{"title":"感知移动应用程序的空间策略","authors":"Dave Scott, A. Beresford, A. Mycroft","doi":"10.1109/POLICY.2003.1206968","DOIUrl":null,"url":null,"abstract":"Mobile applications are programs which are able to move themselves between hosts on the network. Sentient applications are programs which can exploit the existence of pervasive networked sensor devices to observe their environment and react accordingly. We believe that properly designed and constrained sentient mobile applications provide a good foundation for building applications for pervasive computing environments. The aims of this work are threefold: (i) motivate the use of sentient mobile applications in next-generation pervasive computing environments; (ii) describe the role of policy in building sentient mobile applications; (iii) demonstrate the need for policy to control sentient mobile applications once they have been deployed.","PeriodicalId":391947,"journal":{"name":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Spatial policies for sentient mobile applications\",\"authors\":\"Dave Scott, A. Beresford, A. Mycroft\",\"doi\":\"10.1109/POLICY.2003.1206968\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile applications are programs which are able to move themselves between hosts on the network. Sentient applications are programs which can exploit the existence of pervasive networked sensor devices to observe their environment and react accordingly. We believe that properly designed and constrained sentient mobile applications provide a good foundation for building applications for pervasive computing environments. The aims of this work are threefold: (i) motivate the use of sentient mobile applications in next-generation pervasive computing environments; (ii) describe the role of policy in building sentient mobile applications; (iii) demonstrate the need for policy to control sentient mobile applications once they have been deployed.\",\"PeriodicalId\":391947,\"journal\":{\"name\":\"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-06-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/POLICY.2003.1206968\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/POLICY.2003.1206968","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mobile applications are programs which are able to move themselves between hosts on the network. Sentient applications are programs which can exploit the existence of pervasive networked sensor devices to observe their environment and react accordingly. We believe that properly designed and constrained sentient mobile applications provide a good foundation for building applications for pervasive computing environments. The aims of this work are threefold: (i) motivate the use of sentient mobile applications in next-generation pervasive computing environments; (ii) describe the role of policy in building sentient mobile applications; (iii) demonstrate the need for policy to control sentient mobile applications once they have been deployed.