ATTENTION: The works hosted here are being migrated to a new repository that will consolidate resources, improve discoverability, and better show UTA's research impact on the global community. We will update authors as the migration progresses. Please see MavMatrix for more information.
Show simple item record
dc.contributor.author | Kailas, Aparna | en_US |
dc.date.accessioned | 2007-09-17T17:07:26Z | |
dc.date.available | 2007-09-17T17:07:26Z | |
dc.date.issued | 2007-09-17T17:07:26Z | |
dc.date.submitted | May 2007 | en_US |
dc.identifier.other | DISS-1746 | en_US |
dc.identifier.uri | http://hdl.handle.net/10106/560 | |
dc.description.abstract | The objective of pervasive computing is to allow users to perform their tasks in a transparent way regardless of device features. Resources on devices should be exploited to provide services in order to perform user tasks. When there is no exact match for the user task in the environment, the capabilities of available devices should be combined to perform the user task. Seamless Service Composition (SeSCo) abstracts device capabilities as services and leverages existing work on graph algorithms to perform service composition. A lightweight framework, PerSON (Service Overlay Network for Pervasive Environments) was developed to provide a service overlay network for the Pervasive Information Community Organization (PICO) middleware.
In this thesis SeSCo service composition mechanism is implemented on top of PerSON.
The ability of PerSON to construct an ad hoc service overlay network is exploited to create a hierarchical service overlay using message exchanges that facilitate the hierarchical order. This thesis develops a mechanism for propagation of services in the hierarchy. Services at each level are aggregated with services at lower levels of the hierarchy and requests are resolved by constructing a path in the service aggregation. Demonstration applications that perform string encryption and decryption are implemented using the PICO framework. The application problem comprises a matrix multiplication operation, and the encryption and decryption of matrix data.
SeSCo is extended to include device resources in the service path, so that service composition will find the set of services hosted by the least resource constrained devices among all feasible candidates. A combination of device resources is used to define a suitable length for all services hosted by the device in the service aggregation. A proof of concept example scenario that uses battery energy has been implemented to demonstrate resource aware service composition. | en_US |
dc.description.sponsorship | Kumar, Mohan | en_US |
dc.language.iso | EN | en_US |
dc.publisher | Computer Science & Engineering | en_US |
dc.title | Hiearchical Overlay For Service Composition In Pervasive Environments | en_US |
dc.type | M.S. | en_US |
dc.contributor.committeeChair | Kumar, Mohan | en_US |
dc.degree.department | Computer Science & Engineering | en_US |
dc.degree.discipline | Computer Science & Engineering | en_US |
dc.degree.grantor | University of Texas at Arlington | en_US |
dc.degree.level | masters | en_US |
dc.degree.name | M.S. | en_US |
dc.identifier.externalLink | https://www.uta.edu/ra/real/editprofile.php?onlyview=1&pid=194 | |
dc.identifier.externalLinkDescription | Link to Research Profiles | |
Files in this item
- Name:
- umi-uta-1746.pdf
- Size:
- 437.2Kb
- Format:
- PDF
This item appears in the following Collection(s)
Show simple item record