, CO2 is too high ! ")
, // send a notification 12 notificationService.sendNotification
, 15 for(DoorLock doorLock : doorLocks) {
DoorLock 17 conflictManager.lockService(services.get(doorLock)) ,
, 19 } 20 if (state == true) { 21 for(BinaryLight binaryLight : binaryLights) {
Towards a Better Understanding of Context and Context-Awareness, Handheld and Ubiquitous Computing, First International Symposium, HUC'99, p.304307, 1999. ,
The Internet of Things: A survey, Computer Networks, vol.54, p.27872805, 2010. ,
Smart Homes: Past, Present and Future. In: Inside the Smart Home, pp.978-979, 2003. ,
,
A model-based approach to context management in pervasive platforms, Pervasive Computing and Communication Workshops (PerCom Workshops), p.16, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01370467
Challenges: an application model for pervasive computing, MOBICOM 2000, Proceedings of the sixth annual international conference on Mobile computing and networking, p.266274, 2000. ,
RoSe : un framework pour la conception et l'exécution d'applications distribuées dynamiques et hétérogènes. (RoSe : A framework for the design and execution of dynamic and heterogeneous distributed applications), 2012. ,
Context-aware applications: from the laboratory to the marketplace, IEEE Personal Commun. 4, vol.5, p.5864, 1997. ,
,
Programming Support Innovations for Emerging Distributed Applications, p.3, 2010. ,
A survey on context-aware systems, p.263277, 2007. ,
BASE-A Micro-Broker-Based Middleware for Pervasive Computing, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), p.443451, 2003. ,
PCOM-A Component System for Pervasive Computing, Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications, p.6776, 2004. ,
A tool suite to develop Sense/Compute/Control applications, In: Sci. Comput. Program, vol.79, p.3951, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00702909
A survey of context modelling and reasoning techniques, Pervasive and Mobile Computing, vol.6, p.161180, 2010. ,
Integrity considerations for secure computer systems, 1977. ,
DiaSim: A parameterized simulator for pervasive computing applications, 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, p.110, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00403421
Secure computer systems: Mathematical foundations, 1973. ,
Feature interactions in telecommunications systems, 1994. ,
L'habitat du futur: dés et prospective pour le prochain quart de siècle. Documentation française, 1992. ,
A generative programming approach to developing pervasive computing systems, ACM Sigplan Notices, vol.45, issue.2, p.137146, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00405819
Développement logiciel orienté paradigme de conception: la programmation dirigée par la spécication, 2011. ,
Vers un modèle à composants orienté services pour supporter la disponibilité dynamique, 2004. ,
Denition of a software component and its elements, Component-based software engineering: putting the pieces together, p.519, 2001. ,
Autonomous adaptation to dynamic availability using a service-oriented component model, Proceedings of the 26th International Conference on Software Engineering, p.614623, 2004. ,
A review of smart homesPresent state and future challenges, Computer methods and programs in biomedicine, vol.91, p.5581, 2008. ,
A Survey of Context-Aware Mobile Computing Research, 2000. ,
Feature Interactions in Telecommunications and software systems VI, 2000. ,
Autonomic service-oriented context for pervasive applications, Services Computing (SCC), p.491498, 2016. ,
DOI : 10.1109/scc.2016.70
Feature interactions in telecommunications systems, IEEE Communications Magazine, vol.31, pp.18-23, 1993. ,
DOI : 10.1109/35.229532
A lattice model of secure information ow, Communications of the ACM 19, vol.5, p.236243, 1976. ,
DOI : 10.1145/360051.360056
Lessons learned in building pervasive platforms, 11th IEEE Consumer Communications and Networking Conference, p.712, 1013. ,
At home with ubiquitous computing: Seven challenges, Ubicomp 2001: Ubiquitous Computing, p.256272, 2001. ,
DOI : 10.1007/3-540-45427-6_22
URL : http://www.cc.gatech.edu/~keith/classes/ubicomplexity/pdfs/crit/edwards-home.pdf
Understanding android security, IEEE security & privacy, vol.7, p.5057, 2009. ,
iPOJO : Un modèle à composant à service exible pour les systèmes dynamiques. (iPOJO : A exible service-oriented component model for dynamic systems), 2008. ,
The notions of consistency and predicate locks in a database system, Communications of the ACM, vol.19, pp.624-633, 1976. ,
Une démarche de conception et d'implémentation de la protection de la vie privée basée sur le contrôle d'accès appliquée aux compositions de services, 2013. ,
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security (TISSEC), vol.4, p.224274, 2001. ,
The role control center: features and case studies, Proceedings of the eighth ACM symposium on Access control models and technologies, p.1220, 2003. ,
POJO : An acronym for: Plain Old Java Object, 2000. ,
Gaia web site ,
Modéliser le concept de confort dans un habitat intelligent: du multisensoriel au comportement, 2012. ,
Bases de données. Editions Eyrolles, 2003. ,
Modèles de conception et d'exécution pour la médiation et l'intégration de services. (Conception and execution models to mediate and integrate service), 2012. ,
System Support for Pervasive Applications, Future Directions in Distributed Computing, Research and Position Papers, p.212217, 2003. ,
DOI : 10.1007/3-540-37795-6_42
URL : https://digital.lib.washington.edu:443/researchworks/bitstream/1773/6972/1/3072090.pdf
Everyware: The dawning age of ubiquitous computing. New Riders, 2010. ,
, Object Management Group. CORBA 3.1, 2008.
Formal concept analysis: mathematical foundations, Springer Science & Business Media, 2012. ,
OSGi in action: Creating modular applications in Java, 2011. ,
Pervasive computing: The mobile world, 2003. ,
A framework for context-aware pervasive computing applications, 2003. ,
Things that think, Personal Technologies, vol.1, pp.1617-4917, 1997. ,
Protection in operating systems, Communications of the ACM, vol.19, pp.461-471, 1976. ,
,
Towards securing pervasive computing systems by design: a language approach, 2011. ,
Architecturing Conict Handling of Pervasive Computing Resources, In: DAIS, vol.11, p.92105, 2011. ,
Detection of feature interactions in automotive active safety features, 2012. ,
, , 2005.
Context-aware applications survey, 2000. ,
Classication model for access control constraints, Performance, Computing, and Communications Conference, p.410417, 2007. ,
Compatibility issues between services supporting networked appliances, IEEE Communications Magazine, vol.41, p.136147, 2003. ,
Middleware Architecture with Patterns and Frameworks, 2007. ,
Feature interaction benchmark, Third Feature Interaction Workshop (FIW'95), 1995. ,
Smart home systems, Smart Home Systems, 2010. ,
Service-based architecture and frameworks for pervasive health applications, 20th IEEE Conference on Emerging Technologies & Factory Automation, ETFA 2015, p.18, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01196881
, Protection. In: ACM SIGOPS Operating Systems Review, vol.8, issue.1, p.1824, 1974.
Discretionary access control, Encyclopedia of Cryptography and Security, p.353356, 2011. ,
The Vision and Technical Foundations of Ubiquitous Computing, Journal article, p.26, 2001. ,
Ubiquitous Computing: Scenarios from an informatised world, E-Merging Media-Communication and the Media Economy of the Future, p.145163, 2005. ,
, IEEE Engineering in Medicine and Biology Magazine, vol.27, p.1014, 2008.
Modèles, outils et plate-forme d'exécution pour les applications à service dynamiques, 2013. ,
DepSys: Dependency aware integration of cyber-physical systems for smart homes, Cyber-Physical Systems (ICCPS), p.127138, 2014. ,
DOI : 10.1109/iccps.2014.6843717
URL : http://www.cs.virginia.edu/~stankovic/psfiles/ICCPS_14_5-1.pdf
Software architecture: foundations, theory, and practice, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, vol.2, p.471472, 2010. ,
Feature interactions in integrated services of networked home appliances, Proc. of Int'l. Conf. on Feature Interactions in Telecommunication Networks and Distributed Systems (ICFI'05, p.236251, 2005. ,
DOI : 10.1145/1035167.1035206
URL : http://library.naist.jp/dspace/bitstream/10061/12720/1/132_ICSOC2004.pdf
, Service-Oriented Computing: Concepts, Characteristics and Directions, p.312, 2003.
DOI : 10.1109/wise.2003.1254461
A dynamic context conict resolution scheme for groupaware ubiquitous computing environments, Proceedings of the 1st International Workshop on Personalized Context Modeling and Management for UbiComp Applications, p.4247, 2005. ,
Plug-and-play Features, p.150164, 1998. ,
, 3rd IEEE International Conference on Pervasive Computing and Communications, p.716, 2005.
An infrastructure for contextawareness based on rst order logic, Personal and Ubiquitous Computing, vol.7, p.353364, 2003. ,
DOI : 10.1007/s00779-003-0251-x
A Middleware Infrastructure for Active Spaces, IEEE Pervasive Computing, vol.1, p.7483, 2002. ,
Gaia: a middleware platform for active spaces, Mobile Computing and Communications Review, vol.6, p.6567, 2002. ,
Automatic video monitoring system for assessment of ,
, Alzheimer's disease symptoms, The journal of nutrition, vol.16, p.213218, 2012.
The battle of concepts: Ubiquitous Computing, pervasive computing and ambient intelligence in Mass Media, In: Ubiquitous Computing and Communication Journal, vol.4, p.919, 2009. ,
Pervasive computing: vision and challenges, IEEE Personal Commun, vol.8, p.1017, 2001. ,
DOI : 10.1109/98.943998
Context-Aware Computing Applications, First Workshop on Mobile Computing Systems and Applications, WMCSA, p.8590, 1994. ,
Object-oriented and classical software engineering, 2011. ,
American National Standard for Information TechnologyRole based Access Control, ANSI INCITS, vol.359, p.149, 2004. ,
Component software-beyond object-oriented programming, 2002. ,
Access control: principle and practice, IEEE communications magazine, vol.32, p.4048, 1994. ,
Disseminating active map information to mobile hosts, IEEE network, vol.8, p.2232, 1994. ,
Access control: Policies, models, and mechanisms, International School on Foundations of Security Analysis and Design, p.137196, 2000. ,
Object technology: a manager's guide, 1997. ,
Comity-conict avoidance in pervasive computing environments, On the move to meaningful internet systems 2007: OTM 2007 workshops, pp.763-772, 2007. ,
Extending context management for proactive adaptation in pervasive environments, Ubiquitous Information Technologies and Applications, p.823831, 2013. ,
, Nano-informatique et intelligence ambiante: inventer l'ordinateur du XXIe siècle. Hermès Science, 2007.
The Active Badge Location System, In: ACM Trans. Inf. Syst, vol.10, p.91102, 1992. ,
URL : https://hal.archives-ouvertes.fr/hal-00699850
Designing calm technology, PowerGrid Journal, vol.1, issue.1, p.7585, 1996. ,
The computer for the 21st century, Scientic american, vol.265, p.94104, 1991. ,
An application conict detection and resolution system for smart homes, Proceedings of the First International Workshop on Software Engineering for Smart Cyber-Physical Systems, p.3339, 2015. ,
Attributed based access control (ABAC) for web services, Web Services, 2005. ICWS 2005. Proceedings. 2005 IEEE International Conference on. IEEE, 2005. ,