{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:33:34Z","timestamp":1762032814499,"version":"3.41.0"},"reference-count":23,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2009,2,20]],"date-time":"2009-02-20T00:00:00Z","timestamp":1235088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMOBILE Mob. Comput. Commun. Rev."],"published-print":{"date-parts":[[2009,2,20]]},"abstract":"<jats:p>Pervasive Computing Research Group, Department of Informatics and Telecommunications, University of Athens, Panepistimiopolis, Ilissia, 15784, Athens, Greece. We investigate the very important concept of collaborative context awareness. Applications operating in nodes with spatial proximity and network connectivity exchange the contextual information (context) captured by their sensors (or other similar data sources). Such scheme improves the characteristics of the context aware application (e.g., robustness). The exchange of context in our model is progressed beyond a simple flooding scheme. We adopt an epidemic model, which relays information in a stochastic manner. In our model, nodes have a reasoning capability, which can further process and transform the incoming context. The derived context can be relayed throughout the network. This multi-epidemic model relies on semantic dependencies, which are modeled through a hierarchical representation scheme. We investigate the efficiency of the proposed architecture in light of different spreading parameters. Our simulations take into account the temporal validity of the exchanged context (i.e., relayed information remains valid for a certain period of time), the status of the sensing elements and the mobility of nodes. Our findings are quite promising for the emerging area of context aware application engineering.<\/jats:p>","DOI":"10.1145\/1508285.1508291","type":"journal-article","created":{"date-parts":[[2009,2,25]],"date-time":"2009-02-25T14:44:30Z","timestamp":1235573070000},"page":"43-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["On the application of epidemical spreading in collaborative context-aware computing"],"prefix":"10.1145","volume":"12","author":[{"given":"Christos","family":"Anagnostopoulos","sequence":"first","affiliation":[{"name":"University of Athens, Athens, Greece"}]},{"given":"Stathes","family":"Hadjiefthymiades","sequence":"additional","affiliation":[{"name":"University of Athens, Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2009,2,20]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.1109\/65.313011"},{"key":"e_1_2_1_2_1","volume-title":"Three case studies,\" Decision Support Systems, 115--124","author":"Brezillon P.","year":"2004","unstructured":"P. Brezillon , M. Borges , J. Pino , J. Pomerol , \"Context-awareness in group-work : Three case studies,\" Decision Support Systems, 115--124 , 2004 . P. Brezillon, M. Borges, J. Pino, J. Pomerol, \"Context-awareness in group-work: Three case studies,\" Decision Support Systems, 115--124, 2004."},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.1145\/41840.41841"},{"key":"e_1_2_1_4_1","volume-title":"Data Engineering, 19(3)","author":"Franklin M.","year":"1996","unstructured":"M. Franklin , S. Zdonik , \"Dissemination-based information systems\" , Data Engineering, 19(3) , 1996 . M. Franklin, S. Zdonik, \"Dissemination-based information systems\", Data Engineering, 19(3), 1996."},{"key":"e_1_2_1_5_1","volume-title":"IEEE MASS-SensorFusion07","author":"Anagnostopoulos C.","year":"2007","unstructured":"C. Anagnostopoulos , O. Sekkas , S. Hadjiefthymiades , \" Context Fusion : Dealing with Sensor Reliability \", IEEE MASS-SensorFusion07 , 2007 . C. Anagnostopoulos, O. Sekkas, S. Hadjiefthymiades, \"Context Fusion: Dealing with Sensor Reliability\", IEEE MASS-SensorFusion07, 2007."},{"doi-asserted-by":"publisher","key":"e_1_2_1_6_1","DOI":"10.1145\/1039488.1039491"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1007\/s007790170019"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1007\/s11277-006-9187-6"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1109\/5326.827455"},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.1016\/j.jss.2007.03.003"},{"key":"e_1_2_1_11_1","volume-title":"Pervasive Computing","author":"M\u00e4ntyj\u00e4rvi J.","year":"2004","unstructured":"J. M\u00e4ntyj\u00e4rvi , J. Himberg , P. Kangas , U. Tuomela , P. Huuskonen , \" Sensor Signal Data Set for Exploring Context Recognition of Mobile Devices\" , Pervasive Computing , 2004 . J. M\u00e4ntyj\u00e4rvi, J. Himberg, P. Kangas, U. Tuomela, P. Huuskonen, \"Sensor Signal Data Set for Exploring Context Recognition of Mobile Devices\", Pervasive Computing, 2004."