This document summarizes a presentation on context management in event marketplaces. It discusses how events from marketplaces can provide important context for applications and systems. It introduces Situation-Action Networks (SANs) as a framework for managing unexpected situations using context. It then describes how SANs can be used to define rules for extracting and deriving context from events, using an example of managing vessel context from automatic identification system (AIS) events.
This new whitepaper describes ArcGIS for Emergency Management as a scalable reference configuration with a common operating platform, viewers, and tools designed to support general emergencies.
Considering Context Events in Event-Based Testing of Mobile Applications Porfirio Tramontana
A relevant complexity factor in developing and testing mobile apps is given by their sensibility to changes in the context in which they run. As an example, apps running on a smartphone can be influenced by location changes, phone calls, device movements and many other typologies of context events.
In this paper, we address the problem of testing a mobile app as an event-driven system by taking into account both context events and GUI events. We present approaches based on the definition of reusable event patterns for the manual and automatic generation of test cases for mobile app testing.
One of the proposed testing techniques, based on a systematic and automatic exploration of the behaviour of an Android app, has been implemented and some preliminary case studies on real apps have been carried out in order to explore their effectiveness.
Harnessing Live & Real Time Storytelling by Twitter - Arabnet Beirut 2017ArabNet ME
Where is news breaking first in sports, entertainment, music, and politics? #Twitter! See how Twitter is tapping into what’s happening, pushing the boundaries of conventional storytelling.
Speaker:
Meghan Doyle, Client Partner - MENA, Twitter
Love reading comics? You're not the only one. What about these stories about super-beings keep our eyes glued to the pages and our minds salivating for more? We explore in this deck how comic writers use these storytelling techniques and how you can apply it in your presentation.
Enabling Value Added Services in the Event-based InternetYiannis Verginadis
specific presentation gives an overview of the FP7 project PLAY, along with its main objectives, latest achievements and remaining work.
We discuss thoroughly on how to enable value added services in the event-based internet. Specifically, we give details about the development of two dedicated open-source software components that can exploit distributed and heterogeneous event sources for enabling: i) efficiently and dynamically new event subscriptions (i.e. Event Subscription Recommender) and ii) the recommendation and implementation of workflow adaptations (i.e. Service Adaptation Recommender)
SOFIA - Smart City: an Event Driven Architecture for Monitoring Public Spaces...Sofia Eu
The document describes a smart city architecture developed as part of the SOFIA project. The key components are:
1) An event-driven architecture using knowledge processors (KPs) and semantic information brokers (SIBs) to detect and share information about events detected by heterogeneous sensors.
2) A wireless sensor network (WSN) subsystem that collects raw sensor data and publishes it as events. An event manager then correlates these raw events to detect higher-level composite events.
3) Alert announcers that notify users of critical events using digital displays or mobile notifications. The architecture is demonstrated on a subway station scenario to detect fires and unauthorized presences.
Implementing CSIRT based on some frameworks and maturity modelRakuten Group, Inc.
We implemented CSIRT based on some frameworks and maturity model including FIRST Service Framework, SIM3 and some document devised in Japan. We will explain how to use these documents in this presentation.
The document summarizes a plenary session on intelligent event processing. It discusses challenges in modeling and representing complex events, as well as challenges in event processing techniques. It also outlines challenges in applications of event-driven systems for business processes, pervasive computing, and process evolution. The expected goals are to identify research challenges that can be addressed by intelligent event processing, develop a community around this topic, and publish related work.
This new whitepaper describes ArcGIS for Emergency Management as a scalable reference configuration with a common operating platform, viewers, and tools designed to support general emergencies.
Considering Context Events in Event-Based Testing of Mobile Applications Porfirio Tramontana
A relevant complexity factor in developing and testing mobile apps is given by their sensibility to changes in the context in which they run. As an example, apps running on a smartphone can be influenced by location changes, phone calls, device movements and many other typologies of context events.
