Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Filip Perich is active.

Publication


Featured researches published by Filip Perich.


international conference on mobile and ubiquitous systems: networking and services | 2004

SOUPA: standard ontology for ubiquitous and pervasive applications

Harry Chen; Filip Perich; Tim Finin; Anupam Joshi

We describe a shared ontology called SOUPA - standard ontology for ubiquitous and pervasive applications. SOUPA is designed to model and support pervasive computing applications. This ontology is expressed using the Web ontology language OWL and includes modular component vocabularies to represent intelligent agents with associated beliefs, desires, and intentions, time, space, events, user profiles, actions, and policies for security and privacy. We discuss how SOUPA can be extended and used to support the applications of CoBrA, a broker-centric agent architecture for building smart meeting rooms, and MoGATU, a peer-to-peer data management for pervasive environments.


IEEE Internet Computing | 2004

Intelligent agents meet the semantic Web in smart spaces

Harry Chen; Tim Finin; Anupam Joshi; Lalana Kagal; Filip Perich; Dipanjan Chakraborty

A new smart meeting room system called EasyMeeting explores the use of multi-agent systems, Semantic Web ontologies, reasoning, and declarative policies for security and privacy. Building on an earlier pervasive computing system, EasyMeeting provides relevant services and information to meeting participants based on their situational needs. The system also exploits the context-aware support provided by the Context Broker Architecture (Cobra). Cobras intelligent broker agent maintains a shared context model for all computing entities in the space and enforces user-defined privacy policies.


PWC '02 Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications | 2002

A Reactive Service Composition Architecture for Pervasive Computing Environments

Dipanjan Chakraborty; Filip Perich; Anupam Joshi; Tim Finin; Yelena Yesha

Development of customized services by integrating and executing existing ones (refered to as service composition) has received a lot of attention in the last few years with respect to wired, infrastrutcure based web-services. With the advancement in the wireless technology and pervasive computing, we envison that in the near future, we will have such information or services embedded in various wireless devices in our vicinity. However, wired infrastructure-based service discovery and composition architectures do not take into consideration factors arising from the possible mobility of the service providers. In this paper, we present Anamika: a distributed, de-centralized and fault-tolerant design architecture for reactive service composition in pervasive environments.


adaptive agents and multi-agents systems | 2004

Intelligent Agents Meet Semantic Web in a Smart Meeting Room

Harry Chen; Filip Perich; Dipanjan Chakraborty; Tim Finin; Anupam Joshi

We describe a new smart meeting room system called EasyMeeting that explores the use of FIPA agent technologies, Semantic Web ontologies, logic reasoning, and security and privacy policies. Building on a pervasive computing system that we have developed previously, EasyMeeting can provide relevant services and information to meeting participants based on their situational needs. Our system exploits the context-aware support provided by the Context Broker Architecture (CoBrA). Central to CoBrA is an intelligent broker agent that maintains a shared model of context for all computing entities in the space and enforces the privacy policies defined by the users. We also describe the use of CoBrA ontologies, logic reasoning, and privacy protection mechanisms, and evaluate our initial user experience studies.


Mobile Networks and Applications | 2003

A secure infrastructure for service discovery and access in pervasive computing

Jeffrey Undercoffer; Filip Perich; Andrej Cedilnik; Lalana Kagal; Anupam Joshi

Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere-anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented through a hierarchy of service management. The system is built upon a simplified Public Key Infrastructure that provides for authentication, non-repudiation, anti-playback, and access control. Smartcards are used as secure containers for digital certificates. The system is implemented in Java and we use Extensible Markup Language as the sole medium for communications and data exchange. Currently, we are solely dependent on a base set of access rights for our distributed trust model however, we are expanding the model to include the delegation of rights based upon a predefined policy. In our proposed expansion, instead of exclusively relying on predefined access rights, we have developed a flexible representation of trust information, in Prolog, that can model permissions, obligations, entitlements, and prohibitions. In this paper, we present the implementation of our system and describe the modifications to the design that are required to further enhance distributed trust. Our implementation is applicable to any distributed service infrastructure, whether the infrastructure is wired, mobile, or ad hoc.


