A kind of novel method of service-aware computing for uncertain mobile applications

Abstract Service-aware computing is a hot research topic under the banner of web-based uncertain mobile applications. As we know, in the research domain of uncertain mobile service, service-aware evidence with uncertainty is dynamic and changing randomly. In order to ensure the QoS of different mobile application fields based on decision making, we think the method of service-aware computing for uncertain mobile applications is very important. The key insight of this paper is that we modified the computing method of evidence information, which has been considered the reliability, time-efficiency, and relativity of service context. The method has improved the classical computing rule of D–S (Dempster–Shafer) Evidence Theory when being used in uncertain cases. The novel method may be called the extended D–S (EDS) method, which has overcome the drawbacks of classical D–S Evidence Theory. All these new ideas have been successfully used in our service-aware computing field of uncertain mobile applications. By comparing EDS with related methods, such as Bayesian Theory (BT), and Random Set Theory (RST), the advantage of the new service-aware computing method has been proved successfully.

[1]  Carla Limongelli,et al.  Adaptive Learning with the LS-Plan System: A Field Evaluation , 2009, IEEE Transactions on Learning Technologies.

[2]  Zhao Hai,et al.  D-S evidence theory applied to fault diagnosis of generator based on embedded sensors , 2000, Proceedings of the Third International Conference on Information Fusion.

[3]  Yunde Jia,et al.  Cardiac Motion Estimation from Tagged MRI Using 3D-HARP and NURBS Volumetric Model , 2007, ACCV.

[4]  David Kotz,et al.  Mobile agents and the future of the internet , 1999, OPSR.

[5]  Richard R. Muntz,et al.  Managing context data for smart spaces , 2000, IEEE Wirel. Commun..

[6]  De-gan Zhang A new approach and system for attentive mobile learning based on seamless migration , 2010, Applied Intelligence.

[7]  I. R. Goodman,et al.  Mathematics of Data Fusion , 1997 .

[8]  D P Casasent,et al.  Fast JPDA multitarget tracking algorithm. , 1989, Applied optics.

[9]  Philip F. Spelt,et al.  Learning by an autonomous robot at a process control panel , 1989, IEEE Expert.

[10]  Henry A. Kautz,et al.  Inferring High-Level Behavior from Low-Level Sensors , 2003, UbiComp.

[11]  Sanjay Goel,et al.  Resilience Metrics for Service-Oriented Networks: A Service Allocation Approach , 2009, IEEE Transactions on Services Computing.

[12]  Keith D. Kastella,et al.  Practical implementation of joint multitarget probabilities , 1998, Defense, Security, and Sensing.

[13]  De-gan Zhang,et al.  A new medium access control protocol based on perceived data reliability and spatial correlation in wireless sensor network , 2012, Comput. Electr. Eng..

[14]  Dingli Yu,et al.  Neural network fault classification of transient data in an automotive engine air path , 2008, Int. J. Model. Identif. Control..

[15]  C. Morefield Application of 0-1 integer programming to multitarget tracking problems , 1977 .

[16]  S. Mori,et al.  Tracking and classifying multiple targets without a priori identification , 1986 .

[17]  Michael H. Coen The future of human-computer interaction or how i learned to stop worrying and love my intelligent r , 1999 .

[18]  R. Saha,et al.  An efficient algorithm for multisensor track fusion , 1998 .

[19]  Dejan S. Milojicic,et al.  Trend Wars - Mobile agent applications , 1999, IEEE Concurrency.

[20]  Xuanzhe Liu,et al.  Discovering Homogeneous Web Service Community in the User-Centric Web Environment , 2009, IEEE Transactions on Services Computing.

[21]  Habib Hamam,et al.  Developing an Initial Open-Source Platform for the Higher Education Sector—A Case Study: Alhosn University , 2009, IEEE Transactions on Learning Technologies.

[22]  Wen Yu,et al.  Non-linear system modelling via online clustering and fuzzy support vector machines , 2008, Int. J. Model. Identif. Control..

[23]  Simon Schubiger-Banz,et al.  A Model for Software Configuration in Ubiquitous Computing Environments , 2002, Pervasive.

[24]  Zhang De Extended Method of Evidence Theory for Pervasive Computing , 2004 .

[25]  Eran Toch,et al.  Context-Based Matching and Ranking of Web Services for Composition , 2009, IEEE Transactions on Services Computing.