In this paper, we address the problem of testing a mobile app as an event-driven system by taking into account both context events and GUI events. We present approaches based on the definition of reusable event patterns for the manual and automatic generation of test cases for mobile app testing.
One of the proposed testing techniques, based on a systematic and automatic exploration of the behaviour of an Android app, has been implemented and some preliminary case studies on real apps have been carried out in order to explore their effectiveness.
Harnessing Live & Real Time Storytelling by Twitter - Arabnet Beirut 2017ArabNet ME
Where is news breaking first in sports, entertainment, music, and politics? #Twitter! See how Twitter is tapping into what’s happening, pushing the boundaries of conventional storytelling.
Speaker:
Meghan Doyle, Client Partner - MENA, Twitter
Love reading comics? You're not the only one. What about these stories about super-beings keep our eyes glued to the pages and our minds salivating for more? We explore in this deck how comic writers use these storytelling techniques and how you can apply it in your presentation.
Enabling Value Added Services in the Event-based InternetYiannis Verginadis
specific presentation gives an overview of the FP7 project PLAY, along with its main objectives, latest achievements and remaining work.
We discuss thoroughly on how to enable value added services in the event-based internet. Specifically, we give details about the development of two dedicated open-source software components that can exploit distributed and heterogeneous event sources for enabling: i) efficiently and dynamically new event subscriptions (i.e. Event Subscription Recommender) and ii) the recommendation and implementation of workflow adaptations (i.e. Service Adaptation Recommender)
SOFIA - Smart City: an Event Driven Architecture for Monitoring Public Spaces...Sofia Eu
The document describes a smart city architecture developed as part of the SOFIA project. The key components are:
1) An event-driven architecture using knowledge processors (KPs) and semantic information brokers (SIBs) to detect and share information about events detected by heterogeneous sensors.
2) A wireless sensor network (WSN) subsystem that collects raw sensor data and publishes it as events. An event manager then correlates these raw events to detect higher-level composite events.
3) Alert announcers that notify users of critical events using digital displays or mobile notifications. The architecture is demonstrated on a subway station scenario to detect fires and unauthorized presences.
Implementing CSIRT based on some frameworks and maturity modelRakuten Group, Inc.
We implemented CSIRT based on some frameworks and maturity model including FIRST Service Framework, SIM3 and some document devised in Japan. We will explain how to use these documents in this presentation.
The document summarizes a plenary session on intelligent event processing. It discusses challenges in modeling and representing complex events, as well as challenges in event processing techniques. It also outlines challenges in applications of event-driven systems for business processes, pervasive computing, and process evolution. The expected goals are to identify research challenges that can be addressed by intelligent event processing, develop a community around this topic, and publish related work.
Combating Fraud and Intrusion Threats with Event ProcessingTim Bass
Combating Fraud and Intrusion Threats with Event Processing, TIBCO, TUCON 2007, Tim Bass, CISSP, Principal Global Architect, DirectorEmerging Technologies Group, TIBCO Software Inc.
The document describes the ASTUTE project which aims to develop context-aware and proactive applications through context modeling and reasoning. It discusses conducting field studies to understand user needs and build ontologies to formally represent context. An emergency response ontology is presented with generic and application-specific layers. The context model is deployed across different user devices and handles high event volumes asynchronously through distributed reasoning on the model.
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING IJNSA Journal
The use of mobile devices is common among people and something essential these days. These devices have limited resources which makes it critical to provide security without compromising user ergonomics, given the large number of cyberattacks that occur. This work proposes a context-aware security mechanism for Mobile Cloud Computing providing a security level of device data privacy from the analysis of the attributes of the network that is connected, available level of RAM, CPU, and battery at the time of communication. of data with the cloud. In addition, Transport Layer Security (TLS) technology is used to create a secure channel for sending data between the client and the server and implement the analysis of the mobile device context using Fuzzy logic. The impact of the proposed mechanism on mobile device performance was measured through stress tests. The proposed mechanism had a superior performance of 38% in the number of executions, 10% of memory, and 0.6% of CPU about the use of a single type of predefined symmetric algorithm for private network environment.