Sigecom Exchanges | 2002

P2P M-commerce in pervasive environments

Sasikanth Avancha; Peter D'Souza; Filip Perich; Anupam Joshi; Yelena Yesha

Pervasive environments are characterized by the presence of wireless devices ranging from sensors to mobile PDA-phones to laptops. Peer-to-Peer (P2P) information sharing in such environments presents a tremendous opportunity for people and devices to exchange information such as music, pictures, documents and stock tickers with peers. Information that has a monetary value introduces a whole new set of problems for P2P interaction in pervasive environments. In this work, we present the design of a middleware that attempts to solve these problems using concepts of the Contract Net Protocol, Semantic Service Discovery and secure transaction protocols.


very large data bases | 2005

Collaborative joins in a pervasive computing environment

Filip Perich; Anupam Joshi; Yelena Yesha; Tim Finin

Abstract.We present a collaborative query processing protocol based on the principles of Contract Nets. The protocol is designed for pervasive computing environments where, in addition to operating on limited computing and battery resources, mobile devices cannot always rely on being able to access the wired infrastructure. Devices, therefore, need to collaborate with each other in order to obtain data otherwise inaccessible due to the nature of the environment. Furthermore, by intelligently using answers cached by peers, devices can reduce their computation cost. We show the effectiveness of our approach by evaluating performance of devices querying for data while moving in a citylike environment.


International Journal of Wireless Information Networks | 2006

Querying in Packs: Trustworthy Data Management in Ad Hoc Networks

Anand Patwardhan; Filip Perich; Anupam Joshi; Tim Finin; Yelena Yesha

We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing environments. Available resources include those in the fixed surrounding infrastructure as well as services offered by other nearby mobile devices. We take a holistic approach that considers data trust, security, and privacy and focus on the collaborative mechanisms providing a trustworthy data management platform in an ad hoc network. The framework is based on a pack formation mechanism that enables collaborative peer interactions using context information and landmarks. A pack provides a routing substrate allowing devices to find reliable information sources and coordinated pro-active and reactive mechanisms to detect and respond to malicious activity. Consequently, a pack forms a foundation for distributed trust management and data intensive interactions. We describe our data management framework with an emphasis on pack formation in mobile ad hoc networks and present preliminary results from simulation experiments.


database and expert systems applications | 2002

Middleware for mobile information access

Dipanjan Chakraborty; Filip Perich; Anupam Joshi; Tim Finin; Yelena Yesha

Mobile information access involves retrieving information from wired service providers. Often there are situations where the information is not available from a single service provider but can be obtained by combining information from multiple service providers. It is inefficient and sometimes impossible for a resource poor mobile device connected over a low bandwidth wireless link to coordinate such activity. In this paper, we describe middleware to support this mode of access from resource poor mobile devices that takes into consideration mobility, resource constraints and service heterogeneity.


mobile adhoc and sensor systems | 2005

Active collaborations for trustworthy data management in ad hoc networks

Anand Patwardhan; Filip Perich; Anupam Joshi; Tim Finin; Yelena Yesha

We propose a trust-based data management framework for enabling individual devices to harness the potential power of distributed computation, storage, and sensory resources available in pervasive computing environments. Available resources include those currently present in the fixed surrounding infrastructure as well as those resources made available by other mobile devices in the vicinity. We take a holistic approach that considers trust, security, and privacy issues of data management in these environments. We focus on collaborative mechanisms to provide a platform for trustworthy data management for devices in ad hoc networks. A fundamental aspect of our framework is a pack formation mechanism for enabling collaborative peer interaction in the pervasive computing environments based on context information and landmarks. A pack provides a routing substrate for enabling devices to find reliable sources of information. A pack also provides a platform for coordinated pro-active and reactive mechanisms that can detect and respond to malicious activity. Consequently, a pack can be used for providing a foundation to distributed trust management and data intensive interactions. We describe our proposed data management framework with an emphasis on forming packs in mobile ad-hoc networks and present preliminary results from our simulation of collaborative data management using packs

Collaboration


Dive into the Filip Perich's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tim Finin

University of Maryland

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lalana Kagal

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Harry Chen

University of Maryland

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge