15 results on '"Karl Michael Göschka"'
Search Results
2. Optimizing the Cost-Performance Ratio of FaaS Deployments.
- Author
-
Richard Patsch and Karl Michael Göschka
- Published
- 2023
- Full Text
- View/download PDF
3. Sensor Node Fault Detection in Wireless Sensor Networks Utilizing Node-Level Diagnostics.
- Author
-
Dominik Widhalm, Karl Michael Göschka, and Wolfgang Kastner
- Published
- 2023
- Full Text
- View/download PDF
4. A definition of convergence in the area of information and telecommunication technologies.
- Author
-
Wolfgang Radinger and Karl Michael Göschka
- Published
- 2002
- Full Text
- View/download PDF
5. Distributed Applications and Interoperable Systems : 12th IFIP WG 6.1 International Conference, DAIS 2012. Stockholm, Sweden, June 13-16, 2012, Proceedings
- Author
-
Karl Michael Göschka, Seif Haridi, Karl Michael Göschka, and Seif Haridi
- Subjects
- Computer networks, Software engineering, Application software, User interfaces (Computer systems), Human-computer interaction, Information storage and retrieval systems, Computers
- Abstract
This book constitutes the refereed proceedings of the 12th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2012, held in Stockholm, Sweden, in June 2012 as one of the DisCoTec 2012 events. The 12 revised full papers and 9 short papers presented were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on peer-to-peer and large scale systems; security and reliability in web, cloud, p2p, and mobile systems; wireless, mobile, and pervasive systems; multidisciplinary approaches and case studies, ranging from Grid and parallel computing to multimedia and socio-technical systems; and service-oriented computing and e-commerce.
- Published
- 2012
6. ZigZag: a Middleware for Service Discovery in Future Internet
- Author
-
Yérom-David Bromberg, Preston Rodrigues, Daniel Negru, Laurent Réveillère, Laboratoire Bordelais de Recherche en Informatique (LaBRI), Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB), Karl Michael Göschka, Seif Haridi, TC 6, and WG 6.1
- Subjects
Service (business) ,business.industry ,Computer science ,Service discovery ,Local area network ,020206 networking & telecommunications ,02 engineering and technology ,Reuse ,Service provider ,computer.software_genre ,World Wide Web ,[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing ,Middleware (distributed applications) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,[INFO]Computer Science [cs] ,business ,Mobile device ,computer ,Computer network - Abstract
International audience; Over the last few years, social networks, mobile devices and personalized services have been heavily responsible for a substantial in- crease in remote services available over Internet. Consequently, service consumers have to discover remote services anytime, anywhere across networks boundaries making thus service discovery, and their underlying Service Discovery Protocols (SDPs) more important than ever. In this paper, we introduce ZigZag, a middleware to reuse and extend current SDP, designed for local networks, to discover available services across network boundaries as required in Future Internet. Our approach is based on protocol translation to enable service discovery irrespective of their underlying SDP. Further, we provide a thorough evaluation to validate our approach.
