Pervasive Computing

Pervasive Computing: Past, Present and Future
MS160401106
AYESHA IQBAL

Abstract— The paradigm of pervasive computing describes ubiquitous computing environments that offer each time and anywhere get entry to to records services whilst making the presence of the system invisible to the person. pervasive computing estimated by mark weiser emerged on the conjunction of research and development in some of regions which consist of embedded and gadgets and structures, wireless communications, and dispensed, cellular and context-conscious computing. this paper gives a top level view ofConstituent additives of pervasive computing and descriptions the current progress made because of convergence of those areas of research.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Index Terms—Pervasive computing, embedded and mobile devices, context awareness, mobile computing

T
INTRODUCTION
He idea of pervasive computing is based on a easy concept that with advances in generation, computing system will grow smaller and benefit more energy; this will permit small gadgets to be ubiquitously and invisibly embedded in the normal human surroundings and therefore offer an easy and omnipresent access to a computing environment. in his seminal paper describing early ideas of developing such a pervasive surroundings, mark weiser offered a gadget that protected 3 instructions ofComputing devices: tabs, pads and boards.The design of each of these devices turned into recommended with the aid of the capability of the similar workplace units. Like put up-it notes, tabs were small devices designed for writing small notes; they had been area-aware and had a pressure sensitive screen. larger than tabs, pads were wireless pen-based notebooks, much like writing pads. boards had been notably large, wall-sized interactive surfaces, similar to workplace whiteboards. despite the truthThat the improvement of those devices did now not cross beyond early research phases at the xerox parc labs, they sparked a sizeable interest within the studies and industrial network because of their doubtlessly enormous impact on the way how human beings engage with Computing era.

The fundamental houses of a machine comprised of tabs, pads and boards described by weiser include wireless communications, embedded and mobile devices, disbursed computing, and context recognition. despite the fact that none of those standards are new, every of them has experienced a dramatic manuscript received november 5, 2007.

Increase in recent a long time attaining out into practical domains which, till recently, could now not appear very relevant. for example, wireless communication become pioneered on the quit of the xix century, but current advances in improvement ofCellular gadgets and efficient telecommunications technologies have led to an remarkable boom in use of mobile telephones and a considerable recognition of wealthy media to be had to their users. global connectivity provided by way of the internet and reasonably-priced bandwidth took the idea of distributed computations pioneered in the early 1970’s into the generation of grid and software computing. the essential ideas of pervasive computing systems available each time and everywhere advanced from the convergence of the identical various technology and ideas comprising the system envisioned via weiser.

Pervasive computing is one of the many areas of laptop Science wherein academic research (e.g. context attention and efficient telecommunications protocols) seamlessly integrate with advances inside the industry (e.g. hardware and software program for cellular devices and embedded structures), which ends now not most effective in huge availability of hardware platforms for research, but also in the fast adoption of academic studies results by way of the enterprise. As in any rising studies place, there are many hard troubles in pervasive computing. one of the maximum crucial and open questions is a way to ensure that a computing gadget is seamlessly and invisibly embedded within the surroundings and a way to decrease the possible impact of its intrusiveness on a consumer’s perception. typically, there are jointly complementing approaches to solving the problem of unobtrusiveness of a pervasive machine: through miniaturization of devices and embedding of the gadget’s logic into wearable, hand-held, and mobile devices, in addition to into the environment, and through reaching a degree of intelligence of the device in an effort to be capable of assume the actions of the consumer in the context of the factors inside the environment. as a end result, this type of pervasive system will “fade into the history” and the customers will only want to have interaction with this type of gadget at their enjoyment with out giving it a lot concept. Rresearch and Improvement in pervasive computing structures has come an extended manner from tabs, pads and forums; but the underlying theoretical and technological concepts still remain the equal. This paper examines the modern conceptual framework of pervasive computing systems and offers a top level view of its constituent regions. the paper additionally outlines the cutting-edge country of the artwork in the usage of mobile and clever phones as devices that allow pervasive computing environments.

COMPONENTS OF PERVASIVE COMPUTING SYSTEMS
In keeping with weiser, pervasive computing systems create or are a part of an immersive, completely linked surroundings which becomes completely included with ordinary environment and turn out to be indistinguishable from them. to a large extent, technological answers comprising the fundamentals of a pervasive computing gadget are already in vicinity; it is only a rely of locating higher and greater green methods of their integration. For this reason, pervasive computing emerged at the conjunctionOf the following areas: embedded and cell devices and systems, wi-fi communications, and distributed, cellular and context-aware computing.

