{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:04:08Z","timestamp":1754157848005,"version":"3.41.2"},"reference-count":52,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2007,12,31]],"date-time":"2007-12-31T00:00:00Z","timestamp":1199059200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The event\u2010driven paradigm is appropriate for context aware, distributed applications, yet basic events may be too low level to be meaningful to users. The authors aim to argue that this bottom\u2010up approach is insufficient to handle very low\u2010level sensor data or to express all the queries users might wish to make.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The authors propose an alternative model for querying and subscribing transparently to distributed state in a real\u2010time, ubiquitous, sensor\u2010driven environment such as is found in Sentient Computing.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The framework consists of four components: a state\u2010based, temporal first\u2010order logic (TFOL) model that represents the concrete state of the world, as perceived by sensors; an expressive TFOL\u2010based language, the Abstract Event Specification Language (AESL) for creating abstract event definitions, subscriptions and queries; a higherorder service (Abstract Event Detection Service) that accepts a subscription containing an abstract event definition as an argument and in return publishes an interface to a further service, an abstract event detector; and a satisfiability service that applies classical, logical satisfiability in order to check the satisfiability of the AESL definitions against the world model, in a manner similar to a constraint\u2010satisfaction problem.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper develops a model\u2010based approach, appropriate for distributed, heterogeneous environments.<\/jats:p><\/jats:sec>","DOI":"10.1108\/17427370710863112","type":"journal-article","created":{"date-parts":[[2008,4,5]],"date-time":"2008-04-05T07:18:12Z","timestamp":1207379892000},"page":"347-377","source":"Crossref","is-referenced-by-count":7,"title":["SCAFOS: linking sensor data to context\u2010aware applications using abstract events"],"prefix":"10.1108","volume":"3","author":[{"given":"Eleftheria","family":"Katsiri","sequence":"first","affiliation":[]},{"given":"Jean","family":"Bacon","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Mycroft","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022013120060629800_b1","doi-asserted-by":"crossref","unstructured":"Bacon, J. and Moody, K. (2000), \u201cToward open, secure, widely distributed services\u201d, Communications of the ACM, Vol. 45 No. 6, pp. 59\u201064.","DOI":"10.1145\/508448.508475"},{"key":"key2022013120060629800_b2","unstructured":"Bacon, J., Bates, J., Hayton, R. and Moody, K. (1995), \u201cUsing events to build distributed applications\u201d, Proceedings of the 2nd International Workshop on Services in Distributed and Network Environments, Whistler, CA, IEEE Computer Society Press, pp. 148\u201055."},{"key":"key2022013120060629800_b3","doi-asserted-by":"crossref","unstructured":"Bacon, J., Eyers, D., Moody, K. and Pesonen, L. (2005), \u201cSecuring publish\/subscribe for multi\u2010domain systems\u201d, Proceedings of Middleware 2005, Grenoble, France, LNCS, pp. 1\u201020.","DOI":"10.1007\/11587552_1"},{"key":"key2022013120060629800_b4","doi-asserted-by":"crossref","unstructured":"Bacon, J., Moody, K. and Yao, W. (2002), \u201cA model of OASIS role\u2010based access control and its support for active security (TISSEC)\u201d, ACM Transactions on Information Systems Security, Vol. 5 No. 4, pp. 