Abstract: Context-aware mobile computing aims at designing applications that automatically adapt their behaviors to the available location information and the available nearby sensors and devices. This is done in order to fulfill tasks in a way that suits users' current context best. To achieve this, context representation and manipulation are important issues, so as to establish formal context models. In this paper, basic elements of context-aware systems are described with an emphasis on location information representations. Space models for location-based applications are presented. Considered realistic applications concern intelligent vehicles and pervasive road networks.
Abstract: his paper proposes a non-linear state-space dynamic model for planar proton exchange membrane fuel cell (PEMFC). Our objective is the realization of a model that evokes a more realistic approach of dynamic behavior of the fuel cell by considering most of elements that influence the system evolution. For instance, pressure, temperature and humidification rate effects on the cell resistance are taken into account. The model is based on both thermodynamic and electrical aspects, proposing a realistic equivalent circuit which integrates most of the fuel cell components. Simulation results show that our proposed model is in agreement with fuel cell real operating principles.
Abstract: Legal information certification and secured storage combined with documents electronic signature are of great interest when digital documents security and conservation are in concern. Therefore, these new and evolving technologies offer powerful abilities, such as identification, authentication and certification. The latter contribute to increase the global security of legal digital archives conservation and access. However, currently used cryptographic and hash coding concepts cannot intrinsically enclose cognitive information about both the signer and the signed content. Indeed, an evolution of these technologies may be necessary to achieve full text researches within hundreds or thousands of electronically signed documents. This article aims at describing a possible model along with associated processes to create and make use of these new electronic signatures called "meaningful electronic signatures" as opposed to traditional electronic signatures based on bit per bit computation.
Abstract: The certification and legal data storage, bound to data electronic signature open new perspectives to data security. Like this, these technologies offer capabilities such as: identification, authentification, certification, aiming to the global capacity of secured data storage. However, it appears that certification and electronic signature does not completely answer to enterprise needs concerning authentification and secured data storage. The purpose of this paper is a solution proposal to these problems.
Abstract: This chapter presents main existing standards used for inter-vehicle communication. Thechniques such as DSRC, WAV or CALM are presented. The chapter also lists some of the most important european projects that have adressed the issue of vehicle-to-vehicle communication, such as FleetNET or WILLWARN.
Abstract: The emergence of the New Technologies of Information and Communication (NTIC), and the development of new tools open some perspectives for multimedia application design. In this paper we propose a graphical model of cooperative navigation of the multimedia applications. The model is based on the distinction between public and private areas. We use Petri nets to model several patterns which allow to build a complete navigation process. An example is worked out to illustrate the proposed approach.
Abstract: Despite the fact that several languages have been proposed for Web service composition (BPEL, WSCI, BPMN to name a few), their lack of well-defined formal semantics does not support formal analysis. The verification of Web service composition is thus a complicated task that can benefit from the use of formal methods.
In this paper, an approach to specify, verify and validate the service composition using the LOTOS formal specification language is proposed. To achieve this task, we provide a translation into LOTOS for each workflow control-flow pattern. A working example is then presented to show how a service composition workflow can be specified using these patterns and validated using CADP toolkit.
Abstract: Modelling, performance analysis and control play a major role in the design of discrete event systems (DES). An adequate formal method to describe the behaviour of such systems is necessary. This paper deals with the modelling and the performance evaluation of a public transportation system. The behaviour of such system is studied in the framework of DES. Specifically, the study focuses on modelling of transportation system using the two complementary tools Petri nets (PN) and dioid algebra. In this study, we model the behaviour of the systems without taking into account the constraints related to synchronization phenomena (bus waiting in the connection stops in order to exchange the passengers). The performance analysis of the considered network is made by solving and analysing the (max, +) state model which describes the analytical behaviour of the network. Journey times of passengers and calculation of shortest path from an origin to a destination will be considered in the stage of performance evaluation. An example of application illustrates the results and the techniques proposed will be carried out.
Abstract: The ASSET Road EU FP7 research project aims at promoting new embedded location-based services. The Work Package our research team is responsible for will address the inter-service interaction issue. GNSS will be used to deliver location information. The interoperability between services relies on Semantic Web technologies and approaches. Well-defined scenarios will be tested and implemented for the ASSET Road project.
Notes: In this paper, we present a distributed locationbased services platform using mobile and embedded communications means, integrating GNSS positioning. This work is a part of the ASSET Road EU FP7 research project.
Abstract: Embedded computing systems, sensor networks, LBS pervasive deployment environments, and worldwide computing systems have common characteristics. They are large scale, decentralized and dynamic networks, and needing context-awarness to automatically adapt their behaviour and continue their execution despite network dynamics. Identifying innovative software engineering approaches that take into account all the above mentionned characteristics is a real challenge. This paper focuses on LBS applications and the middleware models required for supporting their operation and characteristics.
Abstract: Ubiquitous and pervasive networks and applications include a growing number of research themes. In most use cases, applications require location information to interpret their environment and behave accordingly.
Locating mobile devices has always been a critical problem. Today, wireless communication progress rapidly. A multitude of portable devices are available. In order to provide more value-added applications, one must acquire the location information of a mobile device, on any given network. GPS technology is widely available in the civilian market for personal navigation applications. Althought GPS-based location is reliable and accurate for outdoor situations, it does not provide satisfactory performance in indoor and urban areas, with extensive multipath conditions. Other technologies have been developed in order to implement the specificities of ubiquitous and pervasive environments. This report presents main algorithms and positioning techniques used for wireless geolocation.
Abstract: This paper presents a new approach based on (max, plus) algebra to model cooperative navigation in pervasive e- learning applications. This modeling approach is appropriate for modeling these systems that are governed, on the one hand, by events occurrence in a discrete state space, and on the other hand, by synchronization and parallelism phenomena. In addition, this approach enables to verify in a formal way the model consistency.
Abstract: Context-aware mobile computing aims at designing applications that automatically adapt their behaviors to the available location information and the available nearby sensors and devices. This is done in order to fulfill tasks in a way that suits users' current context best. To achieve this, context representation and manipulation are important issues, so as to establish formal context models. In this paper, basic elements of context-aware systems are described with an emphasis on location information representations. Space models for location-based applications are presented. Considered realistic applications concern intelligent vehicles and pervasive road networks.
Abstract: Time-stamping becomes a vital component of the emerging electronic business infrastructures. The main goal is to provide users with time management and possibly signed electronic content protection. We address the purpose and usage of time-stamps on electronic documents and electronic signatures. A discussion is opened on the effective need of time-stamping electronic signatures through the study of two time-stamping technologies.
Abstract: Distributed object-oriented computing allows efficient use of the Network Of Workstations (NOW) paradigm. However, the underlying middlewares used to develop and deploy such applications do not provide developers with any standard supervision mechanism so that they know exactly what happens during their applications execution. This paper analyzes distributed CORBA and JAVA-based applications to point out functional and management supervision information which has to be gathered from the objects. Developers will use this information to improve the Quality of Service (QoS) of their distributed object-oriented applications (DOA). Our framework is based on a CORBA service which uses our supervision API. This supervision service is composed of agents running on supervised computers. They interact with managed objects to perform local supervision measurements. These measurements may then be used to determine supervision indicators such as objects membership and computers exclusion degrees.
Abstract: Data certification and digital signature are a new area of interest and many standards have emerged. Indeed, these technologies offer identification, authentication and non-repudiation capabilities during Internet transactions (emails and e-commerce). However, it appears that both certification and digital signature do not completely answer enterprise data authentication and secured data storage needs. We submit a proposition of an authorities-based architecture to answer these issues. This architecture relies on most of the available standards
Abstract: Recent emerging of advanced networking technologies (IPv6, ATM, FastEthernet) together with the development of Internet technologies and distributed computing such as World Wide Web, Java and CORBA have the goal of offerig heterogeneous services to users across various geographical and network boundaries. Consequently, many innovations in developing and adopting such emerged technlogies are needed to guarantee the Quality of Service (QoS) in real-time distributed applications. An environment called Distributed Objects Management Protocol (DOMP) is defined to supervise and manage real-time distributed applications in order to mporve their QoS.
Abstract: In this work, an approach is proposed to specify, formally verify and implement composite Web services. This model-driven approach embraces the principles of the Model-Driven Architecture (MDA) as promoted by the OMG. It allows for the developer to work at a high level of abstraction by handling graphical models that are independent from programming concepts and implementation technologies. These models are described using the UML modeling language. Specifically, an extension to UML called UML-S is proposed to adapt the language to the specific needs of the Web service composition domain. UML-S models are expressive and precise enough to support direct transformation into low-level execution code while being easily readable. These models can also be transformed into formal descriptions in LOTOS to support the formal verification of the composition. The approach proposed contributes to reducing development time and costs while contributing to the robustness of the service composition.
Abstract: The Web of today represents a broad space where users research, discover and share information. In this context, the process of Web service discovery plays a significant role. Indeed, such process allows linking the information published by service providers and the requests of users, looking for information. Generally, such process involves text or keyword-based techniques. Still, this kind of discovery fails in retrieving only relevant information. Our approach is to design a more « intelligent » system that allows using a knowledge base during the service discovery process, as it is done in the Semantic Web vision.
This thesis presents a framework for semantic Web service discovery using non-functional service characteristics. The framework relies on the Web Ontology Language for Services (OWL-S) to design a template for describing non-functional service parameters in a way that facilitates service discovery. Our model is designed to facilitate the discovery of semantic Web services. This service description model is used as a core for designing the interfaces and the querries. Two interfaces are developped : one for the service providers, and one for the final users. The search algorithm presented in this thesis is designed to maximize precision and completeness of service discovery.
Abstract: Nowadays information systems benefit from multiple autonomous and complementary processes that cooperate to provide end-users with elaborated services. Distributed object-oriented systems integrate the object concept in terms of services implementation. Although most of them make use of security protocols to achieve message transmission confidentiality, access control is reserved to a minority. We suggest a UML model of a distributed object-oriented system, based on the CORBA standard main principles such as interface and implementation abstraction, using an Interface Description Language (IDL), environments and programming languages heterogeneity handling, and common services usage. This model allows distributed objects strong authentication and access control. It also offers confidentiality, supervision and audit mechanisms. The proposed control scheme makes use of a new secure IDL contract (S-IDL) grammar. S-IDL extends common IDL definitions to express security requirements. Electronic signature takes an important part of the proposed model as it testifies messages integrity and provides means for non repudiation. This model comes along with a new signature structure proposal derived from existing standards, which takes into account legal recommendations. This format is integrated into an inter-object communication protocol described using Abstract Syntax Notation One (ASN.1) and UML languages. A prototype which contributes to a large-scaled �trust chain� implementation is designed according to the model. This chain is composed of a set of distributed third parties that interact with each other. Beyond distributed computing, our ultimate goal is to contribute to make electronic signature accessible to the general public, providing tools that connect with the proposed distributed trust chain.