},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.1109\/MC.2004.1297243"},{"key":"e_1_2_1_13_1","first-page":"69","article-title":"Efficiency and reliability of epidemic data dissemination in complex networks","author":"Moreno Y.","year":"2004","unstructured":"Y. Moreno , M. Nekovee , A. Vespigianni , \" Efficiency and reliability of epidemic data dissemination in complex networks \", Physical Review E , 69 , 2004 . Y. Moreno, M. Nekovee, A. Vespigianni, \"Efficiency and reliability of epidemic data dissemination in complex networks\", Physical Review E, 69, 2004.","journal-title":"Physical Review E"},{"unstructured":"A. Salkham R. Cunningham A. Cahill \"A taxonomy of collaborative context-aware systems \" in Ubiquitous Mobile Information and Collaboration Systems pp. 899--911 2006. A. Salkham R. Cunningham A. Cahill \"A taxonomy of collaborative context-aware systems \" in Ubiquitous Mobile Information and Collaboration Systems pp. 899--911 2006.","key":"e_1_2_1_14_1"},{"doi-asserted-by":"crossref","unstructured":"J. Kephart S.R. White \"Directed-graph epidemiological models of computer viruses \" IEEE Research in Security and Privacy 343--359 1991. J. Kephart S.R. White \"Directed-graph epidemiological models of computer viruses \" IEEE Research in Security and Privacy 343--359 1991.","key":"e_1_2_1_15_1","DOI":"10.1109\/RISP.1991.130801"},{"doi-asserted-by":"crossref","unstructured":"M. Boguna R. Pastor-Satorras A. Vespignani \"Epidemic spreading in complex networks with degree correlations \" Statistical Mechanics of Complex Networks 127--147 2003. M. Boguna R. Pastor-Satorras A. Vespignani \"Epidemic spreading in complex networks with degree correlations \" Statistical Mechanics of Complex Networks 127--147 2003.","key":"e_1_2_1_16_1","DOI":"10.1007\/978-3-540-44943-0_8"},{"key":"e_1_2_1_17_1","volume-title":"Reliable and Distributed Systems","author":"Wang Y.","year":"2003","unstructured":"Y. Wang , D. Chakrabarti , C. Wang , C. Faloutsos , \" Epidemic spreading : An eigenvalue viewpoint,\" Symp . Reliable and Distributed Systems , 2003 . Y. Wang, D. Chakrabarti, C. Wang, C. Faloutsos, \"Epidemic spreading: An eigenvalue viewpoint,\" Symp. Reliable and Distributed Systems, 2003."},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1145\/1085777.1085815"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1109\/TNN.2005.853425"},{"key":"e_1_2_1_20_1","first-page":"161","article-title":"Collaborative context determination to support mobile terminal applications","author":"Mantyjarvi J.","year":"2003","unstructured":"J. Mantyjarvi , P. Huuskonen , J. Himberg , \" Collaborative context determination to support mobile terminal applications ,\" Pervasive Communications , pp. 161 -- 168 , 2003 . J. Mantyjarvi, P. Huuskonen, J. Himberg, \"Collaborative context determination to support mobile terminal applications,\" Pervasive Communications, pp. 161--168, 2003.","journal-title":"Pervasive Communications"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.1016\/j.comcom.2006.02.010"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1145\/570758.570768"},{"doi-asserted-by":"publisher","key":"e_1_2_1_23_1","DOI":"10.1007\/978-3-540-30145-5_8"}],"container-title":["ACM SIGMOBILE Mobile Computing and Communications Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1508285.1508291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1508285.1508291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:42Z","timestamp":1750253382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1508285.1508291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,2,20]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,2,20]]}},"alternative-id":["10.1145\/1508285.1508291"],"URL":"https:\/\/doi.org\/10.1145\/1508285.1508291","relation":{},"ISSN":["1559-1662","1931-1222"],"issn-type":[{"type":"print","value":"1559-1662"},{"type":"electronic","value":"1931-1222"}],"subject":[],"published":{"date-parts":[[2009,2,20]]},"assertion":[{"value":"2009-02-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}