Context Broker Introduction and Reference ArchitecureMaruti Gollapudi
A context broker is a service that gathers, analyzes, and provides context data from various sources in real-time. It collects data from sensors and applications, derives actionable information, and shares updated context to support use cases across various industries. A context broker uses different modes like simple, smart, adaptive, and active depending on its level of data analysis and event detection capabilities.
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementTim Bass
CEP and SOA: An Open Event-Driven Architecture for Risk Management, March 14, 2007, IIT Financial Services 2007, Lisbon, Portugal, Tim Bass, CISSP, Principal Global Architect, Director Emerging Technologies Group
This document discusses the concept of a smart crisis management coalition cloud. It proposes that such a cloud would be instrumented, interconnected, and intelligent. It would be instrumented through a wide range of sensors to monitor critical performance indicators. It would be interconnected through combining information and stream processing techniques to ingest real-time data and build an analytics data warehouse. It would be intelligent by applying advanced analytics to create situational awareness and enabling collaboration through shared understanding. The cloud concept is applied to crisis management as an adaptable, versatile and secure infrastructure to support future crisis management structures.
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTIJwest
In real environment there is a collection of many noisy and vague data, called Big Data. On the other hand,
to work on the data middleware have been developed and is now very widely used. The challenge of
working on Big Data is its processing and management. Here, integrated management system is required
to provide a solution for integrating data from multiple sensors and maximize the target success. This is in
situation that the system has constant time constrains for processing, and real-time decision-making
processes. A reliable data fusion model must meet this requirement and steadily let the user monitor data
stream. With widespread using of workflow interfaces, this requirement can be addressed. But, the work
with Big Data is also challenging. We provide a multi-agent cloud-based architecture for a higher vision to
solve this problem. This architecture provides the ability to Big Data Fusion using a workflow management
interface. The proposed system is capable of self-repair in the presence of risks and its risk is low.
Unicenter NSM is a comprehensive management solution that allows users to discover, monitor, and analyze infrastructure elements through a centralized database and graphical interface. It includes agents to monitor different platforms, and components for event management, systems performance monitoring, discovery, and notification. Unicenter NSM provides integrated management of an enterprise infrastructure through visualization tools, a centralized database, manager applications, and monitoring agents.
This document discusses context awareness and context-aware computing. It defines context as any information that can help characterize an entity's situation, including a user's environment, location, identity, and activity. Context-aware systems use context to provide relevant information and services to users. The document classifies different types of context and discusses how context-aware systems sense context, interpret it ("think"), and take appropriate actions. It also outlines some challenges in building context-aware applications, such as accurately representing and inferring context.
Evaluating and Implementing Security Information Management (SIM) Systems involves three key steps:
1. Defining requirements for event collection, processing, threat assessment, response and integration. Effective SIM systems automate log collection, normalization, correlation and threat analysis from various security devices.
2. Considering licensing and implementation costs, which can be over $100k for software alone. Larger enterprises are more suitable due to economies of scale.
3. Implementing SIM solutions in phases, starting with basic log collection before integrating more advanced correlation and incident response workflows. Pilot programs help evaluate vendor fit and estimate full deployment efforts.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The document describes an emergency response demonstration that uses semantic web technologies to help coordinate emergency services. The demonstration involves a cargo plane crashing in London, causing multiple fires. It shows how an emergency response system could help the Joint Emergency Services Control Centre make sense of the emergency, handle information requests, and make tactical decisions by integrating technologies like ontology mapping, image retrieval, and data management. The goal is to effectively acquire, analyze, and use information in real-time during an emergency response.
Internet of Things and Complex event processing (CEP)/Data fusionBAINIDA
Internet of Things and Complex event processing (CEP)/Data fusion
ปริญญา หิรัญปัณฑาพร
Data Analytics/Advanced Analytics ที่ Allianz Ayudhya
วทม (NIDA)
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
The document describes the architecture and components of the INCIMAG integrated incident management system. It includes operator workstations, an application server, database server, GIS servers, an emergency message content router for interoperability between agencies, a mobile data terminal for field responders, decision support tools, a data warehouse, data harmonization components, a crowdsourcing mobile terminal for citizens, and a crowdsourcing server. It also discusses plans for a field demonstration of the system in Palermo, Italy in June 2016.