Continuous progress in integrated circuit and processor layout engendered a proliferation of ever more effective and smaller computing gadgets. Processor strength of now a days’s clever telephones might also method that of some computer systems a decade in the past. Miniaturization and complex circuit layout affords the capability to embed computational good judgment into a selection of Gadgets, starting from toasters, shavers and photograph frames to vehicles able to parking themselves or adjusting to the road and traffic situations to home equipment which could communicate with every other. This sort of convergence of computational ubiquity and device embedding affords a mechanism for adjusting the customers’ belief and making those systems more bodily invisible. gadgets embedded into the surroundings require wireless conversation talents so as to make sure the gadget’s invisibility and to enable conversation throughout multiple devices or additives of a pervasive computing gadget. Pervasive structures commonly use normally to be had wireless verbal exchange technology, including wireless, bluetooth and rfid sensor technology; existing communique protocols are used along with the ones designed in particular for pervasive structures. Pervasive computing structures also enjoy the decades of research in distributed computing, taking benefit of Ideas and algorithms designed for far off get admission to, excessive availability and fault tolerance. The convergence of these present and nicely-set up fields is essential, however inadequate for in addition a success development of pervasive computing structures.

Similarly to creating the system bodily invisible, the concept of pervasive computing gives for making systems logically invisible. Any such logical invisibility can be achieved if the device can adjust itself to the behavioral styles exhibited by using its consumer and to the elements of the surrounding environment, which include time, region, different users, items and structures. such capabilities may be performed via context-attention, which is a important component in imparting the machine’s logical invisibility to supplement its physical invisibility ensured by using device embedding.

The the rest of this segment examines the evolution of constituent additives converging to implement the vision of pervasive computing.

A. Embedded and Mobile Devices
As anticipated via moore’s regulation, over numerous many years, processing capability had doubled about each two years; it’s miles now feasible and commercially feasible to combine computational logic right into a huge form of products, starting from home appliances to cars. As currently as a decade in the past, it turned into impossible to imagine a networked computing surroundings made out of something smaller than laptops or desktop computers. advances inside the incorporated circuits layout generation made it feasible to transport some or all computational good judgment faraway from traditional components into the devices and elements of the regular environment. With one of these distribution and diffusion of computational resources into the general surroundings, it’s miles increasingly more important to cope with the issues of mobility in networks of heterogeneous portable gadgets. Even as conventional infrastructure-based conversation systems normally provide networking offerings in static regions, pervasive computing systems face a range of particular issues due to their ad-hoc and dynamic topologies; these issues include power control, location cognizance and fault tolerance, which can be mentioned underneath.

Migration of computational power far from the computer and into the overall surroundings introduces new problems in human-laptop interplay. Conventional enter devices, which include keyboards and mice can also no longer serve the only equipment of attaining machine interactivity. the evolving concept of networked and cooperating Gadgets transforms to embrace a various range of items which includes car navigation structures and the factors of smart domestic environments; this type of transformation will necessitate a departure from the usage of many usually prevalent factors of the device input and output as conventional keyboards or mice – for a device blending into the encircling environments, they will be to synthetic. Now a days we witness an emerging trend to broaden new strategies of interplay which are more natural to humans, along with Integrated contact monitors, tabletop computing, or voice and gesture recognition systems. Multi modality will play an expanded role in presenting greater commonplace interfaces that make a provision for the limited availability of enter and output gadgets.

Miniaturization of devices introduces a variety of critical issues concerning the components of human-computer interplay. present cell gadgets frequently have screens which might be sometimes too small to display wealthy media content material that may be located on the web keyboards are often too small or do now not have sufficient keys to conveniently kind lengthy messages; batteries may not have enough capability to assist a extended use of the gadgets for electricity-eating packages.

Wireless Communications
Wi-fi conversation era is an important element contributing to invisibility of pervasive computing systems. Not with standing significant latest advances and unprecedented business success of mobile devices, wi-fi communications era nevertheless stays a noticeably young and rapidly growing field with very lively research in lots of vital areas which include, inclusive of sign interference, first-class of provider, privateness and protection. 3 categories of wi-fi communication requirements dominate the field: protocols for private vicinity networks, neighborhood region networks standards (ieee 802.eleven), and huge vicinity networks (ieee 802.sixteen).

Personal location networks may be implemented using some of technologies which include irda and bluetooth. Infrared facts association (irda) interface became one of the earliest business implementations; it is an infrared-primarily based, quick- range wi-fi communications protocol that supports a transmission price of a hundred and fifteen kbit/s. the maximum substantial Draw backs of the irda era protected its dependency on having an immediate line-of-sight, quick range (underneath 1 m) and a extraordinarily low transmission fee. although irda loved a quick length of recognition in overdue 90’s and early 2000’s most of the developers of pda’s and laptops, it changed into changed by more strong radio-based totally technologies that do not require a direct line-of-sight, have higher bandwidth and longer variety. (Ieee 802.15.1) fashionable commonly called bluetooth is a end result of
A working organization installed to develop a radio-frequency wi-fi popular that successfully replaces irda. bluetooth gives transmission quotes of up to 2.1 mbps and does now not require an immediate line-of-sight for communication. bluetooth has been designed for gadgets with low electricity consumption; modern-day specification of bluetooth standard gives for 3 instructions of gadgets. depending on the magnificence, bluetooth-enabled gadgets emit susceptible indicators from 1 to a hundred mw that offer the variety of transmission from upTo one to one hundred meters. the confined range of class 3 bluetooth devices (up to 1 m) has been designed to reduce interference and it is perfectly suited for lots devices and packages, along with cordless headsets, digital cameras and laptop peripherals, consisting of printers, keyboards and mice.

Wireless verbal exchange protocols for neighborhood region networks are described inside the ieee 802.11 family of standards; modern-day protocols of this family provide information prices up to 248 mbit/s with outside variety of as much as250 m (802.11g). these communications requirements use radio-based transmission, which ends up in a large ability for interference due to an extended signal variety, and because of absorption and scattering by way of limitations. 802.eleven protocols were extensively applied in patron networking gadgets, and deployed in many commercial settings. maximum current wireless “hotspots” are powered by 802.11b/g/n standards. those protocols had been used by a great quantity of projects to cover wider areas(university campuses, city neighborhoods, and whole towns) with wireless net get right of entry to. However, an opportunity technology exists that could be a higher match for such packages. Wimax, the global interoperability for microwave get entry to, is a telecommunications technology based on the ieee 802.sixteen popular aimed at supplying wireless network get admission to over long distances. present day wimax specification shows facts fees of 70 mbit/s, which are attainable over very brief tiers; extra sensible Statistics costs of approximately 10 mbit/s can be sustainably done over longer stages, up to 10 km. due to its bandwidth and variety features, wimax is properly-ideal for providing alternatives to such remaining-mile broadband technology as cable and dsl, and presenting network access to nomadic programs and users. Although wimax to this point has not loved a extensive recognition on par with 802.eleven protocols, it has a totally robust promise and some of primary telecommunication corporations (along with Sprint nex tel) are making significant investments to installation their next era of services using wimax.

Many current cell gadgets put into effect one or greater wireless conversation protocol similarly to their native cell protocols. many of smart phones, which includes iphone, include each bluetooth and 802.eleven protocols. As a result of integrating wireless communication talents, mobile devices emerge as feasible additives that can be easily and seamlessly blended right into a Pervasive computing system.

Mobility
It is increasingly important to don’t forget the impact of tool mobility on device and software program structure, and network infrastructures. the evident trend in tool miniaturization introduces overall performance constraints that impact now not best the device architecture, however additionally the viability of the existing network architectures which include wired nearby vicinity networks and the global internet.

Battery strength is one of the maximum vast performance constraints suffered with the aid of cell devices due to their need for an independent electricity supply, which generally isn’t an difficulty in conventional wired computing systems. every single operation carried out by using the cellular tool, from computations to communications, consumes battery electricity. power intake of the community interface and energy-efficiency of communications protocols is commonly now not a significant issue in stressed out computing systems; but, its importance is accelerated in wi-fi cellular devices. to clear up this trouble, many wireless communications Protocols have special provisions to preserve energy. For instance, strength control schemes in ieee 802.11 protocols offer for “sleep” states whilst cellular gadgets may flip off their transceivers all through extended durations with out a conversation. some other feasible method to limiting a device’s power consumption is to introduce a scheme to lessen the amount of strength-consuming operations a device have to run for you to accomplish a specific challenge. this venture could be solved by introducing more than one degrees of operability for gadgets within a pervasive computing surroundings; in this technique, lengthy-time period data garage and processor-in depth duties are off-loaded or delegated to more resource-wealthy elements of the device, which would allow cellular devices to attention on less power consuming or excessive-precedence nearby obligations.

Tool mobility has a sizeable effect at the structure of networked structures. For example, monitoring of gadgets roaming between areas of different sorts of connectivity and handling intermittent connectivity poses a number open studies troubles. There are many tactics to fixing mobility issues, including the functionality of cellular ip to deal with handover and routing of roaming devices, many practical problems want the specifics of the utility-stage semantics, together with handling of statistics replication throughout tool disconnections.

Moreover, mobility has a profound impact on the layout of software program architectures for mobile andPervasive computing systems. computing systems employing each wi-fi networks and cell devices may require novel techniques to the software improvement. Traditional machine architectures may not be well appropriate for engineering pervasive computing environments, in which users and devices flow around, triggering and producing a dynamic range of events, roaming through converting sets of heterogeneous resources, along with running environments and enter/output modalities. Pervasive Computing systems comprise of a massive range of sensors, gadgets and cellular structures; software program architectures that can be higher applicable to such an environment calls for that the utility common sense be decomposed into atomic capabilities, which are dispensed across ubiquitous processing, garage and input/output assets and that it’s able to reassembling in various mixtures as can be needed by a particular task. provider-oriented architectures enabled with the aid of xml net services offer Applications with the sort of modularity that enhances the modular and disbursed nature of pervasive computing systems.

Distributed Computing
Distributed computing is the manner of dividing a computational challenge into a number of smaller sub-tasks to be finished simultaneously across a number of processors or computer systems. a distributed computing system is comprised of two or greater interconnected and independent computing devices presenting the functionality to share logical and bodily sources. Inside the early tiers of improvement, allotted computing became influenced by using shortage of assets; dispensed structures were evolved to proportion garage or processing electricity with a view to remedy computational issues that might be impossible to tackle on a unmarried computer. modern-day disbursed structures regularly offer cost-powerful alternatives whose performance is comparable to supercomputers. as an example, distributed computing packages offer scientists and engineers with the opportunity to run computationally expensive simulation experiments related to very large facts sets, including astrophysical simulation; climate and climate modeling and design of synthetic substances.

Dispensed structures typically include components playing one among 3 viable roles sources, useful resource managers, and customers. Customers are the human customers or other structures who get admission to the services of a specific disbursed computing device. Assets are both physical devices or items related to the gadget, along with printers, or logical gadgets, together with records documents or databases, dwelling internal or managed by way of the disbursed system and available to the customers. resource managers are software program entities that modify guidelines and access to resources inside the distributed machine. Traditional dispensed Structures are said to have access transparency whilst assets are accessed via abstract interfaces, supplied by means of the aid manager. Each resource inside the distributed gadget has a completely unique identification, impartial of the resource vicinity. A distributed gadget is said to provide transparency of migration if it helps mobility of its resources. it is straightforward to look a number of parallels between the general architectural technique in dispensed systems and pervasive computing structures. tool mobility, one of the key capabilities in a pervasive system is mirrored in the dispensed machine structure, which affords get entry to to shared resources which might be embedded into the surroundings of the machine.

Very significant research history of allotted computing provides a stable conceptual basis for pervasive computing Advances in lively studies troubles of disbursed structures, together with mechanisms for faraway statistics get admission to, security and privateness, excessive availability and fault tolerance play an more and more critical role in the improvement of pervasive computing structures.

Context Awareness and Invisibility
Context-awareness is a important factor permitting the invisibility of pervasive computing structures. Context-aware structures can modify their houses and behavior according to the records about the contemporary kingdom of the user, including physiological nation, behavioral styles, orientation and function, geographical vicinity, or houses of the encompassing surroundings, which includes time of day, close by customers, objects and other structures.

As a result of developing better mechanisms for permitting context recognition, pervasive systems are capable of increase their skills and the variety of offerings based totally on a probably restricted quantity of regionally to be had resources. For example, primarily based on locality and availability, a context-aware service with restricted resources may be capable of off-load processor in depth operations or storage onto other structures placed nearby that have extra sizeable assets. present day pervasive structures are capable of integrating a number of sources of context data and alter their behavior to probably surprising conditions or possibilities. A car navigation gadget this is privy to the ultimate stage of fuel inside the tank and the brand and kind of gas favored by means of the person, may alert the driving force when she or he is inside certain proximity of a gas station selling that form of gasoline at a suitable fee.

Invisibility in a pervasive computing machine depends on how correctly it implements a positive stage of intelligence that might enable it to permit the consumer to focus on a specific project to hand rather on interacting with the gadget itself. context-aware structures utilizing this form of intelligence frequently calculate the cause of the person based totally on some of contexts. as a result, context-focus enables do away with the bottleneck of the human interest by using looking ahead to the consumer’s reactions to relevant activities.

Maximum studies on calculating consumer cause has been dispersed at some stage in many topical regions. In Cell and advert hoc Networks, consumer migration is frequently expected primarily based on past roaming conduct and contemporary function; this procedure is generally vicinity-oriented and is managed through the community infrastructure. pervasive computing structures want to count on the moves of the person and alter themselves even as maintaining a cautious a balance among their pro activity and invisibility of the gadget. maintaining a degree of invisibility is an important requirement for a pervasive computing system; if an software predicts consumer motive incorrectly, ineffectively or awkwardly, the presence of the gadget can be found out. to make subjects worse, adjusting wrong behavior of the gadget might distract the person and require adjusting the device in preference to focusing on the project handy. however, if the system is too timid in predicting the consumer’s cause, the gadget may additionally compromise the concept of context-consciousness because its behavior will now not be noticed by the consumer. as an instance, think a user is viewing a video circulation on a mobile wi-fi tool. as the consumer moves round, if the bandwidth becomes limited or the signal is affected adversely, a pervasive machine should have the functionality to dynamically adapt itself in response these factors without substantially altering the user’s revel in. what should be the proper response of the machine in such a scenario? if the network bandwidth turns into restrained, the system may also reply by switching to a connection with a better bandwidth or offer the person with a lower constancy video stream. each of those effects are equally appropriate, however one in all them can be greater most popular primarily based on user rationale.

The capability of the system to evolve to converting factors in its surroundings is some other essential attention of retaining the machine’s invisibility. Generally, pervasive systems need to evolve to the modifications in availability of assets without revealing the inconsistencies in the delivery of such sources as network bandwidth, to be had reminiscence or processing cycles. Due to the nature of wi-fi communications (interference and put off because of atmospheric conditions or physical obstructions), it’s miles tough to provide connectivity ensures in pervasive computing environments consequently provisions need to be made to make certain green and accurate facts transmission. a number of strategies had been proposed to address this difficulty. the system infrastructure could dynamically alter the transmission constancy based totally available assets. a pervasive device detecting that fewer assets are to be had to a tool may pick out to reduce the transmission fidelity, e.g. adjust the first-class of a video streamed to a tool from broadband to decrease satisfactory or, if vital, to an audio-best circulate in response to very low bandwidth availability; or to reduce the processing load on a tool that is with a low strength supply.

As a substitute, a reservation-based totally qos scheme could be carried out Where in a consumer would request a specific stage of carrier previous to participation. the community infrastructure of a pervasive machine can be capable of determine if there are sufficient assets to satisfy the person’s requirements and to allocate these assets consequently.

Sooner or later, pervasive computing infrastructure could dynamically notify the consumer approximately the changes in resource availability and provide a desire of corrective moves. as an example, when a bandwidth-limited tool is knowledgeable via the pervasive surroundings about opportunity nearby locations with fewer users ingesting the bandwidth, the use may additionally acquire a proposal to transport to that area that allows you to improve the transmission excellent.

Notwithstanding the truth that a number of those scenarios remain greater conceptual than realistic answers, many of them are being pioneered in actual devices and structures each in research labs and inside the customer market.

MOBILE PHONES AND PERVASIVE COMPUTING
Integration of multiple functionalities into a unmarried mobile device is a not unusual fashion in today’s purchaser electronics. many mobile phones have photo/video cameras, gps navigation structures, full keyboards, support more than one wi-fi communications technologies, and can run many programs supported with the aid of their operating system. a fundamental property of a pervasive gadget is to combine into the environment and surround the users with its ubiquitous presence; smart phones may be the key interface tool that connects the user to the pervasive computing surroundings. every time everywhere availability of pervasive offerings can be supported with the aid of the very nature of mobile telephones that offer network access each time needed and from any area. Now a days, mobile telephones act as personalized end factors for plenty information services. a number of instructional and commercial initiatives provide such services as personalized purchasing list control, mapping and navigation applications, and media streaming. Personalization is generally accomplished through enforcing exceptional ranges of context-focus, which vary from rudimentary setting of user preferences to wise profile matching. Every cellular telephone can be associated with a unmarried person and therefore used as a non-public identification token. This selection is used in the main in cell trade: mobile phones can keep private data related to a specific carrier (which includes fee records and account login) that is used for authentication with these services both over a cell community or without delay with a payment facility the usage of rfid or bluetooth. For example, ntt docomo brought its rfid- based felica provider embedded in cell telephones that allows the usage of it for cell payments in many kinds of businesses, inclusive of mass transit systems.

In addition to permitting a wide range of specialized technical offerings, mobile and smart telephones are a conversation tool, which stays their primary practical characteristic. Now a days, mobile communication includes a whole lot extra than interpersonal interaction, but additionally connectivity, content material consumption and introduction. Smart telephones are not best convenient and distinctly handy devices, they’re also capable of ingesting and producing content, along with audio, pics, video, and textual content. originally designed as a verbal exchange device, cell and smart phones have grow to be a device supporting a large range of wealthy social interplay supplying their Customers with get right of entry to to pervasive information services available whenever and anywhere.

Now a days’s clever telephones emerged from the convergence of cellular telephones and pdas inheriting the exceptional features of each. However, cell telephones played a dominant role due to the fact that smart telephones stay predominantly conversation devices with extra computational functionalities, which is surely contemplated within the layout of smart telephones. you’ll observe a certain analogy between the evolution of clever phones and private computer systems. In the beginning, desktops have been designed to be mere desktop calculating machines modeled after minicomputers. with the emergence of the internet, pcs developed from being a device for advent of content and data garage to a totally-fledged conversation tool offering a wide range of offerings, which includes electronic mail, instantaneous messaging, voice over ip, web surfing and publishing, get right of entry to to streaming media, and plenty of others. Rich communique abilties of desktops allowed researches envision the paradigm of pervasive computing, that is grounded in seamless interplay amongst various devices unobtrusively embedded inside the surroundings. However, it’s far the arrival of clever phones that enabled us to approach the implementation of pervasive technologies.

SUMMARY
Pervasive computing has emerged as multi-disciplinary region of research and improvement. constituent disciplines and technology carry years or many years of established outcomes to the location of pervasive computing. However, it’s miles inside the convergence of these diverse areas, that modern-day troubles have emerged and supplied the studies and development community with a brand new frontier. From the original ideas of intelligent computing systems available any time and anywhere advanced by using mark weiser over 25 Years in the past, pervasive computing has advanced into a prolific discipline wherein studies is going hand in hand with practical developments which might be introduced to the leading edge of patron market place. Many technological advances made by way of the academia and the industry caused a plethora of systems and devices with a extensive range of skills, lots of that have been enthusiastically embraced by the purchaser. As weiser wrote “tabs, pads, and boards are just the start of pervasive computing systems.The real electricity of the idea comes no longer from anybody of those gadgets; it emerges from the interplay of all of them.” these days, cell and clever telephones have set up themselves as a ubiquitous tool that offers a diffusion of features similarly to whenever everywhere connectivity, which remains to be the main appeal to mobile users. It’s miles the human nature to try for reference to other people, businesses and sports, which may be fulfilled by using pervasive environments supplying get admission to to ubiquitous information services. Cell and clever telephones are presently placed because the nice tool to get entry to such services until there are extra natural and realistic interfaces presenting for a better interplay with pervasive environments.

REFERENCES
D. Ashbrook, K. Lyons, J. Clawson, “Capturing experiences anytime, anywhere,” IEEE Pervasive Computing, vol. 5, Apr-Jun 2006, pp. 8-11.

R. Ballagas et al, “The smart phone: a ubiquitous input device,” IEEE Pervasive Computing, vol. 5, Jan-Mar 2006, pp. 70-77.

M. Barbeau, “Mobile, distributed, and pervasive computing,” Handbook of Wireless Networks and Mobile Computing, I. Stojmenovic, Ed., John Wiley and Sons, 2002.

R. Beale, “Supporting social interaction with smart phones,” IEEE Pervasive Computing, Vol. 4, Jan-Mar 2005, pp. 35-41.

K. W. Cameron, R. Ge, X. Feng. “High-performance, power-aware distributed computing for scientific applications,” IEEE Computer, Vol. 38, Nov 2005, pp. 40-47.

R. Casas et al, “Hidden issues in deploying an indoor location system,”
IEEE Pervasive Computing, Vol. 6, Apr-Jun 2007, pp. 62-69.

H. Chu et al, “QoS-aware resource management for distributed multimedia applications,” Journal on High-Speed Networking, Vol. 7, Dec 1998, pp. 229 – 257.

N. Eagle, A. Pentland, “Social serendipity: mobilizing social software,”
IEEE Pervasive Computing, Vol. 4, Jan-Mar 2005, pp. 28-34.

M. Ebling, G. Hunt, H. Lei, “Issues for context services for pervasive computing,” Proc. Advanced Topic Workshop Middleware for Mobile Computing, IFIP/ACM Middleware 2001 Conference, 2001, pp. 55-65.

D. Estrin et al, “Connecting the physical world with pervasive networks,” IEEE Pervasive Computing, Vol. 1, Jan-Mar 2002, pp. 59- 69.

D. Geer, “Nanotechnology: the growing impact of shrinking computers,” IEEE Pervasive Computing, Vol. 5, Jan-Mar 2006, pp. 7- 11.

H. Hagras, “Embedding computational intelligence in pervasive spaces,” IEEE Pervasive Computing, Vol. 6, Jul-Sep 2007, pp. 85-89.

T. R. Hansen, J. E. Bardram, M. Soegaard, “Moving out of the lab: deploying pervasive technologies in a hospital,” IEEE Pervasive Computing, Vol. 5, Jul-Sep 2006, pp. 24-31.

K. Henricksen, J. Indulska, A. Rakotonirainy, “Infrastructure for pervasive computing: challenges,” Proc. Workshop on Pervasive Computing and Information Logistics at Informatik 2001, Vienna, pp. 214-222.

J. Hightower, A. LaMarca, I.E. Smith, “Practical lessons from place lab,” IEEE Pervasive Computing, Vol. 5, Jul-Sep 2006,pp. 32-39.

S. Kalasapur, M. Kumar, B. Shirazi, “Evaluating service oriented architectures (SOA) in pervasive computing,” Proc. 4th IEEE International Conference on Pervasive Computing and Communications, Mar 2006, pp. 276-285.

E. Kamioka et al, “A user-driven device handover system in PAN environments,” in Proc. 7th International Conference on Mobile Data Management, May 2006, pp. 56-62.

C. Lee, S. Helal, W. Lee, “Universal interactions with smart spaces,”
IEEE Pervasive Computing, Vol. 5, Jan-Mar 2006, pp. 16-21.

M. Macedonia, “iPhones target the tech elite,” IEEE Computer, Vol. 40, Jun 2007, pp. 94-95, IEEE CS.

L. McLaughlin, “Next-generation entertainment: video goes mobile,”
IEEE Pervasive Computing, Vol. 6, Jan-Mar 2007, pp. 7-10.

Microsoft Surface. http://www.microsoft.com/surface/J. Nichols, B.A. Myers, “Controlling home and office appliances with smart phones,” IEEE Pervasive Computing, Vol. 5, Jul-Sep 2006, pp. 60-67.

E. Petriu et al, “Sensor-based information appliances,” IEEE Instrumentation & Measurement Magazine, Vol. 3, Dec 2000, pp. 31- 35.

K. Ranganathan, I. Foster, “Decoupling computation and data scheduling in distributed data-intensive applications,” Proc. 11th IEEE International Symposium on High Performance Distributed Computing, 2002, pp. 352-359.

A. Ray, S. Kurkovsky, “A survey of intelligent pervasive computing,” Proc. 2003 International Conference on Artificial Intelligence, Las Vegas, NV, June 23-26, 2003.