Skip to main content

Controlling Real World Pervasive Environments with Knowledge Bases

  • Conference paper
Knowledge-Based and Intelligent Information and Engineering Systems (KES 2010)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6279))

  • 1532 Accesses

Abstract

With the ever increasing popularity of mobile devices and the widespread deployment of different types of networks, pervasive environments have truly arrived. Although such environments are already being utilised to provide services based on the available data, the modelled domain knowledge is generally not formally verified for consistency and applicability within and across domains. This paper presents our knowledge-based verification and control approach and shows its need and effectiveness. In our system model, policies in the form of rules are authored at different levels of abstraction at different layers in the policy hierarchy. Top level rules are written in first-order predicate logic based on a formal ontology of the domain. Detection and resolution of feature interactions (or conflicts) is an important task in the policy hierarchy. Our running example is the pervasive mobile learning environment of a university campus. Our approach is easily and equally applicable to other pervasive environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: The computer for the 21st century. SIGMOBILE Mob. Comput. Commun. Rev. 3(3), 3–11 (1999)

    Article  Google Scholar 

  2. Jones, D., Bench-Capon, T., Visser, P.: Methodologies for ontology development. In: Proceedings of the IT&KNOWS Conference, XV IFIP World Computer Congress (1998)

    Google Scholar 

  3. Foundations. In: Grimm, S., Volz, R. (eds.) Semantics At Work, Ontology Management Tools and Techniques (June 2007)

    Google Scholar 

  4. Liu, L., Özsu, M.T. (eds.): Encyclopedia of Database Systems. Springer, New York (2009)

    MATH  Google Scholar 

  5. OWL Web Ontology Language overview, W3C recommendation (2004), http://www.w3.org/TR/owl-features/

  6. Knowledge Interchange Format, KIF (1992), http://www.ksl.stanford.edu/knowledge-sharing/kif/

  7. RIF use cases and requirements, W3C working draft (2006), http://www.w3.org/TR/rif-ucr/

  8. SWRL: A semantic web rule language combining OWL and RuleML, W3C member submission (2004), http://www.w3.org/Submission/SWRL/

  9. Cobcroft, R.S., Towers, S., Smith, J., Bruns, A.: Mobile learning in review: Opportunities and challenges for learners, teachers, and institutions. In: Online Learning and Teaching (OLT) Conference, pp. 21–30 (2006)

    Google Scholar 

  10. Motiwalla, L.F.: Mobile learning: A framework and evaluation. Comput. Educ. 49(3), 581–596 (2007)

    Article  Google Scholar 

  11. Hightower, J., Borriello, G.: Location Systems for Ubiquitous Computing. Computer 34(8), 57–66 (2001)

    Article  Google Scholar 

  12. Wi-Fi Based Real-Time Location Tracking: Solutions and Technology. White paper, Cisco Systems (2006) (available online)

    Google Scholar 

  13. Alvi, A., Greaves, D.J.: Checkable domain management with ontology and rules. In: ICIW 2008: Proceedings of the 3rd International Conference on Internet and Web Applications and Services, Athens, Greece, June 8-13, pp. 142–149 (2008)

    Google Scholar 

  14. O’Connor, M.J., Knublauch, H., Tu, S.W., Grosof, B.N., Dean, M., Grosso, W.E., Musen, M.A.: Supporting rule system interoperability on the semantic web with SWRL. In: Gil, Y., Motta, E., Benjamins, V.R., Musen, M.A. (eds.) ISWC 2005. LNCS, vol. 3729, pp. 974–986. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. O’Connor, M.J., Tu, S.W., Nyulas, C., Das, A.K., Musen, M.A.: Querying the semantic web with SWRL. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, vol. 4824, pp. 155–159. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. Keck, D.O., Kuehn, P.J.: The feature and service interaction problem in telecommunications systems: A survey. IEEE Trans. Softw. Eng. 24(10), 779–796 (1998)

    Article  Google Scholar 

  17. Bouma, W.: Feature interactions. In: Kent, A., Williams, J.G. (eds.) Encyclopedia of Computer Science and Technology, vol. 40, pp. 1–23. Marcel Dekker, Inc., New York (1999)

    Google Scholar 

  18. SWRLLanguageFAQ, Protégé wiki (2010), http://protege.cim3.net/cgi-bin/wiki.pl?SWRLLanguageFAQ

  19. Berners-Lee, T., Kagal, L.: The fractal nature of the semantic web. AI Magazine 29(3), 29–34 (2008)

    MathSciNet  Google Scholar 

  20. Alvi, A., Greaves, D.J.: A logical approach to home automation. In: IE 2006: Proceedings of the 2nd IET International Conference on Intelligent Environments, Athens, Greece, July 5-6, vol. 2, pp. 45–50. IET (2006)

    Google Scholar 

  21. Greaves, D.J., Gordon, D., Alvi, A., Omitola, T.: Using a .net checkability profile to limit interactions between embedded controllers. In: SENSORCOMM 2008: Proceedings of the 2008 Second International Conference on Sensor Technologies and Applications, Washington, DC, USA, pp. 555–561. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  22. Mehmood, R.: Disk-based techniques for efficient solution of large Markov chains. PhD thesis, University of Birmingham (2004)

    Google Scholar 

  23. Mehmood, R., Crowcroft, J.: Parallel iterative solution method for large sparse linear equation systems. Technical Report 650 UCAM-CL-TR-650, Computer Laboratory, University of Cambridge, UK (2005)

    Google Scholar 

  24. Thomas, R.K., Russello, G., Tsang, S.: Realizing the cdl cross-domain language in the ponder2 policy framework: Experiences and research directions. In: POLICY 2009: Proceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, Washington, DC, USA, pp. 76–83. IEEE Computer Society, Los Alamitos (2009)

    Chapter  Google Scholar 

  25. Adamson, M.K., Mehmood, R.: Developing event based hierarchical middleware for e-learning. In: IADIS International Conference e-Learning 2007 (part of MCCSIS 2007), pp. 284–291 (2007)

    Google Scholar 

  26. Ayres, G., Mehmood, R., Mitchell, K., Race, N.J.P.: Localization to enhance security and services in wi-fi networks under privacy constraints. In: Communications Infrastructure. Systems and Applications in Europe, EuropeComm 2009, London, UK, August 11-13 (2009), Revised Selected Papers, LNICST, vol. 16, 175–188 (2009)

    Google Scholar 

  27. Mehmood, R., Crowcroft, J., Hand, S., Smith, S.: Grid-level computing needs pervasive debugging. In: GRID 2005: Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, Washington, DC, USA, pp. 186–193. IEEE Computer Society, Los Alamitos (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Alvi, A., Nabi, Z., Greaves, D., Mehmood, R. (2010). Controlling Real World Pervasive Environments with Knowledge Bases. In: Setchi, R., Jordanov, I., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based and Intelligent Information and Engineering Systems. KES 2010. Lecture Notes in Computer Science(), vol 6279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15384-6_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15384-6_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15383-9

  • Online ISBN: 978-3-642-15384-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics