Power Constraints Information Storage Constraint Computing Power Constraint Communication Constraint – Agents may be lack of sufficient knowledge to communicate with context sources in the environment e.g. knowing which sensor can provide what information and how to communicate – Context sources may dynamically join and leave the environment without notifying the agents IDS Lab. Seminar - 4Center for E-Business Technology

Copyright  2008 by CEBT Problems in Context-Aware Computing (cont’d)  Privacy Issues in Accessing User Information People are worried about how computer systems use and share their personal information Agents often collect and share user information Agents also share user information  Lack of Reusable Context-Aware Mechanisms Many of existing context-aware systems are difficult and costly to build Because existing systems are tightly coupled with agent implementations, modifying the system often requires modifying the implementation of the agents. – Growing the number of agents could cause difficulties IDS Lab. Seminar - 5Center for E-Business Technology

Copyright  2008 by CEBT Background  Aspects of Context-Aware Computing Enhancing User Interfaces Guiding the Adaptation of System Behavior Enabling Smart Space Applications  How Do Applications Acquire Contexts? Contexts are acquired by directly accessing low-level context sensors Contexts are acquired from some kind of middle-ware infrastructures that in turn interact with low-level context sensors Contexts are acquired from servers that maintain situational knowledge about the environment IDS Lab. Seminar - 6Center for E-Business Technology

Copyright  2008 by CEBT Proposed Solution: Context Broker Architecture  The author proposes to develop a broker-centric agent architecture (i.e. COBRA) to provide runtime supports for context-aware systems in an Intelligent Meeting Rom environment  The core of the COBRA architecture: Domain Context Broker is responsible for Maintaining the context model of the domain, which includes domain contexts from the past and at the present Resolving inconsistencies and ambiguities of the domain contexts through information fusion Establishing privacy policies with users before sharing their personal information Providing knowledge sharing service for context-aware agents through agent communications IDS Lab. Seminar - 7Center for E-Business Technology

Copyright  2008 by CEBT Context-Aware Computing Meets Semantic Web  Semantic Web & Context-Aware System Semantic Web standards will enhance the communication and information sharing Semantic Web will become a major source of information for determining the context of users and thie associated daily activities – E.g. When a person enters a room, his location information (his presence in the room) is automatically updated in his personal web site. Immediately, context-aware agents in both remote and local environment can acquire the presence information about the person through the Web without needing any sensing or reasoning. IDS Lab. Seminar - 8Center for E-Business Technology

Copyright  2008 by CEBT Context Broker Architecture Semantic Web Pervasive Computing Software Agents CoBrA CoBrA not CORBA!

Copyright  2008 by CEBT COBRA Architecture  Objectives Acquiring context from heterogeneous sources – From sensors, Web, user profiles, behavior pattern Maintaining consistent contextual knowledge Enabling knowledge sharing among agents Protecting the privacy of users  Domain Context Broker Context sharing Protecting privacy IDS Lab. Seminar - 10Center for E-Business Technology

Copyright  2008 by CEBT The Design of Domain Context Broker IDS Lab. Seminar - 11Center for E-Business Technology

Copyright  2008 by CEBT Knowledge Base  Domain Ontology Context Model : fundamental concepts for representing contexts Information Source Model : sensors, user devices, web services, … Agent Profile Model : types or services that an agent offers, the reason for acquiring certain contexts etc. Information Privacy Model  Domain Heuristics Help the broker to resolve knowledge inconsistency caused by imperfect sensing Help the broker to build and maintain a shared model of context  User Privacy Policies What information can or can’t be shared, etc IDS Lab. Seminar - 12Center for E-Business Technology

Copyright  2008 by CEBT Inference Engine  Ontology Reasoning Module deduce facts that can be concluded from the knowledge in the Knowledge Base in conjunction with the models that are defined in the Domain Ontology  Context Reasoning Module Reasoning about situational conditions of an entities  Knowledge Maintenance Module Check logical implication – “If A is true, then B must be true” – “B is not true” – “A is true” – “B is true” – Inconsistent! Apply domain heuristics – “No one person can be in two different rooms at the same time” – “Bob is currently attending a meeting in RM 201” – “Bob is currently typing a paper on his computer in RM 102” – Inconsistent! IDS Lab. Seminar - 13Center for E-Business Technology

Copyright  2008 by CEBT Broker Behavior  Privacy Policy Negotiation IDS Lab. Seminar - 14Center for E-Business Technology

Copyright  2008 by CEBT Broker Behavior  Knowledge Sharing IDS Lab. Seminar - 15Center for E-Business Technology

Copyright  2008 by CEBT Use Case: An EasyMeeting Scenario The broker detects Alice’s presence B    Policy says, “can share with any agents in the room” A B The broker builds the context model Web Alice “beams” her policy to the broker B Policy says, “inform my personal agent of my location” A B.. isLocatedIn..

Copyright  2008 by CEBT Use Case: An EasyMeeting Scenario (cont’d) Her agent informs the broker of her role and intentions + The broker tells her location to her agent A The projector agent wants to help Alice The projector agent asks slide show info. B The projector agent sets up the slides The broker informs the subscribed agents B

Copyright  2008 by CEBT Summary and Research Plan  Initial Approach to Implementation Modeling Ontology and Policy using OWL Building the Inference Engine using Jess Implementing the Broker Behavior using JADE  Feasibility Study: Validating following hypothesizes By exploiting the Semantic Web infrastructure, context-aware agents can access a wider range of contexts By developing a hybrid context reasoning mechanism, we can help capability limited agents to maintain a coherent and consistent model of contexts in a dynamic environment By enabling agents to share a common model of contexts, we will allow agents to access contexts By defining a policy-driven mechanism to control how users’ personal contexts are used and shared, we can effective protect the privacy of users IDS Lab. Seminar - 18Center for E-Business Technology

Copyright  2008 by CEBT A Bird’s Eye View of CoBrA

Copyright  2008 by CEBT Discussion  Evaluation Clearly defines the problems to solve Provides a good conceptual design of the system shows us how we should plan for a research Well-written proposal paper However, more details are required – Will be presented  Ideas & Discussion Writing proposal seems very meaningful How can we show that a new context-aware system is better than existing ones? IDS Lab. Seminar - 20Center for E-Business Technology