skip to main content
introduction

Introduction to special section on formal methods in pervasive computing

Published:04 May 2012Publication History
Skip Abstract Section

Abstract

Ubiquitous and pervasive applications may present critical requirements from the point of view of functional correctness, reliability, availability, security, and safety. Unlike traditional safety-critical applications, the behavior of ubiquitous and pervasive applications is affected by the movements and location of users and resources. In this article, we first present emerging formal methods for the description of both entities and their behavior in pervasive computing environments; then, we introduce this special issue. Despite many previous works that have focused on modeling the entities, relatively few have concentrated on modeling or verifying behaviors; and almost none has dealt with combining techniques proposed in these two aspects. The articles accepted in this special issue cover some of the topics aforementioned and constitute a representative sample of the latest development of formal methods in pervasive computing environments.

References

  1. Alur, R. and Henzinger, T. A. 1994. A really temporal logic. J. ACM 41, 181--203. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Artho, C., Barringer, H., Goldberg, A., Havelund, K., Khurshid, S., Lowry, M., Pasareanu, C., Rosu, G., Sen, K., Visser, W., and Washington, R. 2005. Combining test case generation and runtime verification. Theor. Comput. Sci. 336, 209--234. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bakhouya, M. and Gaber, J. 2008. Approaches for ubiquitous computing. In Wireless Ad Hoc and Sensor Networks. H. Labiod, Ed., ISTE Publishing Knowledge, John Wiley and Sons, UK. 111--142.Google ScholarGoogle Scholar
  4. Bellini, P., Mattolini, R., and Nesi, P. 2000. Temporal logics for real-time system specification. ACM Comput. Surv. 32, 12--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bouquet, P., Giunchiglia, F., van Harmelen, F., Serafini, L., and Stuckenschmidt, H. 2004. Contextualizing ontologies. Web Semant. 1, 325--343. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cardelli, L. and Gordon, A. D. 2000a. Anyti anywhere: Modal logics for mobile ambients. In Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'00). ACM, New York, 365--377. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cardelli, L. and Gordon, A. D. 2000b. Mobile ambients. Theor. Comput. Sci. 240, 177--213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Charatonik, W., Zilio, S. D., Gordon, A. D., Mukhopadhyay, S., and Talbot, J.-M. 2003. Model checking mobile ambients. Theor. Comput. Sci. 308, 1-3, 277--331. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chen, H., Finin, T., and Joshi, A. 2004a. Semantic web in the context broker architecture. In Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications (PerCom'04). IEEE Computer Society, Los Alamitos, CA, 277--. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Chen, H., Perich, F., Finin, T., and Joshi, A. 2004b. Soupa: Standard ontology for ubiquitous and pervasive applications. In Proceedings of the 1st Annual Intermational Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS'04). 258--267.Google ScholarGoogle Scholar
  11. Clarke, E. M., Emerson, E. A., and Sistla, A. P. 1986. Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8, 244--263. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Clarke, E. M., Grumberg, O., and Peled, D. A. 1999. Model Checking. The MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Coronato, A. and De Pietro, G. 2010a. Formal design of ambient intelligence applications. Computer 43, 60--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Coronato, A. and De Pietro, G. 2010b. Formal specification of wireless and pervasive healthcare applications. ACM Trans. Embed. Comput. Syst. 10, 12:1--12:18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Coronato, A. and De Pietro, G. 2011. Formal specification and verification of ubiquitous and pervasive systems. ACM Trans. Auton. Adapt. Syst. 6, 9:1--9:6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Dey, A. K., Mankoff, J., and Abowd, G. D. 2000. Distributed mediation of imperfectly sensed context in aware environments. http://smartech.gatech.edu/jspui/bitstream/1853/3424/1/00-14.pdf.Google ScholarGoogle Scholar
  17. Gandon, F. and Sadeh, N. 2003. A semantic e-wallet to reconcile privacy and context awareness. In Proceedings of the Conference on The SemanticWeb (ISWC'03). Lecture Notes in Computer Science, vol. 2870, Springer, 385--401.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Gray, P. D. and Salber, D. 2001. Modelling and using sensed context information in the design of interactive applications. In Proceedings of the 8th IFIP International Conference on Engineering for Human-Computer Interaction (EHCI'01). Springer, 317--336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Gu, T., Wang, X. H., Pung, H. K., and Zhang, D. Q. 2004. An ontology-based context model in intelligent environments. In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. 270--275.Google ScholarGoogle Scholar
  20. Henricksen, K. and Indulska, J. 2006. Developing context-aware pervasive computing applications: Models and approach. Pervasive Mob. Comput. 2, 37--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Hoare, C., Misra, J., Leavens, G. T., and Shankar, N. 2009. The verified software initiative: A manifesto. ACM Comput. Surv. 41, 22:1--22:8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Holzmann, G. J. 1997. The model checker spin. IEEE Trans. Softw. Engin. 23, 279--295. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Karlsson, D., Eles, P., and Peng, Z. 2007. Formal verification of component-based designs. Des. Autom. Embedded Syst. 11, 49--90.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Lei, H., Sow, D. M., Davis, II, J. S., Banavar, G., and Ebling, M. R. 2002. The design and applications of a context service. SIGMOBILE Mob. Comput. Comm. Rev. 6, 45--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Leucker, M. and Schallhart, C. 2009. A brief account of runtime verification. J. Log. Algebr. Program. 78, 5, 293--303.Google ScholarGoogle ScholarCross RefCross Ref
  26. Milner, R. 2008. Bigraphs and their algebra. Electr. Notes Theor. Comput. Sci. 209, 5--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Ostroff, J. S. and Wohnham, W. 1987. Modeling and verifying real-time embedded computer systems. In Proceedings of the IEEE Real-Time Systems Symposium.Google ScholarGoogle Scholar
  28. Ranganathan, A., Al-Muhtadi, J., Chetan, S., Campbell, R., and Mickunas, M. D. 2004. Middlewhere: a middleware for location awareness in ubiquitous computing applications. In Proceedings of the 5th ACM/IFIP/USENIX International Conference on Middleware (Middleware'04). Springer, 397--416. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Ranganathan, A. and Campbell, R. H. 2008. Provably correct pervasive computing environments. In Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications. IEEE Computer Society, Los Alamitos, CA, 160--169. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Ranganathan, A., McGrath, R. E., Campbell, R. H., and Mickunas, M. D. 2003. Use of ontologies in a pervasive computing environment. Knowl. Engin. Rev. 18, 209--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Roşu, G. and Havelund, K. 2005. Rewriting-based techniques for runtime verification. Autom. Softw. Eng. 12, 151--197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Sobel, A. E. K. and Clarkson, M. R. 2002. Formal methods application: An empirical tale of software development. IEEE Trans. Softw. Engin. 28, 308--320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Weis, T., Becker, C., and Brndle, E. 2006. Towards a programming paradigm for pervasive applications based on the ambient calculus. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.2617.Google ScholarGoogle Scholar
  34. Weiser, M. 1993. Some computer science issues in ubiquitous computing. Comm. ACM 36, 7484. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Yin, X. and Knight, J. 2010. Formal verification of large software systems. In Proceedings of the 2nd NASA Formal Methods Symposium (NFM 2010), NASA/CP-2010-216215, C. Muñoz, Ed. 192--201.Google ScholarGoogle Scholar
  36. Zhang, D., Gu, T., and Wang, X. 2005. Enabling context-aware smart home with semantic technology. Int. J. Hum.-Friend. Welfare Robot. Syst. 6.Google ScholarGoogle Scholar

Index Terms

  1. Introduction to special section on formal methods in pervasive computing

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!