- Published
- 2012
7. Flexub: Dynamic Subscriptions for Publish/Subscribe Systems in MANETs
- Author
-
Engineer Bainomugisha, Koosha Paridel, Jorge Vallejos, Yolande Berbers, Wolfgang De Meuter, Software Languages Lab (SLL), Vrije Universiteit Brussel (VUB), Department of Computer Science, Catholic University of Leuven - Katholieke Universiteit Leuven (KU Leuven), Karl Michael Göschka, Seif Haridi, TC 6, WG 6.1, Goschka, Karl M., Haridi, Seif, Software Languages Lab, Informatics and Applied Informatics, and Göschka, Karl M
- Subjects
Flexibility (engineering) ,Service (systems architecture) ,Computer science ,business.industry ,mobile ad hoc networks ,Control (management) ,Context (language use) ,02 engineering and technology ,Mobile ad hoc network ,Publish/Subscribe systems ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,context-aware systems ,020201 artificial intelligence & image processing ,[INFO]Computer Science [cs] ,Dimension (data warehouse) ,URL Subscription Architecture ,business ,Publication ,subscription mechanisms ,Computer network - Abstract
Current publish/subscribe systems provide very limited support to modify subscriptions dynamically. Consequently, they cannot efficiently control the flow of events between publishers and subscribers, which may lead to unnecessary network traffic. In addition, it is not possible to automatically subscribe or unsubscribe to a service depending on certain context of use. This implies for developers to manually manage subscriptions (e.g., taking care of when to cancel or re-issue a subscription), which may result in inappropriate subscription states (e.g., subscriptions that are cancelled too late). In this paper, we propose the concept of dynamic subscription mechanisms that improves the expressiveness and flexibility of subscriptions. We introduce a new dimension to a subscription that allows a subscriber to express the flow of matched events, and when a new subscription can be (re)issued. We validate our claims for improved flexibility and expressiveness by providing language abstractions and a prototype implementation of a dynamic subscription mechanism framework called Flexub that supports a variation of subscription mechanisms. When compared to existing subscription models, our experiment results show that the support for dynamic subscription mechanisms greatly reduces network traffic of events sent from publishers to the subscribers. In addition, our approach reduces the workload on the subscriber side. ispartof: pages:132-139 ispartof: Distributed Applications and Interoperable Systems vol:7272 pages:132-139 ispartof: DAIS 2012 location:Stockholm, Sweden date:13 Jun - 16 Jun 2012 status: published
- Published
- 2012
8. Something Old Is New Again: Reimagining the Oldest Social Networking Platform
- Author
-
Marin Orlić, Mario Žagar, Ivan Voras, Faculty of Electrical Engineering and Computing [Zagreb] (FER), University of Zagreb, Karl Michael Göschka, Seif Haridi, TC 6, and WG 6.1
- Subjects
Internet ,Social network ,business.industry ,Computer science ,05 social sciences ,Internet privacy ,SMTP ,IMAP ,02 engineering and technology ,Work in process ,Web ,World Wide Web ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Proof of concept ,020204 information systems ,e-mail ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,The Internet ,social network ,[INFO]Computer Science [cs] ,protocol ,business ,Protocol (object-oriented programming) ,050107 human factors - Abstract
International audience; The phenomenon of social networking has entered the lives of millions of people via the ubiquitous Web-based platforms such as Facebook and Google+ which are centralized platforms completely controlled by single entities. However, a complete parallel message-passing infrastructure already exists and has the benefit of 30 years experience and investments: the SMTP e-mail network, which together with the latest technologies can be utilized to provide a completely decentralized, convenient, private and even fault-tolerant social networking platform. This work in progress aims to design and implement a proof of concept of such idea.
- Published
- 2012
9. Behavioral Singletons to Consistently Handle Global States of Security Patterns
- Author
-
Linda Ariani Gunawan, Peter Herrmann, Frank Alexander Kraemer, Department of Telematics, Norvegian University of Science, Trondheim, Norwegian University of Science and Technology [Trondheim] (NTNU), Norwegian University of Science and Technology (NTNU)-Norwegian University of Science and Technology (NTNU), Karl Michael Göschka, Seif Haridi, TC 6, and WG 6.1
- Subjects
Authentication ,Finite-state machine ,Transport Layer Security ,Computer science ,Interface (Java) ,Distributed computing ,020207 software engineering ,System requirements specification ,02 engineering and technology ,Cryptographic protocol ,Computer security ,computer.software_genre ,Behavioral modeling ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,[INFO]Computer Science [cs] ,computer ,Block (data storage) - Abstract
International audience; Secure systems are usually complex since stateful security mechanisms like authentication and authorization have to be integrated into the functional behavior at various places. The security operations are, in general, interdependent such that events at one place may influence the behavior at other places. Thus, the composed specification of a system is neither easy to understand nor to analyze, and a faulty integration of the security mechanisms is often overseen. In this paper, we introduce the concept of singletons into our model-based engineering technique SPACE which facilitates a straightforward integration of security aspects. The behavior of a security protocol is encapsulated in a building block using a two-view interface contract. One view of the contract is quite simple and suffices for the correct integration of the block into a system specification. The other view is more complex but has to be considered only by the block designers to verify that the behavioral model in the block fulfills its interface contract. We exemplify the singletons by means of an authorization mechanism and discuss how to prove that the two views of its interface contract are consistent.
- Published
- 2012
10. Connecting your Mobile Shopping Cart to the Internet-of-Things
- Author
-
Nicolas Petitprez, Romain Rouvoy, Laurence Duchien, Adaptive Distributed Applications and Middleware (ADAM), Laboratoire d'Informatique Fondamentale de Lille (LIFL), Université de Lille, Sciences et Technologies-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lille, Sciences Humaines et Sociales-Centre National de la Recherche Scientifique (CNRS)-Université de Lille, Sciences et Technologies-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lille, Sciences Humaines et Sociales-Centre National de la Recherche Scientifique (CNRS)-Inria Lille - Nord Europe, Institut National de Recherche en Informatique et en Automatique (Inria), Université de Lille, Sciences et Technologies-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lille, Sciences Humaines et Sociales-Centre National de la Recherche Scientifique (CNRS), Université de Lille, Sciences et Technologies, Karl Michael Göschka, Seif Haridi, Macchiato, TC 6, and WG 6.1
- Subjects
[INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR] ,business.industry ,Computer science ,Process (engineering) ,Control (management) ,020206 networking & telecommunications ,02 engineering and technology ,computer.file_format ,World Wide Web ,0202 electrical engineering, electronic engineering, information engineering ,SPARQL ,020201 artificial intelligence & image processing ,The Internet ,[INFO]Computer Science [cs] ,Product (category theory) ,RDF ,business ,Semantic Web ,computer ,Architectural style - Abstract
International audience; Online shopping has reached an unforeseen success during the last decade thanks to the explosion of the Internet and the development of dedicated websites. Nonetheless, the wide diversity of e-commerce websites does not really foster the sales, but rather leaves the customer in the middle of dense jungle. In particular, finding the best offer for a specific product might require to spend hours browsing the Internet without being sure of finding the best deal in the end. While some websites are providing comparators to help the customer in finding the best offer meeting her/his requirements, the objectivity of these websites remains questionable, the comparison criteria are statically defined, while the nature of products they support is restricted to specific categories (e.g., electronic devices). In this paper, we introduce MACCHIATO as a user-centered platform leveraging online shopping. MACCHIATO implements the principles of the Internet-of-Things by adopting the REST architectural style and semantic web standards to navigate product databases exposed on the Internet. By doing so, customers keep the control of their shopping process by selecting the stores and comparing the offers according to their own preferences.
- Published
- 2012
11. Dissemination of reconfiguration policies on mesh networks
- Author
-
Jean-Marc Jézéquel, Olivier Barais, Erwan Daubert, Johann Bourcier, Noël Plouzeau, Francois Fouquet, Reliable and efficient component based software engineering (TRISKELL), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), Design and Implementation of Autonomous Distributed Systems (MYRIADS), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Karl Michael Göschka, Seif Haridi, TC 6, WG 6.1, Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Université de Bretagne Sud (UBS)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Université de Bretagne Sud (UBS)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), and Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)
- Subjects
ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.11: Software Architectures ,Grid network ,business.industry ,Vector clock ,Computer science ,Distributed computing ,Concurrency ,Mesh networking ,Control reconfiguration ,020207 software engineering ,02 engineering and technology ,ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.11: Software Architectures/D.2.11.1: Domain-specific architectures ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,Gossip ,0202 electrical engineering, electronic engineering, information engineering ,Systems architecture ,020201 artificial intelligence & image processing ,[INFO]Computer Science [cs] ,Architecture ,business ,Computer network - Abstract
International audience; Component-based platforms are widely used to develop and deploy distributed pervasive system that exhibit a high degree of dynam- icity, concurrency, distribution, heterogeneity, and volatility. This paper deals with the problem of ensuring safe yet efficient dynamic adaptation in a distributed and volatile environment. Most current platforms pro- vide capabilities for dynamic local adaptation to adapt these systems to their evolving execution context, but are still limited in their ability to handle distributed adaptations. Thus, a remaining challenge is to safely propagate reconfiguration policies of component-based systems to ensure consistency of the architecture configuration models over a dynamic and distributed system. In this paper we implement a specific algorithm rely- ing on the models at runtime paradigm to manage platform independent models of the current system architecture and its deployed configuration, and to propagate reconfiguration policies. We evaluate a combination of gossip-based algorithms and vector clock techniques that are able to propagate these policies safely in order to preserve consistency of archi- tecture configuration models among all computation nodes of the system. This evaluation is done with a test-bed system running on a large size grid network.
