A self-configuring personal agent platform for pervasive computing

Yuhong Feng, Jiannong Cao, Ivan Chuen Ho Lau, Xuan Liu

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

5 Citations (Scopus)

Abstract

Mobile agent technologies have been widely used in distributed computing to take care of the task execution for the user. However, pervasive computing presents new challenges to existing mobile agent systems, especially the need for the context-aware self-configuring collaboration with the services provided by the physical objects. In order to address the problem, this paper presents a self-configuring personal agent platform to enable a mobile agent to adapt to the on-demand collaboration with the services. The platform consists of a Ubiquitous Intelligent Object (UIO) model the pervasive computing environment modeling, a code repository to provide executable codes which can be downloaded and instantiated as a mobile agent's capability at runtime, a service registry server for UIOs to publish and subscribe services, and personal agents, one for each individual user. A prototype of platform has been implemented as proof-of-concept and a preliminary performance study has also been carried out on it using a case study.
Original languageEnglish
Title of host publicationProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Pages438-444
Number of pages7
Volume1
DOIs
Publication statusPublished - 1 Dec 2008
Event5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 - Shanghai, China
Duration: 17 Dec 200820 Dec 2008

Conference

Conference5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Country/TerritoryChina
CityShanghai
Period17/12/0820/12/08

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Communication

Fingerprint

Dive into the research topics of 'A self-configuring personal agent platform for pervasive computing'. Together they form a unique fingerprint.

Cite this