Abstract
Ubiquitous and pervasive applications may present critical requirements from the point of view of functional correctness, reliability, availability, security, and safety. Unlike traditional safety-critical applications, the behavior of ubiquitous and pervasive applications is affected by the movements and location of users and resources. In this article, we first present emerging formal methods for the description of both entities and their behavior in pervasive computing environments; then, we introduce this special issue. Despite many previous works that have focused on modeling the entities, relatively few have concentrated on modeling or verifying behaviors; and almost none has dealt with combining techniques proposed in these two aspects. The articles accepted in this special issue cover some of the topics aforementioned and constitute a representative sample of the latest development of formal methods in pervasive computing environments.
- Alur, R. and Henzinger, T. A. 1994. A really temporal logic. J. ACM 41, 181--203. Google Scholar
Digital Library
- Artho, C., Barringer, H., Goldberg, A., Havelund, K., Khurshid, S., Lowry, M., Pasareanu, C., Rosu, G., Sen, K., Visser, W., and Washington, R. 2005. Combining test case generation and runtime verification. Theor. Comput. Sci. 336, 209--234. Google Scholar
Digital Library
- Bakhouya, M. and Gaber, J. 2008. Approaches for ubiquitous computing. In Wireless Ad Hoc and Sensor Networks. H. Labiod, Ed., ISTE Publishing Knowledge, John Wiley and Sons, UK. 111--142.Google Scholar
- Bellini, P., Mattolini, R., and Nesi, P. 2000. Temporal logics for real-time system specification. ACM Comput. Surv. 32, 12--42. Google Scholar
Digital Library
- Bouquet, P., Giunchiglia, F., van Harmelen, F., Serafini, L., and Stuckenschmidt, H. 2004. Contextualizing ontologies. Web Semant. 1, 325--343. Google Scholar
Digital Library
- Cardelli, L. and Gordon, A. D. 2000a. Anyti anywhere: Modal logics for mobile ambients. In Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'00). ACM, New York, 365--377. Google Scholar
Digital Library
- Cardelli, L. and Gordon, A. D. 2000b. Mobile ambients. Theor. Comput. Sci. 240, 177--213. Google Scholar
Digital Library
- Charatonik, W., Zilio, S. D., Gordon, A. D., Mukhopadhyay, S., and Talbot, J.-M. 2003. Model checking mobile ambients. Theor. Comput. Sci. 308, 1-3, 277--331. Google Scholar
Digital Library
- Chen, H., Finin, T., and Joshi, A. 2004a. Semantic web in the context broker architecture. In Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications (PerCom'04). IEEE Computer Society, Los Alamitos, CA, 277--. Google Scholar
Digital Library
- Chen, H., Perich, F., Finin, T., and Joshi, A. 2004b. Soupa: Standard ontology for ubiquitous and pervasive applications. In Proceedings of the 1st Annual Intermational Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS'04). 258--267.Google Scholar
- Clarke, E. M., Emerson, E. A., and Sistla, A. P. 1986. Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8, 244--263. Google Scholar
Digital Library
- Clarke, E. M., Grumberg, O., and Peled, D. A. 1999. Model Checking. The MIT Press. Google Scholar
Digital Library
- Coronato, A. and De Pietro, G. 2010a. Formal design of ambient intelligence applications. Computer 43, 60--68. Google Scholar
Digital Library
- Coronato, A. and De Pietro, G. 2010b. Formal specification of wireless and pervasive healthcare applications. ACM Trans. Embed. Comput. Syst. 10, 12:1--12:18. Google Scholar
Digital Library
- Coronato, A. and De Pietro, G. 2011. Formal specification and verification of ubiquitous and pervasive systems. ACM Trans. Auton. Adapt. Syst. 6, 9:1--9:6. Google Scholar
Digital Library
- Dey, A. K., Mankoff, J., and Abowd, G. D. 2000. Distributed mediation of imperfectly sensed context in aware environments. http://smartech.gatech.edu/jspui/bitstream/1853/3424/1/00-14.pdf.Google Scholar
- Gandon, F. and Sadeh, N. 2003. A semantic e-wallet to reconcile privacy and context awareness. In Proceedings of the Conference on The SemanticWeb (ISWC'03). Lecture Notes in Computer Science, vol. 2870, Springer, 385--401.Google Scholar
Digital Library
- Gray, P. D. and Salber, D. 2001. Modelling and using sensed context information in the design of interactive applications. In Proceedings of the 8th IFIP International Conference on Engineering for Human-Computer Interaction (EHCI'01). Springer, 317--336. Google Scholar
Digital Library
- Gu, T., Wang, X. H., Pung, H. K., and Zhang, D. Q. 2004. An ontology-based context model in intelligent environments. In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. 270--275.Google Scholar
- Henricksen, K. and Indulska, J. 2006. Developing context-aware pervasive computing applications: Models and approach. Pervasive Mob. Comput. 2, 37--64. Google Scholar
Digital Library
- Hoare, C., Misra, J., Leavens, G. T., and Shankar, N. 2009. The verified software initiative: A manifesto. ACM Comput. Surv. 41, 22:1--22:8. Google Scholar
Digital Library
- Holzmann, G. J. 1997. The model checker spin. IEEE Trans. Softw. Engin. 23, 279--295. Google Scholar
Digital Library
- Karlsson, D., Eles, P., and Peng, Z. 2007. Formal verification of component-based designs. Des. Autom. Embedded Syst. 11, 49--90.Google Scholar
Digital Library
- Lei, H., Sow, D. M., Davis, II, J. S., Banavar, G., and Ebling, M. R. 2002. The design and applications of a context service. SIGMOBILE Mob. Comput. Comm. Rev. 6, 45--55. Google Scholar
Digital Library
- Leucker, M. and Schallhart, C. 2009. A brief account of runtime verification. J. Log. Algebr. Program. 78, 5, 293--303.Google Scholar
Cross Ref
- Milner, R. 2008. Bigraphs and their algebra. Electr. Notes Theor. Comput. Sci. 209, 5--19. Google Scholar
Digital Library
- Ostroff, J. S. and Wohnham, W. 1987. Modeling and verifying real-time embedded computer systems. In Proceedings of the IEEE Real-Time Systems Symposium.Google Scholar
- Ranganathan, A., Al-Muhtadi, J., Chetan, S., Campbell, R., and Mickunas, M. D. 2004. Middlewhere: a middleware for location awareness in ubiquitous computing applications. In Proceedings of the 5th ACM/IFIP/USENIX International Conference on Middleware (Middleware'04). Springer, 397--416. Google Scholar
Digital Library
- Ranganathan, A. and Campbell, R. H. 2008. Provably correct pervasive computing environments. In Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications. IEEE Computer Society, Los Alamitos, CA, 160--169. Google Scholar
Digital Library
- Ranganathan, A., McGrath, R. E., Campbell, R. H., and Mickunas, M. D. 2003. Use of ontologies in a pervasive computing environment. Knowl. Engin. Rev. 18, 209--220. Google Scholar
Digital Library
- Roşu, G. and Havelund, K. 2005. Rewriting-based techniques for runtime verification. Autom. Softw. Eng. 12, 151--197. Google Scholar
Digital Library
- Sobel, A. E. K. and Clarkson, M. R. 2002. Formal methods application: An empirical tale of software development. IEEE Trans. Softw. Engin. 28, 308--320. Google Scholar
Digital Library
- Weis, T., Becker, C., and Brndle, E. 2006. Towards a programming paradigm for pervasive applications based on the ambient calculus. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.2617.Google Scholar
- Weiser, M. 1993. Some computer science issues in ubiquitous computing. Comm. ACM 36, 7484. Google Scholar
Digital Library
- Yin, X. and Knight, J. 2010. Formal verification of large software systems. In Proceedings of the 2nd NASA Formal Methods Symposium (NFM 2010), NASA/CP-2010-216215, C. Muñoz, Ed. 192--201.Google Scholar
- Zhang, D., Gu, T., and Wang, X. 2005. Enabling context-aware smart home with semantic technology. Int. J. Hum.-Friend. Welfare Robot. Syst. 6.Google Scholar
Index Terms
Introduction to special section on formal methods in pervasive computing
Recommendations
Formal Specification and Verification of Ubiquitous and Pervasive Systems
This article presents a methodology to formally express requirements in safety-critical ubiquitous and pervasive applications in order to achieve a higher degree of dependability. In particular, it will be shown how it is possible to formalize and ...
Editorial for special issue on pervasive computing
Pervasive (or Ubiquitous) Computing aims to seamlessly integrate computing and communication with our environment so as to make our day-to-day activities the central focus rather than the computing or communication devices per se. Mark Weiser in his ...
Special track on Ubiquitous Computing: Ubiquitous and Pervasive eCommerce and eBusiness: editorial message
SAC '08: Proceedings of the 2008 ACM symposium on Applied computingUbiquitous computing has emerged as one of the principal information and communication technologies that could lead to the achievement of the Ambient Intelligence (AmI) vision. Ambient Intelligence places human beings at the centre of the future ...






Comments