Introduction to Predictive Computing

With the advancements in computing techniques, there is a significant shift in programming paradigm which is from procedural programming to agent-based programming. Modern computing techniques have more focus on interdisciplinary approaches to perform complex tasks and development to satisfy human needs. Integration of Internet of Things, cloud computing and wireless sensor networks has made it possible to make prediction in real time for different application areas including health care, transportation, smart home, etc. In this chapter, predictive computing has been introduced and six major pillars of predictive computing known as (a) Internet of Things, (b) Cloud computing, (c) Mobile computing, (d) Pervasive computing, (e) Wireless sensor networks (WSN) and (f) Big data are described. The role of information security techniques to maintain the data confidentiality, privacy and trust like major issues during the communication, storage and accessing of data is also provided.

[1]  Cristina Nita-Rotaru,et al.  FT-RC4: A Robust Security Mechanism for Data Stream Systems , 2005 .

[2]  Walid G. Aref,et al.  Scheduling for shared window joins over data streams , 2003, VLDB.

[3]  William J. Rasdorf,et al.  An evaluation of programming languages and language features for engineering software development , 1988, Engineering with Computers.

[4]  Weisong Shi,et al.  Enforcing Cooperative Resource Sharing in Untrusted P2P Computing Environments , 2005, Mob. Networks Appl..

[5]  Niklaus Wirth The programming language pascal , 2004, Acta Informatica.

[6]  Peter J. Denning,et al.  Computing as a discipline , 1989, Computer.

[7]  Haralambos Mouratidis,et al.  Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems , 2003, CAiSE.

[8]  Peter Brusilovsky,et al.  Mini-languages: a way to learn programming principles , 2004, Education and Information Technologies.

[9]  Elisa Bertino,et al.  A Security Punctuation Framework for Enforcing Access Control on Streaming Data , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[10]  Albrecht Schmidt,et al.  Embedded Interaction: Interacting with the Internet of Things , 2010, IEEE Internet Computing.

[11]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[12]  Yacine Challal,et al.  SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks , 2007 .

[13]  Rafael H. Bordini,et al.  Model checking agent programming languages , 2012, Automated Software Engineering.

[14]  J. E. L. Peck,et al.  Revised report on the algorithmic language ALGOL 68 , 2004, Acta Informatica.

[15]  Nicola Leone,et al.  Answer Set Programming , 2010, 25 Years GULP.

[16]  Gerald Q. Maguire,et al.  A predictive mobility management algorithm for wireless mobile computing and communications , 1995, Proceedings of ICUPC '95 - 4th IEEE International Conference on Universal Personal Communications.

[17]  Christian C. Enz,et al.  WiseNET: an ultralow-power wireless sensor network solution , 2004, Computer.

[18]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[19]  Tomasz Imielinski,et al.  Mobile Computing , 1996 .

[20]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[21]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[22]  Sabrina Sicari,et al.  Privacy Aware Systems: From Models to Patterns , 2011 .

[23]  Peter J. Denning,et al.  Computing is a natural science , 2007, CACM.

[24]  V. Rajaraman Programming languages , 1998 .

[25]  Toru Ishida,et al.  Use of procedural programming languages for controlling production systems , 1991, [1991] Proceedings. The Seventh IEEE Conference on Artificial Intelligence Application.

[26]  Haiyan Song,et al.  Predicting Tourist Demand Using Big Data , 2017 .

[27]  Bhaskar Krishnamachari,et al.  An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[28]  John K. Ousterhout,et al.  Scripting: Higher-Level Programming for the 21st Century , 1998, Computer.

[29]  Axel van Lamsweerde,et al.  Handling Obstacles in Goal-Oriented Requirements Engineering , 2000, IEEE Trans. Software Eng..

[30]  Anand S. Rao,et al.  AgentSpeak(L): BDI Agents Speak Out in a Logical Computable Language , 1996, MAAMAW.

[31]  John McCarthy,et al.  Recursive functions of symbolic expressions and their computation by machine, Part I , 1959, Commun. ACM.

[32]  Aaron K. Baughman,et al.  Predictive Cloud Computing with Big Data: Professional Golf and Tennis Forecasting [Application Notes] , 2015, IEEE Computational Intelligence Magazine.

[33]  Felix S. Klock,et al.  The rust language , 2014 .

[34]  Vikram Srinivasan,et al.  Information Coverage and Network Lifetime in Energy Constrained Wireless Sensor Networks , 2007 .

[35]  Yin Yang,et al.  CADS: Continuous Authentication on Data Streams , 2007, VLDB.

[36]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[37]  Sergey Yekhanin,et al.  Private information retrieval , 2010, CACM.

[38]  John Impagliazzo,et al.  Computing Curricula 2005: The Overview Report , 2006, SIGCSE '06.

[39]  Mengjun Li,et al.  Organization-based agent-oriented programming: model, mechanisms, and language , 2013, Frontiers of Computer Science.

[40]  Alan Burns,et al.  Concurrency in ADA , 1995 .