Hostname: page-component-89b8bd64d-nlwjb Total loading time: 0 Render date: 2026-05-10T12:42:02.486Z Has data issue: false hasContentIssue false

Ontology-based models in pervasive computing systems

Published online by Cambridge University Press:  01 December 2007

JUAN YE
Affiliation:
Systems Research Group, School of Computer Science and Informatics, UCD Dublin, Ireland; e-mail: juan.ye@ucd.ie, lorcan.coyle@ucd.ie, simon.dobson@ucd.ie, paddy.nixon@ucd.ie
LORCAN COYLE
Affiliation:
Systems Research Group, School of Computer Science and Informatics, UCD Dublin, Ireland; e-mail: juan.ye@ucd.ie, lorcan.coyle@ucd.ie, simon.dobson@ucd.ie, paddy.nixon@ucd.ie
SIMON DOBSON
Affiliation:
Systems Research Group, School of Computer Science and Informatics, UCD Dublin, Ireland; e-mail: juan.ye@ucd.ie, lorcan.coyle@ucd.ie, simon.dobson@ucd.ie, paddy.nixon@ucd.ie
PADDY NIXON
Affiliation:
Systems Research Group, School of Computer Science and Informatics, UCD Dublin, Ireland; e-mail: juan.ye@ucd.ie, lorcan.coyle@ucd.ie, simon.dobson@ucd.ie, paddy.nixon@ucd.ie

Abstract

Pervasive computing is by its nature open and extensible, and must integrate the information from a diverse range of sources. This leads to a problem of information exchange, so sub-systems must agree on shared representations. Ontologies potentially provide a well-founded mechanism for the representation and exchange of such structured information. A number of ontologies have been developed specifically for use in pervasive computing, none of which appears to cover adequately the space of concerns applicable to application designers. We compare and contrast the most popular ontologies, evaluating them against the system challenges generally recognized within the pervasive computing community. We identify a number of deficiencies that must be addressed in order to apply the ontological techniques successfully to next-generation pervasive systems.

Information

Type
Articles
Copyright
Copyright © Cambridge University Press 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Article purchase

Temporarily unavailable