Is Internet-Of-Things (IOT) Related to What’s Called "Pervasive Computing"?
Both are interested in issues beyond just technology, such as privacy, security, and ethics, and both are pursuing similar use cases. Ebling thus encourages the two communities to join forces and work together to achieve common goals.
Industry was quick to recognise the potential for these technologies to radically disrupt the market by offering customers services and products that had hitherto not existed, and the consequent challenges of how shape the enormous possibilities into viable products which customers would want and buy.
After restructuring and building a good "computing area network", the various heterogeneous intelligent computing devices, "integration" of the computer, how to achieve interoperability of components and intercommunication? The key is how to unify description of the device and user needs. The capacity management mechanism is needed for CAN-CSM, and with the ability matching algorithm appropriate device are searched according to user needs (Yu Ying-qun, 2006).
Any effort to categorise research in conceptual modelling quality must therefore explicitly consider the application domain that is used within the research context.
Yu Ying-qun,Cai Xiao-dong On the instability of slotted ALOHA with capture[J]. IEEE Trans on Wireless Communications,2006,5(2):257-261.
Zhang Yunyong, Liu Jinde. Mobile agent technology [M]. Beijing: Tsinghua University Press , 2003:20-34.
Dejan Molojicic.Mobile Agent application from Trend Wars.IEEE concurrency.
Huang hai-ping,Wang ru_chuan,Sun li-juan,Jiang hao.Pervasive Computing scence Apperceive Model Based on Agent & Wireless Sensor Networks[J] Journal of Nanjing University of Posts and Telecommunications.2008. vol. 28 No.2