492\u2010540.","DOI":"10.1145\/581271.581276"},{"key":"key2022013120060629800_b5","doi-asserted-by":"crossref","unstructured":"Bacon, J., Moody, K., Bates, J., Hayton, R., Ma, C., McNeil, A., Seidel, O. and Spiteri, M. (2000), \u201cGeneric support for distributed applications\u201d, IEEE Computer, Vol. 33 No. 03, pp. 68\u201076.","DOI":"10.1109\/2.825698"},{"key":"key2022013120060629800_b6","unstructured":"Bahl, P. and Padmanabhan, V.N. (2000), \u201cRADAR: an in\u2010building rf\u2010based user location and tracking system\u201d, Proceedings of IEEE INFOCOM 2000 (2), Tel\u2010Aviv, Israel, IEEE Computer, pp. 775\u201084."},{"key":"key2022013120060629800_b7","doi-asserted-by":"crossref","unstructured":"Belokosztolszki, A., Eyers, D., Pietzuch, P., Bacon, J. and Moody, K. (2003), \u201cRole\u2010based access control for publish\/subscribe Middleware architectures\u201d, Proceedings of the 2nd International Workshop on Distributed Event\u2010Based Systems (DEBS '03), San Diego, CA, ACM Press, pp. 1\u20108.","DOI":"10.1145\/966618.966622"},{"key":"key2022013120060629800_b8","doi-asserted-by":"crossref","unstructured":"Bonnet, P., Gehkre, J. and Seshadri, P. (2001), \u201cTowards sensor database systems\u201d, Proceedings of the 2nd International Conference on Mobile Data Management, Springer\u2010Verlag, Hong Kong, pp. 3\u201014.","DOI":"10.1007\/3-540-44498-X_1"},{"key":"key2022013120060629800_b9","doi-asserted-by":"crossref","unstructured":"Cardelli, L. and Gordon, A. (1998), \u201cMobile ambients\u201d, Proceedings of the 1st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS '98), Springer\u2010Verlag, Lisbon, pp. 140\u201055.","DOI":"10.1007\/BFb0053547"},{"key":"key2022013120060629800_b10","doi-asserted-by":"crossref","unstructured":"Carzaniga, A., Rosenblum, D.S. and Wolf, A.L. (2001), \u201cDesign and evaluation of a wide\u2010area event notification service\u201d, ACM Transactions on Computer Systems, Vol. 19 No. 3, pp. 332\u201083.","DOI":"10.1145\/380749.380767"},{"key":"key2022013120060629800_b11","doi-asserted-by":"crossref","unstructured":"Caswell, D. and Debaty, P. (2000), \u201cCreating web representations for places\u201d, Proceedings of the 2nd International Symposium on Handheld and Ubiquitous Computing (HUC'00), Springer\u2010Verlag, Bristol, pp. 114\u201026.","DOI":"10.1007\/3-540-39959-3_9"},{"key":"key2022013120060629800_b12","unstructured":"Date, C.J. (1998), An Introduction to Database Systems, Addison\u2010Wesley, Boston, MA."},{"key":"key2022013120060629800_b13","doi-asserted-by":"crossref","unstructured":"Dey, A.K. and Abowd, G.D. (2000), \u201cCyberMinder: a context\u2010aware system for supporting reminders\u201d, Proceedings of the 2nd International Symposium on Handheld and Ubiquitous Computing (HUC'00), Springer\u2010Verlag, Bristol, pp. 172\u201086.","DOI":"10.1007\/3-540-39959-3_13"},{"key":"key2022013120060629800_b14","unstructured":"Dey, A.K. and Abowd, G.D. (2000), \u201cProviding architectural support for building context\u2010aware applications\u201d, PhD thesis. Georgia Institute of Technology."},{"key":"key2022013120060629800_b15","unstructured":"Digital Technology Group (DTG), available at: http:\/\/www.cl.cam.ac.uk\/Research\/DTG\/"},{"key":"key2022013120060629800_b16","unstructured":"Fleming, R. and Kushner, C. (1995), Low\u2010Power, Miniature, Distributed Position Location and Communication Devices Using Ultra\u2010Wideband, Non\u2010Sinusoidal Communication Technology, technical report, Aether Wire Location."