Companion '08Pub Date : 2008-12-01DOI: 10.1145/1462735.1462757
Jatinder Singh, J. Bacon
{"title":"Event-based data control in healthcare","authors":"Jatinder Singh, J. Bacon","doi":"10.1145/1462735.1462757","DOIUrl":"https://doi.org/10.1145/1462735.1462757","url":null,"abstract":"Health services require appropriate information to provide proper care. At the same time, health information is sensitive, and thus its dissemination must be controlled. Health environments are becoming increasingly data driven, and thus are well supported by an event-based infrastructure.\u0000 We outline our work in building data control mechanisms into publish/subscribe middleware, to give those responsible for health data fine-grained control over the circumstances for its transmission.","PeriodicalId":340887,"journal":{"name":"Companion '08","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115400148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Companion '08Pub Date : 2008-12-01DOI: 10.1145/1462735.1462762
Arto Hämäläinen, J. Wunsch, J. Porras
{"title":"Implementing remote monitoring to the PeerHood middleware","authors":"Arto Hämäläinen, J. Wunsch, J. Porras","doi":"10.1145/1462735.1462762","DOIUrl":"https://doi.org/10.1145/1462735.1462762","url":null,"abstract":"In this paper an approach to extend the mobile computing environment through the utilization of fixed devices is presented. Seamless use of fixed devices as a part of mobile computing environment helps to save the scarce resources, e.g. communication and computation capacity as well as battery lifetime, of the mobile devices. Our approach is based on the use of the middleware that enables proactive discovery of devices and services in the close vicinity of the mobile device. Proactive operation, such as the scanning of wireless networks, consumes considerable amount of resources. Our approach migrate these resource consuming tasks to the fixed device, which then informs the mobile device of the changes in the near vicinity. Our mobile environment extension is implemented as a service on top of our existing middleware. Although the implementation itself is quite simple, the concept of service based task migration is validated and may be used for several other problems.","PeriodicalId":340887,"journal":{"name":"Companion '08","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Companion '08Pub Date : 2008-12-01DOI: 10.1145/1462735.1462740
N. Brouwers, Peter Corke, K. Langendoen
{"title":"Darjeeling, a Java compatible virtual machine for microcontrollers","authors":"N. Brouwers, Peter Corke, K. Langendoen","doi":"10.1145/1462735.1462740","DOIUrl":"https://doi.org/10.1145/1462735.1462740","url":null,"abstract":"The Java programming language enjoys widespread popularity on platforms ranging from servers to mobile phones. While efforts have been made to run Java on microcontroller platforms, there is currently no feature-rich, open source virtual machine available. In this paper we present Darjeeling, a system comprising offline tools and a memory efficient runtime. The offline post-compiler tool analyzes, links and consolidates Java class files into loadable modules. The runtime implements a modified Java VM that supports multithreading and is designed specifically to operate in constrained execution environments such as wireless sensor network nodes. Darjeeling improves upon existing work by supporting inheritance, threads, garbage collection, and loadable modules while keeping memory usage to a minimum. We have demonstrated Java running on AVR128 and MSP430 micro-controllers at speeds of up to 70,000 JVM instructions per second.","PeriodicalId":340887,"journal":{"name":"Companion '08","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116012110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Companion '08Pub Date : 2008-12-01DOI: 10.1145/1462735.1462743
Jong Hoon Ahnn, K. Birman, Krzysztof Ostrowski, R. V. Renesse
{"title":"Using live distributed objects for office automation","authors":"Jong Hoon Ahnn, K. Birman, Krzysztof Ostrowski, R. V. Renesse","doi":"10.1145/1462735.1462743","DOIUrl":"https://doi.org/10.1145/1462735.1462743","url":null,"abstract":"Web services and platforms such as .NET make it easy to integrate interactive end-user applications with backend services. However, it remains hard to build collaborative applications in which information is shared within teams. This paper introduces a new drag-and-drop technology, in which standard office documents (spreadsheets, databases, etc.) are interconnected with event-driven middleware (\"live distributed objects\"), to create distributed applications in which changes to underlying data propagate quickly to downstream applications. Information is replicated in a consistent manner, making it easy for team members to share updates and to coordinate their actions. We present our middleware platform, and show that it offers good performance and scalability, with small resource footprint. Moreover, because the approach is highly automated, and the underlying middleware is highly configurable, we're in a position to automatically address security and reliability needs that might otherwise be onerous. In addition to reviewing our existing system, we list open issues, which include integration with external data sources, and updating stored, but inactive objects.","PeriodicalId":340887,"journal":{"name":"Companion '08","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128203256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Companion '08Pub Date : 2008-12-01DOI: 10.1145/1462735.1462756
C. Muldoon, R. Tynan, M. O'Grady, Gregory M. P. O'Hare
{"title":"Realizing an agent-oriented middleware for heterogeneous sensor networks","authors":"C. Muldoon, R. Tynan, M. O'Grady, Gregory M. P. O'Hare","doi":"10.1145/1462735.1462756","DOIUrl":"https://doi.org/10.1145/1462735.1462756","url":null,"abstract":"Classic computing systems are characterised by heterogeneity, with its inherent advantages and disadvantages. This raises a number of difficulties for software engineers. The vision offered by a mix-and-match approach is an attractive one, though its practical realisation comes at a cost, as the process of integration is rarely smooth. This scenario will be repeated as Wireless Sensor Networks are increasingly incorporated into mainstream computing. One potential paradigm for managing this heterogeneity is that of intelligent agents. This paper considers the viability and potential of lightweight agents as a paradigm for harnessing the potential of heterogeneous wireless sensor networks.","PeriodicalId":340887,"journal":{"name":"Companion '08","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123566704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Companion '08Pub Date : 2008-12-01DOI: 10.1145/1462735.1462744
R. Jammalamadaka, Roberto Gamboni, S. Mehrotra, K. Seamons, N. Venkatasubramanian
{"title":"iDataGuard: an interoperable security middleware for untrusted internet data storage","authors":"R. Jammalamadaka, Roberto Gamboni, S. Mehrotra, K. Seamons, N. Venkatasubramanian","doi":"10.1145/1462735.1462744","DOIUrl":"https://doi.org/10.1145/1462735.1462744","url":null,"abstract":"Businesses that provide data storage facilities on the internet (IDP) have exploded recently. Such businesses provide the following benefits to end users: a) anytime, anywhere access to data; b) low cost; and c) good quality of service. Examples of data storage providers include Amazon S3 service, Windows SkyDrive, Nirvarnix, etc.\u0000 Users face two challenges in utilizing the storage infrastructures of the IDPs: a) Heterogeneity: Different IDPs provide different interfaces to application developers to store and fetch data with them due to lack of accepted standards; and b) Security: Data outsourced to IDPs is vulnerable to attacks from internet thieves and from malicious employees of IDPs.\u0000 In this paper, we present the design of iDataGuard, a client side interoperable security middleware that adapts to the heterogeneity of interfaces of IDPs and enforces security constraints on outsourced data. This significantly simplifies the effort for application development. To combat heterogeneity, iDataGuard incorporates an abstract service model that can be easily customized to individual IDPs. To address the security challenges, iDataGuard supports a security model that protects the confidentiality and integrity of outsourced data. We propose a novel indexing technique that allows search on the encrypted data stored at the IDPs. We illustrate the feasibility/efficacy of iDataGuard by implementing the middleware and executing it on two popular IDPs, Amazon S3 service and Gmail.com.","PeriodicalId":340887,"journal":{"name":"Companion '08","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Companion '08Pub Date : 2008-12-01DOI: 10.1145/1462735.1462742
M. Linderman, Norman Ahmed, J. Metzler, Jason Bryant
{"title":"A hybrid publish subscribe protocol","authors":"M. Linderman, Norman Ahmed, J. Metzler, Jason Bryant","doi":"10.1145/1462735.1462742","DOIUrl":"https://doi.org/10.1145/1462735.1462742","url":null,"abstract":"Content-based publish/subscribe system performance depends upon the efficient subscription matching and event dissemination to interested subscribers. We propose a hybrid content-based publish/subscribe protocol for large size events wherein a centralized brokering system is coupled with a decentralized BitTorrent-like peer-to-peer (P2P) protocol for scalable event distribution among publishers and subscribers. Events are mapped to a torrent that grows as new events are published. Subscribers self-broker on event metadata and request content only if interested. Subscriber interests determine event popularity that the broker estimates with sampling. Popular events are disseminated P2P; unpopular events, directly from the broker; and somewhat popular ones, with P2P and broker-directed pre-seeding. The challenge is the dissemination of popular events without overwhelming centralized resources while efficiently disseminating unpopular events that lack sufficient interest to sustain gossip-based dissemination. The key advances include new means of handling variable event popularity inherent in content-based pub/sub and an adaptive anti-entropy mechanism for undelivered events.","PeriodicalId":340887,"journal":{"name":"Companion '08","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129412293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Companion '08Pub Date : 2008-12-01DOI: 10.1145/1462735.1462761
Guido Söldner, R. Kapitza, Sven Schober
{"title":"Dynamic weaving of components in a distributed environment","authors":"Guido Söldner, R. Kapitza, Sven Schober","doi":"10.1145/1462735.1462761","DOIUrl":"https://doi.org/10.1145/1462735.1462761","url":null,"abstract":"In ubiquitous computing, dynamic adaptation and the evolvability of software become increasingly important. This paper proposes AOCI, an aspect-oriented component infrastructure that combines the core ideas of aspect-oriented programming (AOP) and component based systems. Components are usually considered as black boxes that can be combined to form complex systems. In the context of our infrastructure, components export possible points of adaptation, which are tagged with ontological information. This information enables the use of AOP techniques without detailed knowledge about the component's internals, enabling distributed and dynamic adaptation.","PeriodicalId":340887,"journal":{"name":"Companion '08","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129791979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Companion '08Pub Date : 2008-12-01DOI: 10.1145/1462735.1462746
Jatinder Singh, D. Eyers, J. Bacon
{"title":"Credential management in event-driven healthcare systems","authors":"Jatinder Singh, D. Eyers, J. Bacon","doi":"10.1145/1462735.1462746","DOIUrl":"https://doi.org/10.1145/1462735.1462746","url":null,"abstract":"Health processes generate data that must be both stored and shared---often across organisational boundaris. Emerging initiatives in healthcare require the dynamic formation of care teams spanning widely-distributed, heterogeneous infrastructure. These environments suit decoupled communication paradigms such as publish/subscribe. Health information is sensitive, thus access control is critically important. This paper focuses on the management of credentials in event-driven healthcare environments. We describe the integration of credential management mechanisms with a context-sensitive data control model to provide fine-grained specification of data disclosure policy.","PeriodicalId":340887,"journal":{"name":"Companion '08","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127683443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Companion '08Pub Date : 2008-12-01DOI: 10.1145/1462735.1462754
Steven Op de beeck, D. Landuyt, E. Truyen, P. Verbaeten
{"title":"A domain-specific middleware layer using AOSD: next-generation digital news publishing","authors":"Steven Op de beeck, D. Landuyt, E. Truyen, P. Verbaeten","doi":"10.1145/1462735.1462754","DOIUrl":"https://doi.org/10.1145/1462735.1462754","url":null,"abstract":"In this demonstrator we illustrate the design and development of a domain-specific middleware layer for supporting a publishing infrastructure. The design of the middleware layer is based on an aspect-oriented architecture which has been iteratively defined by applying state-of-the-art aspect-oriented methods. The demonstrator shows the implementation and deployment of the middleware layers on top of JBoss, using the JBoss AOP framework.","PeriodicalId":340887,"journal":{"name":"Companion '08","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121629742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}