Digital Ecosystem for Cross-domain Context Sensing and Trading

There is a need for exchange and trade of contextual information within ubiquitous computing environments between different providers of context-aware services. It is the need of a mobile user to obtain such services wherever he roams during the course of the day, such as home, workplace, leisure and visiting businesses, in a way that is safe and secure for both the user as well as the providers, while generating the maximum benefit from synergetically aggregating pieces of contextual information. A possible method to model the peer-to-peer relationships and complex structure of different interests is the introduction of digital ecosystems. The digital ecosystem is an emerging paradigm for economic and technological innovation. It consists of a self-organising digital infrastructure, aimed at creating a digital environment for networked organisations (or agents) thus supporting the cooperation, knowledge sharing and development of open and adaptive technologies and evolutionary, domain knowledge rich, environments.

[1]  Claudia Linnhoff-Popien,et al.  Towards Realizing Global Scalability in Context-Aware Systems , 2005, LoCA.

[2]  Piotr Wojdyllo,et al.  Decorrelation of Wavelet Coefficients for Long-Range Dependent Processes , 2007, IEEE Transactions on Information Theory.

[3]  Edmond A. Jonckheere,et al.  Dynamic neural-based buffer management for queuing systems with self-similar characteristics , 2005, IEEE Transactions on Neural Networks.

[4]  Tom Pfeifer Synergetic positioning architecture for location-dependent services , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[5]  Biplab Sikdar,et al.  On the impact of IEEE 802.11 MAC on traffic characteristics , 2003, IEEE J. Sel. Areas Commun..

[6]  Ilkka Norros,et al.  Simulation of fractional Brownian motion with conditionalized random midpoint displacement , 1999 .

[7]  Henk L. Muller,et al.  Particle Filters for Position Sensing with Asynchronous Ultrasonic Beacons , 2006, LoCA.

[8]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.

[9]  Walter Willinger,et al.  Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.

[10]  Aggelos Ioannou,et al.  Pipelined heap (priority queue) management for advanced scheduling in high-speed networks , 2007, TNET.

[11]  Jalal Almhana,et al.  A long-range dependent model for Internet traffic with power transformation , 2006, IEEE Communications Letters.

[12]  Huei-Wen Ferng,et al.  Using priority, buffering, threshold control, and reservation techniques to improve channel-allocation schemes for the GPRS system , 2005, IEEE Trans. Veh. Technol..

[13]  Jon Crowcroft,et al.  Multicast-specific security threats and counter-measures , 1995, Proceedings of the Symposium on Network and Distributed System Security.

[14]  Michel Mandjes,et al.  Large Deviations for Complex Buffer Architectures: The Short-Range Dependent Case , 2006 .

[15]  Jane Yung-jen Hsu,et al.  Collaborative Localization: Enhancing WiFi-Based Position Estimation with Neighborhood Links in Clusters , 2006, Pervasive.

[16]  Tom Pfeifer Redundant positioning architecture , 2005, Comput. Commun..

[17]  Ozan K. Tonguz,et al.  Dynamic priority queueing of handover calls in wireless networks: an analytical framework , 2004, IEEE Journal on Selected Areas in Communications.

[18]  Christopher Metz,et al.  On the Web: AAA Protocols: Authentication, Authorization, and Accounting for the Internet , 1999, IEEE Internet Comput..

[19]  C. Watagodakumbura,et al.  Aggregated priority queueing as an efficient queueing mechanism to overcome effects of self-similarity , 2004, The 6th International Conference on Advanced Communication Technology, 2004..

[20]  Peter G. Harrison,et al.  Delay analysis of priority queues with modulated traffic , 2005, 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[21]  Tho Le-Ngoc,et al.  Priority queuing of long-range dependent traffic , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[22]  Axel Küpper,et al.  Quality of Context: What It Is And Why We Need It , 2004 .

[23]  Abdelmadjid Bouabdallah,et al.  Multicast receiver and sender access control and its applicability to mobile IP environments: a survey , 2005, IEEE Communications Surveys & Tutorials.

[24]  Jie Yu,et al.  Study of the Effect of the Wireless Gateway on Incoming Self-Similar Traffic , 2006, IEEE Transactions on Signal Processing.

[25]  Patrick Robertson,et al.  Context Modelling and Management in Ambient-Aware Pervasive Environments , 2005, LoCA.

[26]  Marco Ajmone Marsan,et al.  Markov models of internet traffic and a new hierarchical MMPP model , 2005, Comput. Commun..

[27]  Ning Wang,et al.  Scalable sender access control for bi-directional multicast routing , 2003, Comput. Networks.

[28]  Ward Whitt,et al.  Effective bandwidths with priorities , 1998, TNET.

[29]  Azer Bestavros,et al.  Self-similarity in World Wide Web traffic: evidence and possible causes , 1996, SIGMETRICS '96.

[30]  Ilkka Norros,et al.  Priority queues with Gaussian input: a path-space approach to loss and delay asymptotics. , 2005 .

[31]  Paul Lukowicz,et al.  Evaluating Performance in Continuous Context Recognition Using Event-Driven Error Characterisation , 2006, LoCA.

[32]  J. William Atwood,et al.  A Framework to Add AAA Functionalities in IP Multicast , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[33]  D. Wischik Sample path large deviations for queues with many inputs , 2001 .

[34]  J. William Atwood,et al.  A Policy Framework for Multicast Group Control , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[35]  Yang Xiao,et al.  Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs , 2005, IEEE Transactions on Wireless Communications.

[36]  Santosh Pande,et al.  A Scalable Priority Queue Architecture for High Speed Network Processing , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[37]  Mohamed Ould-Khaoua,et al.  A performance model for wormhole-switched interconnection networks under self-similar traffic , 2004, IEEE Transactions on Computers.

[38]  J. William Atwood,et al.  The Internet Group Management Protocol with Access Control (IGMP-AC) , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[39]  Norihiro Ishikawa,et al.  An architecture for user authentication of IP multicast and its implementation , 1999, 1999 Internet Workshop. IWS99. (Cat. No.99EX385).

[40]  Ilkka Norros,et al.  A most probable path approach to queueing systems with general Gaussian input , 2002, Comput. Networks.

[41]  Ilkka Norros,et al.  A storage model with self-similar input , 1994, Queueing Syst. Theory Appl..

[42]  Mihaela van der Schaar,et al.  Multi-user video streaming over multi-hop wireless networks: A distributed, cross-layer approach based on priority queuing , 2007, IEEE Journal on Selected Areas in Communications.

[43]  Ilkka Norros,et al.  Approximate formulae for Gaussian priority queues , 2001 .

[44]  Junshan Zhang,et al.  Multiple-access interference processes are self-similar in multimedia CDMA cellular networks , 2005, IEEE Transactions on Information Theory.

[45]  N. Sulaiman Performance Evaluation of Traffic Mix in IP Based Networks , 2007 .