},{"key":"key2022013120060629800_b17","doi-asserted-by":"crossref","unstructured":"Forgy, C.L. (1992), \u201cRete: a fast algorithm for the many pattern\/many object pattern\u2010match problem\u201d, Artificial Intelligence, Vol. 19 No. 1, pp. 17\u201037.","DOI":"10.1016\/0004-3702(82)90020-0"},{"key":"key2022013120060629800_b18","unstructured":"Gehani, N.H., Jagadish, H.V. and Shmueli, O. (1992), \u201cComposite event specification in active databases: model and implementation\u201d, Proceedings of the 18th International Conference on Very Large Databases, Vancouver, CA, pp. 327\u20108."},{"key":"key2022013120060629800_b19","unstructured":"Hanson, E.N., Bodagala, S., Hasan, M., Kulkarni, G. and Rangarajan, J. (1995), Optimized Rule Condition Testing in Ariel Using Gator Network, Tech Report No. TR\u201095\u2010027, CISE Department, University of Florida, Gainesville, FL."},{"key":"key2022013120060629800_b20","doi-asserted-by":"crossref","unstructured":"Harter, A., Hopper, A., Steggles, P., Ward, A. and Webster, P. (1999), \u201cThe anatomy of a context\u2010aware application\u201d, Proceedings of the 5th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom '99), ACM Press, Seattle, WA, pp. 59\u201068.","DOI":"10.1145\/313451.313476"},{"key":"key2022013120060629800_b21","doi-asserted-by":"crossref","unstructured":"Hopper, A. (1999), \u201cThe Clifford Paterson lecture: sentient computing\u201d, Philosophical Transactions of the Royal Society of London, Vol. 358 No. 1773, pp. 2349\u201058.","DOI":"10.1098\/rsta.2000.0652"},{"key":"key2022013120060629800_b22","unstructured":"Ipi\u00f1a, D. and Katsiri, E. (2001), \u201cA rule\u2010matching service for simpler development of reactive applications\u201d, IEEE Distributed Systems Online, IEEE Computing Society."},{"key":"key2022013120060629800_b23","unstructured":"Jess: the rule engine for the Java platform, available at: http:\/\/herzberg.ca.sandia.gov\/jess"},{"key":"key2022013120060629800_b24","unstructured":"Katsiri, E. (2005), \u201cMiddleware support for modelling context\u2010awareness in sensor\u2010driven systems\u201d, PhD thesis. University of Cambridge, Cambridge."},{"key":"key2022013120060629800_b25","unstructured":"Katsiri, E. (2005), \u201cQuery analysis and otimisation\u201d, Middleware Support for Modelling Context\u2010Awareness in Sensor\u2010Driven Systems, Technical Report No. UCAM\u2010CL\u2010TR\u2010620, University of Cambridge, pp. 127\u201036."},{"key":"key2022013120060629800_b26","unstructured":"Katsiri, E. and Mycroft, A. (2003), \u201cKnowledge\u2010representation and abstract reasoning for sentient computing\u201d, Proceedings of 1st Workshop on Challenges and Novel Applications of Automated Reasoning, Miami Beach, FL, pp. 73\u201082."},{"key":"key2022013120060629800_b27","unstructured":"Katsiri, E. and Mycroft, A. (2005), \u201cModel checking for sentient computing: an axiomatic approach\u201d, Proceedings of the 1st Workshop on Semantics for Mobile Environments (SME '05) at MDM '05, Ayia Napa, Cyprus."},{"key":"key2022013120060629800_b28","doi-asserted-by":"crossref","unstructured":"Katsiri, E., Bacon, J. and Mycroft, A. (2004), \u201cAn extended publish\/subscribe protocol for transparent submissions to distributed abstract state in sensor\u2010driven systems using abstract events\u201d, International Workshop on Distributed Event\u2010Based Systems (DEBS '04), Edinburgh, pp. 68\u201073.","DOI":"10.1049\/ic:20040385"},{"key":"key2022013120060629800_b29","doi-asserted-by":"crossref","unstructured":"Liebig, C., Cilia, M. and Buchmann, A. (1999), \u201cEvent composition in time\u2010dependent distributed systems\u201d, Proceedings of the 4th IFCIS International Conference on Cooperative Information Systems (CoopIS '99), Edinburg, IEEE Computer Society Press, pp. 70\u20108.","DOI":"10.1109\/COOPIS.1999.792159"},{"key":"key2022013120060629800_b30","unstructured":"Lopez de Ipi\u00f1a, D. (1999), TRIP: A Distributed Vision\u2010Based Sensor System, University of Cambridge."},{"key":"key2022013120060629800_b31","unstructured":"Madden, S. and Franklin, M. (2002), \u201cFjording the stream: an architecture for queries over streaming data\u201d, Proceedings of the ICDE Conference, IEEE Computer Society Press, San Hose, CA, pp. 555\u201066"},{"key":"key2022013120060629800_b32","doi-asserted-by":"crossref","unstructured":"Mansouri\u2010Samani, M. and Sloman, M. (1997), \u201cA generalised event monitoring language for distributed systems (GEM)\u201d, Distributed Systems Engineering Journal, Vol. 4 No. 2, pp. 96\u2010108.","DOI":"10.1088\/0967-1846\/4\/2\/004"},{"key":"key2022013120060629800_b33","doi-asserted-by":"crossref","unstructured":"Marmasse, N. (1999), \u201ccomMotion: a context\u2010aware communication system\u201d, Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI '99), ACM Press, Pitsburg, PA, pp. 320\u20101.","DOI":"10.1145\/632716.632910"},{"key":"key2022013120060629800_b34","doi-asserted-by":"crossref","unstructured":"Mendelson, E. (1987), Introduction to Mathematical Logic, 3rd ed., Wadsworth, Pacific Grove, CA.","DOI":"10.1007\/978-1-4615-7288-6"},{"key":"key2022013120060629800_b35","unstructured":"Murphy, A.L., Picco, G.P. and Roman, G.\u2010C. \u201cDeveloping mobile computing applications with lime\u201d, Proceedings of the 22nd International Conference on Software Engineering (ICSE '00), ACM Press, Limerick, pp. 766\u20109."},{"key":"key2022013120060629800_b36","doi-asserted-by":"crossref","unstructured":"Nonnengart, A., Rock, G. and Weidenbach, C. (1998), \u201cOn generating small clause normal forms\u201d, Proceedings of the 15th International Conference on Automated Deduction (CADE\u201015), Springer\u2010Verlag, Lindau, pp. 397\u2010411.","DOI":"10.1007\/BFb0054274"},{"key":"key2022013120060629800_b37","doi-asserted-by":"crossref","unstructured":"Pascoe, J. (1997), \u201cThe stick\u2010e note architecture: extending the interface beyond the user\u201d, ACM International Conference on Intelligent User Interfaces, ACM Press, Orlando, FL, pp. 261\u20104.","DOI":"10.1145\/238218.238344"},{"key":"key2022013120060629800_b38","doi-asserted-by":"crossref","unstructured":"Pietzuch, P. and Bacon, J. (2002), \u201cHERMES: a distributed event\u2010based Middleware architecture\u201d, Proceedings of the 22nd International Conference on Distributed Computing Systems(ICDCSW '02), IEEE Computer Society Press, Vienna, pp. 611\u20108.","DOI":"10.1109\/ICDCSW.2002.1030837"},{"key":"key2022013120060629800_b39","doi-asserted-by":"crossref","unstructured":"Pietzuch, P. and Bacon, J. (2003), \u201cPeer\u2010to\u2010peer overlay broker networks in an event\u2010based Middleware\u201d, Proceedings of the 2nd International Workshop on Distributed Event\u2010Based Systems (DEBS '03), ACM Press, San Diego, CA, pp. 1\u20108.","DOI":"10.1145\/966618.966628"},{"key":"key2022013120060629800_b40","doi-asserted-by":"crossref","unstructured":"Pietzuch, P., Shand, B. and Bacon, J. (2002), \u201cComposite event detection as a generic Middleware extension\u201d, IEEE Network Magazine, Special Issue on Middleware Technologies for Future Communication Networks, Vol. 18 No. 1, pp. 44\u201055.","DOI":"10.1109\/MNET.2004.1265833"},{"key":"key2022013120060629800_b41","doi-asserted-by":"crossref","unstructured":"Priyantha, N.B., Chakraborty, A. and Balakrishnan, H. (2000), \u201cThe cricket location\u2010support system\u201d, Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom '00), ACM Press, Boston, MA, pp. 32\u201043.","DOI":"10.1145\/345910.345917"},{"key":"key2022013120060629800_b42","unstructured":"QoSDREAM: Quality of Service for Distributed REconfigurable Adaptive Multimedia, available at: http:\/\/www\u2010lce.eng.cam.ac.uk\/qosdream\/"},{"key":"key2022013120060629800_b43","doi-asserted-by":"crossref","unstructured":"Salber, D., Dey, A.K. and Abowd, G.D. (1999), \u201cThe context\u2010toolkit: aiding the development of context\u2010enabled applications\u201d, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '99), ACM Press, Pittsburg, PA, pp. 434\u201041.","DOI":"10.1145\/302979.303126"},{"key":"key2022013120060629800_b44","unstructured":"Schilit, B.N., Adams, N., Gold, R., Tso, M. and Want, R. (1993), The PARCTAB Mobile Computing System, Technical Report n. CSL\u201093\u201020, Xerox PARC."},{"key":"key2022013120060629800_b45","unstructured":"Scott, D., Beresford, A. and Mycroft, A. (2003), \u201cSpatial security policies for mobile agents in a sentient computing environment\u201d, Proceedings of the IEEE 4th International Workshop for Policies for Distributed Systems and Networks, Lake Como, IEEE Computer Society Press, pp. 147\u201057."},{"key":"key2022013120060629800_b46","unstructured":"SPASS: an automated theorem prover for first\u2010order logic with equality, available at: http:\/\/spass.mpi\u2010sb.mpg.de\/index.htm"},{"key":"key2022013120060629800_b47","unstructured":"Spiteri, M. (2000), \u201cAn architecture for the notification, storage and retrieval of events\u201d, PhD thesis. University of Cambridge, Cambridge."},{"key":"key2022013120060629800_b48","unstructured":"Steggles, P., Webster, P. and Harter, A. (1998), \u201cThe implementation of a distributed framework to support distributed applications\u201d, Proceedings of the 1998 International Conference on Parallel and Distributed Processing Technique and Applications (PDPTA '98), CSREA Press, Las Vegas, NV, pp. 381\u20108."},{"key":"key2022013120060629800_b49","unstructured":"Tristan Richardson (1995), \u201cTeleporting: mobile X sessions\u201d, The X Resource, Vol. 13 No. 1, pp. 133\u201040."},{"key":"key2022013120060629800_b50","doi-asserted-by":"crossref","unstructured":"Want, R., Hopper, A., Falcao, V. and Gibbons, J. (1992), \u201cThe active badge location system\u201d, ACM Transactions on Information Systems, Vol. 10 No. 1, pp. 91\u2010102.","DOI":"10.1145\/128756.128759"},{"key":"key2022013120060629800_b51","doi-asserted-by":"crossref","unstructured":"Weidenbach, C., Brahm, U., Hillenbrand, T., Keen, E., Theobald, C. and Topic, D. (2002), The Theory of SPASS version 2.0, Manual, Max\u2010Planck\u2010Institut fur Informatik, Lecture Notes in Computer Science, Vol. 2392\/2002, Chapter 8, Springer Berline\/Heidelberg, pp. 45\u201379.","DOI":"10.1007\/3-540-45620-1_22"},{"key":"key2022013120060629800_b52","doi-asserted-by":"crossref","unstructured":"Weiser, M. (1993), \u201cSome computer science problems in ubiquitous computing\u201d, Communications of the ACM, Vol. 36 No. 7, pp. 75\u201084.","DOI":"10.1145\/159544.159617"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/17427370710863112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17427370710863112\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17427370710863112\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:22:20Z","timestamp":1753402940000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/3\/4\/347-377\/444593"}},"subtitle":[],"editor":[{"given":"Wathiq","family":"Mansoor","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2007,12,31]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,4,1]]}},"alternative-id":["10.1108\/17427370710863112"],"URL":"https:\/\/doi.org\/10.1108\/17427370710863112","relation":{},"ISSN":["1742-7371"],"issn-type":[{"type":"print","value":"1742-7371"}],"subject":[],"published":{"date-parts":[[2007,12,31]]}}}