{"title":"异构访问Java服务的设备中间件","authors":"Andre Elia Assad, N. Rosa","doi":"10.1109/WAINA.2008.251","DOIUrl":null,"url":null,"abstract":"The mobile phone environment is today highly concerned about security threats of buggy, malicious or viruses' code that an end user could download and crash the phone. To prevent this, mobile phones applications operates a virtual sandbox that runs each application in a tightly constrained environment separated from each other. This work proposes a device middleware, namely D-Mid, which leverages an existent device framework to provide an agonistic application model that supports heterogeneous access to the middleware with a minimal impact on performance. Besides mobile devices are likely to have scarce resources, such as memory and CPU clock, so D-Mid provides an inversion of control mechanism that targets a minimal execution environment.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Device Middleware for Heterogeneous Access to Java Services\",\"authors\":\"Andre Elia Assad, N. Rosa\",\"doi\":\"10.1109/WAINA.2008.251\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The mobile phone environment is today highly concerned about security threats of buggy, malicious or viruses' code that an end user could download and crash the phone. To prevent this, mobile phones applications operates a virtual sandbox that runs each application in a tightly constrained environment separated from each other. This work proposes a device middleware, namely D-Mid, which leverages an existent device framework to provide an agonistic application model that supports heterogeneous access to the middleware with a minimal impact on performance. Besides mobile devices are likely to have scarce resources, such as memory and CPU clock, so D-Mid provides an inversion of control mechanism that targets a minimal execution environment.\",\"PeriodicalId\":170418,\"journal\":{\"name\":\"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WAINA.2008.251\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WAINA.2008.251","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Device Middleware for Heterogeneous Access to Java Services
The mobile phone environment is today highly concerned about security threats of buggy, malicious or viruses' code that an end user could download and crash the phone. To prevent this, mobile phones applications operates a virtual sandbox that runs each application in a tightly constrained environment separated from each other. This work proposes a device middleware, namely D-Mid, which leverages an existent device framework to provide an agonistic application model that supports heterogeneous access to the middleware with a minimal impact on performance. Besides mobile devices are likely to have scarce resources, such as memory and CPU clock, so D-Mid provides an inversion of control mechanism that targets a minimal execution environment.