- Published
- 2012
12. Spectra: Robust Estimation of Distribution Functions in Networks
- Author
-
Paulo Cesar de Jesus, Miguel Borges, Paulo Sérgio Almeida, Carlos Baquero, High-Assurance Software Laboratory [Braga, Portugal] ( HASLab ), University of Minho [Braga]-Institute for Systems and Computer Engineering, Technology and Science [Porto] (INESC TEC), Karl Michael Göschka, Seif Haridi, TC 6, WG 6.1, and Universidade do Minho
- Subjects
FOS: Computer and information sciences ,020203 distributed computing ,Mathematical optimization ,Computer science ,Cumulative distribution function ,C.2.4 ,G.3 ,Local property ,020206 networking & telecommunications ,02 engineering and technology ,16. Peace & justice ,Maxima and minima ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Distribution function ,Computer Science - Distributed, Parallel, and Cluster Computing ,Distributed algorithm ,Robustness (computer science) ,Outlier ,Computer Science - Data Structures and Algorithms ,0202 electrical engineering, electronic engineering, information engineering ,Data Structures and Algorithms (cs.DS) ,[INFO]Computer Science [cs] ,Distributed, Parallel, and Cluster Computing (cs.DC) ,Maxima - Abstract
Lecture Notes in Computer Science, Volume 7272, 2012., The distributed aggregation of simple aggregates such as minima/maxima, counts, sums and averages have been studied in the past and are important tools for distributed algorithms and network co- ordination. Nonetheless, this kind of aggregates may not be comprehen- sive enough to characterize biased data distributions or when in presence of outliers, making the case for richer estimates. This work presents Spectra, a distributed algorithm for the estimation of distribution functions over large scale networks. The estimate is available at all nodes and the technique depicts important properties: robustness when exposed to high levels of message loss, fast convergence speed and fine precision in the estimate. It can also dynamically cope with changes of the sampled local property and with churn, without requiring restarts. The proposed approach is experimentally evaluated and contrasted to a competing state of the art distribution aggregation technique., (undefined)
- Published
- 2012
13. Slead: Low-Memory, Steady Distributed Systems Slicing
- Author
-
Etienne Rivière, Miguel Matos, Rui Oliveira, Francisco Maia, High-Assurance Software Laboratory [Braga, Portugal] ( HASLab ), University of Minho [Braga]-Institute for Systems and Computer Engineering, Technology and Science [Porto] (INESC TEC), Université de Neuchâtel (UNINE), Karl Michael Göschka, Seif Haridi, TC 6, and WG 6.1
- Subjects
020203 distributed computing ,Computer science ,Distributed computing ,Process (computing) ,Stability (learning theory) ,020206 networking & telecommunications ,02 engineering and technology ,Bloom filter ,Slicing ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Ranking ,Convergence (routing) ,Node (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,sort ,[INFO]Computer Science [cs] - Abstract
International audience; Slicing a large-scale distributed system is the process of autonomously partitioning its nodes into k groups, named slices. Slicing is associated to an order on node-specific criteria, such as available storage, uptime, or bandwidth. Each slice corresponds to the nodes between two quantiles in a virtual ranking according to the criteria.For instance, a system can be split in three groups, one with nodes with the lowest uptimes, one with nodes with the highest uptimes, and one in the middle. Such a partitioning can be used by applications to assign different tasks to different groups of nodes, e.g., assigning critical tasks to the more powerful or stable nodes and less critical tasks to other slices.Assigning a slice to each node in a large-scale distributed system, where no global knowledge of nodes’ criteria exists, is not trivial. Recently, much research effort was dedicated to guaranteeing a fast and correct convergence in comparison to a global sort of the nodes.Unfortunately, state-of-the-art slicing protocols exhibit flaws that preclude their application in real scenarios, in particular with respect to cost and stability. In this paper, we identify steadiness issues where nodes in a slice border constantly exchange slice and large memory requirements for adequate convergence, and provide practical solutions for the two. Our solutions are generic and can be applied to two different state-of-the-art slicing protocols with little effort and while preserving the desirable properties of each. The effectiveness of the proposed solutions is extensively studied in several simulated experiments.
- Published
- 2012
14. A middleware for pervasive situation-awareness
- Author
-
Sotirios Terzis, Graham Thomson, Goschka, Karl, Haridi, Seif, Department of Computer and Information Sciences [Univ Strathclyde], University of Strathclyde [Glasgow], Karl Michael Göschka, Seif Haridi, TC 6, and WG 6.1
- Subjects
QA75 ,020203 distributed computing ,Ubiquitous computing ,Situation awareness ,Computer science ,Interface (Java) ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,computer.software_genre ,Variety (cybernetics) ,World Wide Web ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Software deployment ,020204 information systems ,Middleware (distributed applications) ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,Architecture ,User needs ,computer - Abstract
International audience; Situation-awareness is the ability of applications to adapt to the current situation of their users. For situation-awareness to be truly pervasive it should support the individual needs of every user, everywhere. We present a middleware for pervasive situation-awareness based on the idea of separating the features of a situation from the specification of how it should be recognised. The features of a situation can be seen as an interface that can be easily customised to satisfy individual user needs, while alternative specifications can be used to recognise a situation in different environments. The middleware views situations as collections of roles that individuals and devices play. Its implementation follows an agent-based architecture where collaborating agents acquire and reason over context data. We also show that the middleware can recognise a variety of highly customised situations using alternative specifications with performance that is acceptable for interactive situation-aware applications in realistic deployment sizes.
- Published
- 2012
15. On the Design and Development of webinos: A Distributed Mobile Application Middleware
- Author
-
Ivan Flechais, Ayse Göker, André Paul, Shamal Faily, John Lyle, Hans Myrhaug, Andrew P. Martin, Heiko Desruelle, Department of Computer Science, University of Oxford [Oxford], Fraunhofer Institute for Open Communication Systems (Fraunhofer FOKUS), Fraunhofer (Fraunhofer-Gesellschaft), Department of Information Science, City University London, AmbieSense Ltd, Department of Information Technology, Universiteit Gent = Ghent University [Belgium] (UGENT), Karl Michael Göschka, Seif Haridi, TC 6, WG 6.1, Göschka, Karl Michael, and Haridi, Seif
- Subjects
Technology and Engineering ,Computer science ,business.industry ,Interoperability ,020207 software engineering ,Cloud computing ,02 engineering and technology ,World Wide Web ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,020204 information systems ,Middleware ,0202 electrical engineering, electronic engineering, information engineering ,IBCN ,[INFO]Computer Science [cs] ,business - Abstract
International audience; As personal devices become smarter, opportunities arise for sharing services, applications and data between them. While web technologies hold the promise of being a unifying layer, browsers lack functionality for supporting inter-device communication, synchronization, and security. To address this, we designed webinos: a cross-device distributed middleware providing interoperability, compatibility and security for mobile web applications. In this paper we present a case study of the webinos project, showing how the architecture of webinos was specified, designed and implemented, and reflect on several lessons learned.
- Published
- 2012
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.