You are previewing Intelligent Technologies and Techniques for Pervasive Computing.
O'Reilly logo
Intelligent Technologies and Techniques for Pervasive Computing

Book Description

Pervasive computing enables users to interact with information resources in their everyday lives. The development of computational technologies that can exist in ever smaller devices while simultaneously increasing processing power allows such devices to blend seamlessly into tangible environments. Intelligent Technologies and Techniques for Pervasive Computing provides an extensive discussion of such technologies, theories and practices in an attempt to shed light on current trends and issues in the adaption of pervasive systems. Within its pages, students and practitioners of computer science will find both recent developments and practical applications—an overview of the field and how intelligent techniques can help to improve user experience in the distribution and consumption of pertinent, timely information. This book is part of the Advances in Computational Intelligence and Robotics series collection.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
  6. Preface
    1. SECTION 1: MULTI-AGENT SYSTEMS APPLICATIONS
    2. SECTION 2: PERVASIVE COMPUTING APPLICATIONS
  7. Section 1: Multi-Agent Systems Applications
    1. Chapter 1: Evolutionary Control of Helicopter Hovering Based on Genetic Programming
      1. ABSTRACT
      2. INTRODUCTION
      3. THE PROBLEM OF HELICOPTER HOVERING
      4. RELATED WORK
      5. THE WINNER OF THE 2008 RL COMPETITION
      6. GENETIC PROGRAMMING
      7. THE GENETIC PROGRAMMING APPROACH
      8. RESULTS
      9. CONCLUSION
      10. APPENDIX
    2. Chapter 2: Methodology for Epilepsy and Epileptic Seizure Recognition using Chaos Analysis of Brain Signals
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHODS AND MATERIALS
      5. NORMALIZATION
      6. CLASSIFICATION
      7. RESULTS
      8. CONCLUSION
    3. Chapter 3: Learning Methodologies to Support E-Business in the Automated Negotiation Process
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. THE E-BUSINESS CONTEXT
      5. SIMULATION ENVIRONMENT AND TEST CASE
      6. NUMERICAL RESULTS
      7. CONCLUSION AND FUTURE DEVELOPMENT
    4. Chapter 4: A Novel Matching Algorithm for Shopbot Agents acting in Marketplaces
      1. ABSTRACT
      2. INTRODUCTION
      3. PRIOR WORK
      4. RESEARCH CHALLENGES
      5. SHOPBOT ARCHITECTURE/ BEHAVIOR
      6. SHOPBOT ONTOLOGY MATCHING ALGORITHM
      7. EVALUATION
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
    5. Chapter 5: A Multi-Agent System for Improving the Resource Allocation on Programmes in Higher Education
      1. ABSTRACT
      2. INTRODUCTION
      3. RESOURCES ALLOCATION PROBLEM AND THE SOLVING APPROACHES
      4. MULTI-AGENT SYSTEMS AND AGENT-BASED METHODOLOGIES
      5. UNIRA: A MULTI-AGENT SYSTEM FOR RESOURCES ALLOCATION TO THE EDUCATIONAL PROGRAMMES IN UNIVERSITIES
      6. THE SYSTEM DEVELOPMENT
      7. IMPLEMENTATION OF THE UNIRA SYSTEM
      8. FIRST RESULTS OF THE SYSTEM VALIDATION
      9. CONCLUSION AND FUTURE WORK
  8. Section 2: Pervasive Computing Applications
    1. Chapter 6: Algorithms for Spatial Partitioning in Wireless Sensor Network
      1. ABSTRACT
      2. INTRODUCTION
      3. THE COVERAGE PROBLEM
      4. SENSORS COVERAGE
      5. PROPOSED ALGORITHMS
      6. PERFORMANCE OVERHEAD
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    2. Chapter 7: Wireless Sensor Network Design for Energy-Efficient Monitoring
      1. ABSTRACT
      2. INTRODUCTION
      3. APPLICATION SCENARIOS
      4. PROBLEM STATEMENT
      5. SENSOR NETWORK MODELS
      6. EXPERIMENTAL RESULTS
      7. RELATED WORK
      8. CONCLUSION AND FUTURE WORK
    3. Chapter 8: Context-Based Grouping and Recommendation in MANETs
      1. ABSTRACT
      2. INTRODUCTION
      3. CONTEXT-BASED GROUPING WITH GROUP TEMPLATES
      4. LATTICE-BASED GROUP FORMATION AND MANAGEMENT
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    4. Chapter 9: A Forest Fire Detection System
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. SYSTEM ARCHITECTURE
      5. EXPERIMENTAL RESULTS
      6. CONCLUSION
    5. Chapter 10: Enhancing Location Privacy in WSN
      1. ABSTRACT
      2. INTRODUCTION
      3. iHIDE ARCHITECTURE AND ROUTING PLAN
      4. IDENTIFYING PRIVACY ISSUES
      5. SIMULATION EXPERIMENTS
      6. DISCUSSION
      7. EXERCISES
    6. Chapter 11: The Applications of Automata in Game Theory
      1. ABSTRACT
      2. INTRODUCTION
      3. AUTOMATA TYPES
      4. THE APPLICATIONS OF AUTOMATA IN GAME THEORY
      5. CONCLUSION
    7. Chapter 12: Reinforcement and Non-Reinforcement Machine Learning Classifiers for User Movement Prediction
      1. ABSTRACT
      2. INTRODUCTION
      3. MACHINE LEARNING MODELS
      4. CONTEXT REPRESENTATION
      5. MOBILITY PREDICTION MODEL
      6. PREDICTION EVALUATION
      7. COMPARISON WITH THE OTHER MODELS
      8. PRIOR WORK
      9. CONCLUSION
    8. Chapter 13: Enhancing Location Privacy in Location-Based Services
      1. ABSTRACT
      2. INTRODUCTION
      3. DEFINITIONS AND ASSUMPTIONS
      4. STS ARCHITECTURE AND ALGORITHMS
      5. STS PROCEDURES
      6. DISCUSSION
      7. EXERCISES
    9. Chapter 14: Intention Prediction Mechanism in an Intentional Pervasive Information System
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. INTENTIONAL PERVASIVE SERVICE ORIENTED MIDDLEWARE: IPSOM
      5. INTENTION PREDICTION MECHANISM
      6. DISCUSSION AND FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    10. Chapter 15: On the Use of Optimal Stopping Theory for Secret Sharing Scheme Update
      1. ABSTRACT
      2. INTRODUCTION
      3. PRIOR WORK
      4. SHARE THE SECRET SCHEME
      5. THE STS UPDATE MECHANISM
      6. PERFORMANCE EVALUATION
      7. CONCLUSION
  9. Compilation of References
  10. About the Contributors