Opportunities and obligations for physical computing systems

被引:91
作者
Stankovic, JA [1 ]
Lee, I
Mok, A
Rajkumar, R
机构
[1] Univ Virginia, Dept Comp Sci, Charlottesville, VA 22903 USA
[2] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
[3] Univ Texas, Austin, TX 78712 USA
[4] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/MC.2005.386
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The authors envision data and services that will be available any place, any time, to all people. Major systems such as those in transportation, manufacturing, infrastructure protection, process control, and electricity distribution networks will become more efficient and capable. People will be safer and experience an improved standard of living. New applications not even imagined today will become a reality. Although ingredients of this vision have existed for several years, the authors believe that developers must focus on the physical, real-time, and embedded aspects of pervasive computing. They refer to this domain as physical computing systems. For pervasive computing to achieve its promise, developers must create not only high-level system software and application solutions, but also low-level embedded systems solutions.
引用
收藏
页码:23 / +
页数:10
相关论文
共 11 条
[1]   EnviroTrack: Towards an environmental computing paradigm for distributed sensor networks [J].
Abdelzaher, T ;
Blum, B ;
Cao, Q ;
Chen, Y ;
Evans, D ;
George, J ;
George, S ;
Gu, L ;
He, T ;
Krishnamurthy, S ;
Luo, L ;
Son, S ;
Stankovic, J ;
Stoleru, R ;
Wood, A .
24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, :582-589
[2]   Hierarchical modeling and analysis of embedded systems [J].
Alur, R ;
Dang, T ;
Esposito, J ;
Hur, Y ;
Ivancic, F ;
Kumar, V ;
Lee, I ;
Mishra, P ;
Pappas, GJ ;
Sokolsky, O .
PROCEEDINGS OF THE IEEE, 2003, 91 (01) :11-28
[3]  
[Anonymous], 2002, ADV COMPUTERS
[4]  
Deng Z, 1997, REAL TIM SYST SYMP P, P308, DOI 10.1109/REAL.1997.641292
[5]  
DENIZ D, 2003, P INT WORKSH LANG CO, P133
[6]   Java']Java-MaC: A run-time assurance approach for Java']Java programs [J].
Kim, M ;
Viswanathan, M ;
Kannan, S ;
Lee, I ;
Sokolsky, O .
FORMAL METHODS IN SYSTEM DESIGN, 2004, 24 (02) :129-155
[7]  
Mok AK, 2002, LECT NOTES COMPUT SC, V2491, P182
[8]   Security in wireless sensor networks [J].
Perrig, A ;
Stankovic, J ;
Wagner, D .
COMMUNICATIONS OF THE ACM, 2004, 47 (06) :53-57
[9]  
SHIN I, 2003, P IEEE REAL TIM SYST, P2
[10]   Denial of service in sensor networks [J].
Wood, AD ;
Stankovic, JA .
COMPUTER, 2002, 35 (10) :54-+