Public safety in a multi media era facilitating incident management responseJack Brown
The document discusses facilitating incident management response through improved situational awareness using multimedia technologies. It describes how situational awareness originally referred to a pilot's tactical awareness but now means comprehending observations through additional context. It argues that public safety systems need to integrate data in real-time to provide responders with a shared operational picture. A geospatial visualization of integrated information sources could help facilitate rapid decision making during incidents.
A mobile agent based approach for data management to support 3 d emergency pr...Ijrdt Journal
This document proposes a mobile agent-based approach for data management to support 3D emergency preparedness scenarios over ad-hoc networks. It aims to address the challenges of managing large amounts of data for virtual scenes on mobile devices with limited resources. The approach uses multiple mobile agents that can autonomously make decisions about data computation and node state. The agents work to gather critical data from avatars and supply it to stable neighbor nodes when nodes leave suddenly, to help maintain a persistent virtual environment. The approach is intended to limit disruption to applications and provide a realistic experience even as nodes enter and exit the network dynamically.
The document provides an overview of ArcSight basics including event logging and log management. Key points include:
1) Devices generate event logs that record system activities and security events. ArcSight tools collect, analyze, correlate, and report on these logs to monitor network health, threats, and user activity.
2) ArcSight components include smart connectors that collect logs, a manager that correlates events and writes to the database, and a console for viewing reports and active channels.
3) The event life cycle involves collection, normalization, correlation, and monitoring phases. Events are analyzed in real-time and stored in the database for later reporting and investigation.
Shceduling iot application on cloud computingEman Ahmed
Resource scheduling considers the execution time of every distinct workload, but most importantly, the overall performance is also based on type of workload i.e. with different QoS requirements (heterogeneous workloads) and with similar QoS requirements (homogenous workloads).
More Related Content
Similar to Context Management in Event Marketplaces
Combating Fraud and Intrusion Threats with Event ProcessingTim Bass
Combating Fraud and Intrusion Threats with Event Processing, TIBCO, TUCON 2007, Tim Bass, CISSP, Principal Global Architect, DirectorEmerging Technologies Group, TIBCO Software Inc.
The document describes the ASTUTE project which aims to develop context-aware and proactive applications through context modeling and reasoning. It discusses conducting field studies to understand user needs and build ontologies to formally represent context. An emergency response ontology is presented with generic and application-specific layers. The context model is deployed across different user devices and handles high event volumes asynchronously through distributed reasoning on the model.
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING IJNSA Journal
The use of mobile devices is common among people and something essential these days. These devices have limited resources which makes it critical to provide security without compromising user ergonomics, given the large number of cyberattacks that occur. This work proposes a context-aware security mechanism for Mobile Cloud Computing providing a security level of device data privacy from the analysis of the attributes of the network that is connected, available level of RAM, CPU, and battery at the time of communication. of data with the cloud. In addition, Transport Layer Security (TLS) technology is used to create a secure channel for sending data between the client and the server and implement the analysis of the mobile device context using Fuzzy logic. The impact of the proposed mechanism on mobile device performance was measured through stress tests. The proposed mechanism had a superior performance of 38% in the number of executions, 10% of memory, and 0.6% of CPU about the use of a single type of predefined symmetric algorithm for private network environment.
Context Broker Introduction and Reference ArchitecureMaruti Gollapudi
A context broker is a service that gathers, analyzes, and provides context data from various sources in real-time. It collects data from sensors and applications, derives actionable information, and shares updated context to support use cases across various industries. A context broker uses different modes like simple, smart, adaptive, and active depending on its level of data analysis and event detection capabilities.
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementTim Bass
CEP and SOA: An Open Event-Driven Architecture for Risk Management, March 14, 2007, IIT Financial Services 2007, Lisbon, Portugal, Tim Bass, CISSP, Principal Global Architect, Director Emerging Technologies Group
This document discusses the concept of a smart crisis management coalition cloud. It proposes that such a cloud would be instrumented, interconnected, and intelligent. It would be instrumented through a wide range of sensors to monitor critical performance indicators. It would be interconnected through combining information and stream processing techniques to ingest real-time data and build an analytics data warehouse. It would be intelligent by applying advanced analytics to create situational awareness and enabling collaboration through shared understanding. The cloud concept is applied to crisis management as an adaptable, versatile and secure infrastructure to support future crisis management structures.
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTIJwest
In real environment there is a collection of many noisy and vague data, called Big Data. On the other hand,
to work on the data middleware have been developed and is now very widely used. The challenge of
working on Big Data is its processing and management. Here, integrated management system is required
to provide a solution for integrating data from multiple sensors and maximize the target success. This is in
situation that the system has constant time constrains for processing, and real-time decision-making
processes. A reliable data fusion model must meet this requirement and steadily let the user monitor data
stream. With widespread using of workflow interfaces, this requirement can be addressed. But, the work
with Big Data is also challenging. We provide a multi-agent cloud-based architecture for a higher vision to
solve this problem. This architecture provides the ability to Big Data Fusion using a workflow management
interface. The proposed system is capable of self-repair in the presence of risks and its risk is low.
Unicenter NSM is a comprehensive management solution that allows users to discover, monitor, and analyze infrastructure elements through a centralized database and graphical interface. It includes agents to monitor different platforms, and components for event management, systems performance monitoring, discovery, and notification. Unicenter NSM provides integrated management of an enterprise infrastructure through visualization tools, a centralized database, manager applications, and monitoring agents.
This document discusses context awareness and context-aware computing. It defines context as any information that can help characterize an entity's situation, including a user's environment, location, identity, and activity. Context-aware systems use context to provide relevant information and services to users. The document classifies different types of context and discusses how context-aware systems sense context, interpret it ("think"), and take appropriate actions. It also outlines some challenges in building context-aware applications, such as accurately representing and inferring context.
Evaluating and Implementing Security Information Management (SIM) Systems involves three key steps:
1. Defining requirements for event collection, processing, threat assessment, response and integration. Effective SIM systems automate log collection, normalization, correlation and threat analysis from various security devices.
2. Considering licensing and implementation costs, which can be over $100k for software alone. Larger enterprises are more suitable due to economies of scale.
3. Implementing SIM solutions in phases, starting with basic log collection before integrating more advanced correlation and incident response workflows. Pilot programs help evaluate vendor fit and estimate full deployment efforts.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The document describes an emergency response demonstration that uses semantic web technologies to help coordinate emergency services. The demonstration involves a cargo plane crashing in London, causing multiple fires. It shows how an emergency response system could help the Joint Emergency Services Control Centre make sense of the emergency, handle information requests, and make tactical decisions by integrating technologies like ontology mapping, image retrieval, and data management. The goal is to effectively acquire, analyze, and use information in real-time during an emergency response.
Internet of Things and Complex event processing (CEP)/Data fusionBAINIDA
Internet of Things and Complex event processing (CEP)/Data fusion
ปริญญา หิรัญปัณฑาพร
Data Analytics/Advanced Analytics ที่ Allianz Ayudhya
วทม (NIDA)
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
The document describes the architecture and components of the INCIMAG integrated incident management system. It includes operator workstations, an application server, database server, GIS servers, an emergency message content router for interoperability between agencies, a mobile data terminal for field responders, decision support tools, a data warehouse, data harmonization components, a crowdsourcing mobile terminal for citizens, and a crowdsourcing server. It also discusses plans for a field demonstration of the system in Palermo, Italy in June 2016.
Public safety in a multi media era facilitating incident management responseJack Brown
The document discusses facilitating incident management response through improved situational awareness using multimedia technologies. It describes how situational awareness originally referred to a pilot's tactical awareness but now means comprehending observations through additional context. It argues that public safety systems need to integrate data in real-time to provide responders with a shared operational picture. A geospatial visualization of integrated information sources could help facilitate rapid decision making during incidents.
A mobile agent based approach for data management to support 3 d emergency pr...Ijrdt Journal
This document proposes a mobile agent-based approach for data management to support 3D emergency preparedness scenarios over ad-hoc networks. It aims to address the challenges of managing large amounts of data for virtual scenes on mobile devices with limited resources. The approach uses multiple mobile agents that can autonomously make decisions about data computation and node state. The agents work to gather critical data from avatars and supply it to stable neighbor nodes when nodes leave suddenly, to help maintain a persistent virtual environment. The approach is intended to limit disruption to applications and provide a realistic experience even as nodes enter and exit the network dynamically.
The document provides an overview of ArcSight basics including event logging and log management. Key points include:
1) Devices generate event logs that record system activities and security events. ArcSight tools collect, analyze, correlate, and report on these logs to monitor network health, threats, and user activity.
2) ArcSight components include smart connectors that collect logs, a manager that correlates events and writes to the database, and a console for viewing reports and active channels.
3) The event life cycle involves collection, normalization, correlation, and monitoring phases. Events are analyzed in real-time and stored in the database for later reporting and investigation.
Shceduling iot application on cloud computingEman Ahmed
Resource scheduling considers the execution time of every distinct workload, but most importantly, the overall performance is also based on type of workload i.e. with different QoS requirements (heterogeneous workloads) and with similar QoS requirements (homogenous workloads).
Similar to Context Management in Event Marketplaces (20)
1. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
7th International Workshop on Semantic Business Process Management
Context Management in Event Marketplaces
Yiannis Verginadis
Ioannis Patiniotakis
Nikos Papageorgiou
Dimitris Apostolou
Gregoris Mentzas
Nenad Stojanovic
FZI Forschungszentrum
Information Management Unit Informatik, Karlsruhe,
Institute of Communication and Germany
Computer Systems
National Technical University of Athens
2. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Overview of presentation
Introduction
Situation-Action-Networks (SANs)
Event-based Context Management
Illustrative Scenario
Conclusions
3. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Introduction
Context is “any information that can be used to characterize the
situation of an entity, i.e., a person, place, or object that is
considered relevant to the interaction between a user and an
application, including the user and applications themselves.” [1].
Events from event marketplaces are an important source of context
for service-based applications and systems that consume them
because they may convey important information, which is relevant
for service execution and adaptation.
[1] Dey, AK & Abowd, GD: Towards a Better Understanding of Context and Context-Awareness, In Proceedings of
the PrCHI 2000 Workshop on the What, Who, Where, When, and How of Context-Awareness, pp. 304-307 (2000)
4. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
The Event Marketplace (1/2)
Event-driven World: services exchange events asynchronously
Events are input for services
Just as Services should be tradable, so should events
To receive events, the sources of events must be known
A marketplace like a search engine provides visibility to distributed
sources of events
Nowadays, Everything can generate Events
5. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
The Event Marketplace (2/2)
A platform offering a service based architecture, for maintaining
subscriptions (along with their cost), receiving and relaying event
notifications with the aim of different and distributed event sources
integration (e.g. Pachube).
6. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Overview of presentation
Introduction
Situation-Action-Networks (SANs)
Event-based Context Management
Illustrative Scenario
Conclusions
7. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Motivation
Not everything can be captured at design time
but we can predefine the Goals to be pursued and achieved
Unexpected or non-ordinary situations must be identified
from streams of events exchanged in SBA environment and structure
they are usually not considered at design-time
Selection of (re)Actions to the unexpected situations at runtime
exploiting the current application context information originating from…
Identified situations; they update and enrich application context
In previous work, we have proposed Situation Action Networks
(SANs) framework
8. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
A Basic SAN
The black arrow indicates the order of visiting child nodes.
Parent is visited fist.
Goal expresses what is pursued. I.e. the purpose of process / app
Situation “monitors” when a situation occurs. Blocks meanwhile
Context - Condition
Updates and enriches app context from situation metadata
Checks whether context conditions hold
Action to take if situation occurs and context condition is true
Situation-driven execution, i.e. execution when necessary
9. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
More complex SANs
Root Goal
Root Context
Situation Condition 1 Sub-Goal
Context
Situation Action
Condition 2
Root Goal
S0 CC 0 //
Sub-Goal 1 Sub-Goal 2
S1 CC1 A1 S2 CC2 A2
10. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Overview of presentation
Introduction
Situation-Action-Networks (SANs)
Event-based Context Management
Illustrative Scenario
Conclusions
11. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Event-based Context Management
We discuss a Context Model that associates Context
elements with Events and SANs
We provide two approaches for acquiring context from
simple or complex events and instantiating our context
model. Both approaches use the SAN Editor for:
defining SPARQL queries to specific RDF event payload
information that can update the values of an entity’s context
elements
defining SANs that can use information from several event
streams, analyse them and/or combine them with external
services, in order to update the derived values of context
elements. In this way, we succeed in acquiring higher level
context compared to the lower level information that events
carry.
12. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Context Model (1/2)
We extend and use a context model for facilitating
event-based context detection and derivation
functionality,
in order to better understand situations in dynamic service
oriented environments that demand for new additional
information sources or/and lead to a number of service
adaptations as means for successfully coping with dynamic
environmental changes.
This model is based on the W4H model [9] that
describes the five main elements associated within a
context; the five elements are arranged into a quintuple
(When, What, Where, Who, How).
[9] Truong, HL, Manzoor, A & Dustdar, S: On modeling, collecting and utilizing context information for disaster responses in
pervasive environments, In Proceedings of the 1st int. workshop on Context-aware software technology and applications, pp.
25–28 (2009)
13. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Context Model (2/2)
This Context Model expresses the temporal (i.e. When), spatial (i.e.
Where), declarative (i.e. Who, What) and explanatory (i.e. How) dimensions
of context having as central point of focus the notion of Entity and the
association of Context elements and Events
15. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Overview of presentation
Introduction
Situation-Action-Networks (SANs)
Event-based Context Management
Illustrative Scenario
Conclusions
16. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Marine Scenario – AIS Hub (1/2)
The International Maritime Organization (IMO) requires all vessels
to carry an AIS (Automatic Identification System) transponder on
board,
which transmits their position, speed and course, among some other static
information, such as vessel’s name, dimensions and voyage details.
A vast amount of real time events are available from portals
(http://www.aishub.net/ ) connected to automatic identification
systems (AIS) that contain important vessel information worldwide.
18. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Context Model Specialization (1/2)
In the AISHub Scenario we consider the “Vessel” as the
entity of interest.
In order to capture contextual information related to
Vessels’ context, we have defined the following Context
Elements:
Speed, Course, Position, Status, Distance2Port
Context Model Specialisation using SAN Editor
20. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Detecting Context
Using SAN Editor, we are able to define SPARQL queries to
specific event payload information that update the values of an
entity’s context elements.
21. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Context Model Instantiation for Position Context
Element
22. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Deriving Context using SANs (1/2)
We define a number of SANs that can use information from several
event streams and combine them with external services in order to
update the derived value class of context elements.
23. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Deriving Context using SANs (1/2)
Context derivation can be more complex and may involve multi-level SANs.
Upon traversal of the following SAN the derived value class of the Status
context element will be updated
25. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Overview of presentation
Introduction
Situation-Action-Networks (SANs)
Event-based Context Management
Illustrative Scenario
Conclusions
26. Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Ongoing Work
The Detection and Derivation of Context from Events is
considered essential for Event Marketplaces
The proposed context management approach aims to
cover the increased needs of such dynamic
environments and consists the pillar of our ongoing work
regarding:
Situation Awareness
Dynamic Event Subscriptions Recommendations
Service Adaptation Recommendations