scispace - formally typeset
Search or ask a question
Topic

Service discovery

About: Service discovery is a research topic. Over the lifetime, 6949 publications have been published within this topic receiving 111996 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The University of Florida's Mobile and Pervasive Computing Laboratory is developing programmable pervasive spaces in which a smart space exists as both a runtime environment and a software library.
Abstract: Research groups in both academia and industry have developed prototype systems to demonstrate the benefits of pervasive computing in various application domains. Unfortunately, many first-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application domain matures. To address this limitation, the University of Florida's Mobile and Pervasive Computing Laboratory is developing programmable pervasive spaces in which a smart space exists as both a runtime environment and a software library. Service discovery and gateway protocols automatically integrate system components using generic middleware that maintains a service definition for each sensor and actuator in the space. The Gator Tech Smart House in Gainesville, Florida, is the culmination of more than five years of research in pervasive and mobile computing. The project's goal is to create assistive environments such as homes that can sense themselves and their residents and enact mappings between the physical world and remote monitoring and intervention services.

931 citations

01 Jun 1999
TL;DR: The Service Location Protocol provides a scalable framework for the discovery and selection of network services for network based applications and is especially important as computers become more portable, and users less tolerant or able to fulfill the demands of network system administration.
Abstract: The Service Location Protocol provides a scalable framework for the discovery and selection of network services. Using this protocol, computers using the Internet need little or no static configuration of network services for network based applications. This is especially important as computers become more portable, and users less tolerant or able to fulfill the demands of network system administration.

782 citations

Proceedings ArticleDOI
01 Aug 1999
TL;DR: In this article, the authors present the architecture and implementation of a secure service discovery service (SDS), which uses the eXtensible Markup Language (XML) to encode such factors as cost, performance, location, and deviceor service-specific capabilities.
Abstract: The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an interesting problem for end users: how to locate a particular network service or device out of hundreds of thousands of accessible services and devices. This paper presents the architecture and implementation of a secure Service Discovery Service (SDS). Service providers use the SDS to advertise complex descriptions of available or already running services, while clients use the SDS to compose complex queries for locating these services. Service descriptions and queries use the eXtensible Markup Language (XML) to encode such factors as cost, performance, location, and deviceor service-specific capabilities. The SDS provides a highlyavailable, fault-tolerant, incrementally scalable service for locating services in the wide-area. Security is a core component of the SDS and, where necessary, communications are both encrypted and authenticated. Furthermore, the SDS uses an hybrid access control list and capability system to control access to service information.

741 citations

Proceedings ArticleDOI
03 Apr 1998
TL;DR: A novel approach to building and deploying network protocols based on mobile code, demand loading, and caching techniques that allows new protocols to be dynamically deployed at both routers and end systems, without the need for coordination and without unwanted interaction between co-existing protocols.
Abstract: The authors present a novel approach to building and deploying network protocols. The approach is based on mobile code, demand loading, and caching techniques. The architecture of the system allows new protocols to be dynamically deployed at both routers and end systems, without the need for coordination and without unwanted interaction between co-existing protocols. They describe the architecture and its realization in a prototype implementation. To demonstrate how to exploit the architecture, they present two simple protocols that operate within the prototype to introduce multicast and mobility services into a network that initially lacks them.

668 citations

01 Jun 1997
TL;DR: Using this protocol, computers using the Internet no longer need so much static configuration of network services for network based applications, which is especially important as computers become more portable, and users less tolerant or able to fulfill the demands of network system administration.
Abstract: The Service Location Protocol provides a scalable framework for the discovery and selection of network services. Using this protocol, computers using the Internet no longer need so much static configuration of network services for network based applications. This is especially important as computers become more portable, and users less tolerant or able to fulfill the demands of network system administration.

653 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
92% related
Wireless sensor network
142K papers, 2.4M citations
90% related
Wireless network
122.5K papers, 2.1M citations
90% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
89% related
Network packet
159.7K papers, 2.2M citations
89% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20237
202247
202185
2020132
2019170
2018161