Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jelena Mitic is active.

Publication


Featured researches published by Jelena Mitic.


IEEE Software | 2017

Enabling IoT Ecosystems through Platform Interoperability

Arne Bröring; Stefan Schmid; Corina Kim Schindhelm; Abdelmajid Khelil; Sebastian Käbisch; Denis Kramer; Danh Le Phuoc; Jelena Mitic; Darko Anicic; Ernest Teniente

Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models. Having to perform these actions for each platform often outweighs the possible gains from adapting applications to multiple platforms. This fragmentation of the IoT and the missing interoperability result in high entry barriers for developers and prevent the emergence of broadly accepted IoT ecosystems. The BIG IoT (Bridging the Interoperability Gap of the IoT) project aims to ignite an IoT ecosystem as part of the European Platforms Initiative. As part of the project, researchers have devised an IoT ecosystem architecture. It employs five interoperability patterns that enable cross-platform interoperability and can help establish successful IoT ecosystems.


international conference on pervasive services | 2007

Adaptation of Composite Services in Pervasive Computing Environments

Caroline Funk; Amelia Schultheis; Claudia Linnhoff-Popien; Jelena Mitic; Christoph Kuhmünch

Pervasive computing is characterized by an automatic adaptation of services to the users situation. To achieve this we compose services from atomic services taking ambient information into account. Due to changing availability of services because of e.g. user mobility an initial composition is not sufficient but an adaptation during runtime is also necessary. Within our architecture we manage one or more composite services. Decisions regarding their adaptation are made taking requirements from all composite services into account. This is not easy as each composite service may have different goals. In this paper, we present the results of an analysis of pervasive application scenarios. Based on the analysis we developed a two-level decision system for adaptation decisions: on the composite service level decisions are made using linear programming, on the system level using rule based control. The implementation is integrated in our existing service composition architecture.


international conference on networking and services | 2008

Personalizable Service Discovery in Pervasive Systems

Korbinian Frank; Vincenzo Suraci; Jelena Mitic

Today, telecom providers are facing changing challenges. To stay ahead in the competition and provide market leading offerings, carriers need to enable a global ecosystem of third party independent application developers to deliver converged services. This is the aim of leveraging a open standards- based service delivery platform. To identify and to cope with those challenges is the main target of the EU funded project IST DAIDALOS II. And a central point to satisfy the changing user needs is the provision of a well working, user friendly and personalized service discovery. This paper describes our work in the project on a middleware in a framework for pervasive service usage. We have designed an architecture for it, that enables full transparency to the user, grants high compatibility and extendability by a modular and pluggable conception and allows for interoperability with most known service discovery protocols. Our multi-protocol service discovery and the four phases service filtering concept enabling personalization should allow for the best possible results in service discovery.


distributed simulation and real-time applications | 2008

Simulating the Potential Savings of Implicit Energy Management on a City Scale

Doris Zachhuber; Jakob Doppler; Alois Ferscha; Cornel Klein; Jelena Mitic

According to statistics and future prospects in the next few years world-wide energy consumption will increase significantly. Therefore not only more energy efficient technologies but also more extensive energy saving concepts have to be realized. We have developed an rdquoimplicit interactionrdquo based power saving concept, which automatically schedules and controls energy consumers depending on the recognized activities of users. Moreover, dynamically schedulable power consumption loads are shifted in time, so as to make use of the cheapest energy prices without compromising user comfort. In order to calculate the potential savings of this concept we have implemented a simulation framework executing energy consumption models on a city scale, which allows for more complex scenarios than being restricted to some devices or buildings only. Both the framework architecture as well as large scale energy consumption simulations are presented. Simulation experiments give strong evidence for our implicit energy management concept as a promising source of energy savings.


trust and privacy in digital business | 2008

Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing

Susana Alcalde Bagüés; Jelena Mitic; Andreas Zeidler; Marta Tejada; Ignacio R. Matias; Carlos Fernández Valdivielso

In this paper we present a novel architecture for extending the traditional notion of access control to privacy-related data toward a holistic privacy management system. The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party. Todays laws mostly are regulating the conduct of business between an individual and some enterprise. They mainly focus on long-lived and static relationships between a user and a service provider. However, due to the dynamic nature of pervasive computing environments, rather more sophisticated mechanisms than a simple offer/accept-based privacy negotiation are required. Thus, we introduce a privacy architecture which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and monitor the whole life-cycle of data once it has been disclosed.


international conference on networking and services | 2006

Pervasive Service Platform (PSP): Facilitating Pervasive Services

Fiona Mahon; Jelena Mitic; Micheal Crotty; Kevin Doolin; Christoph Kuhmuench

Pervasive computing is a new and emerging technology. The concept of pervasiveness and its deployment into reality are still not well aligned. This is because the vision of pervasiveness is a highly complex area that encompasses a large number of issues. The real vision of pervasiveness will never become a reality if everyone involved needs to repeatedly address all the issues involved in the concept. This paper focuses on the DAIDALOS pervasive service platform (PSP) as an enabler of pervasive services. DAIDALOS is an EU Framework Programme 6 Integrated Project with 46 multinational partners from both the industry and academia. The paper details the strategy employed in DAIDALOS to facilitate service providers to offer pervasive services on top of the PSP. It argues that pervasiveness should be provided to service providers as part of the platform, instead of requiring pervasiveness to be totally embedded in the services themselves. This approach consequently opens up the service provision market to more players, driving the idea of a truly pervasive world. The paper gives an overview of the DAIDALOS platform as a pervasive service enabler, detailing how it facilitates pervasiveness by removing most of the work from the service providers themselves


international workshop on security | 2007

The CONNECT platform: An architecture for Context-Aware Privacy in pervasive environments

Susana Alcalde Bagüés; Jelena Mitic; Elisabeth-Anna Emberger

Nowadays, privacy in mobile settings mostly is controlled manually and limited to acknowledging some prefabricated privacy statements offered to the user. However, for Ambient Intelligence scenarios such privacy control falls short for various reasons. The most obvious is that the interaction with a large number of heterogeneous Context-Aware Mobile Services becomes a burdensome task, which eventually might lead to frustration if newly encountered services require the explicit consensus of the user for the disclosure of privacy sensitive data. The IST project CONNECT addresses such issues by defining a common software platform for mediating between users, their privacy needs, privacy management and the context-aware mobile services. It includes not only the core technologies needed, but also easy-to-use interfaces and some self-learning technologies to assist users in the specification of privacy preferences matching their needs. In this paper, we introduce the CONNECT platform and its architecture with a special emphasize on the Context-sensitive Privacy Management middleware and its various functionalities.


International Workshop on Interoperability and Open-Source Solutions | 2016

Business Models for Interoperable IoT Ecosystems

Werner Schladofsky; Jelena Mitic; Alfred Paul Megner; Claudia Simonato; Luca Gioppo; Dimitris Leonardos; Arne Bröring

The Internet of Things (IoT) is growing and more and more devices, so-called “things”, are being connected every day. IoT platforms provide access to those “things” and make them available for services and applications. Today, a broad range of such IoT platforms exist with differing functional foci, target domains, and interfaces. However, to fully exploit the economic impact of the IoT, it is essential to enable applications to interoperate with the various IoT platforms. The BIG IoT project aims at enabling this interoperability and supporting the creation of vibrant IoT ecosystems, which facilitate the development of cross-platform and cross-domain applications. While the value of interoperability for the overall economy is well understood and cannot be underestimated, some stakeholders may still need to find their business value in interoperable IoT ecosystems. Thus, this paper identifies the different stakeholders of such ecosystems, and analyses how these stakeholders can enhance their existing business models when taking part in an interoperable IoT ecosystem.


Archive | 2018

BIG IoT: Interconnecting IoT Platforms from Different Domains—First Success Story

Thomas Jell; Claudia Baumgartner; Arne Bröring; Jelena Mitic

The Internet of Things (IoT) is today separated by different vertically oriented platforms for integration of all the different devices. Developers who aim to access other platforms and access that data are forced to manually adapt their interfaces to the specific platform API and data models.


Archive | 2009

METHOD AND DEVICE FOR CONTROLLING A SYSTEM

Roland Eckl; Alois Ferscha; Stefan Gusenbauer; Cornel Klein; Christoph Kuhmünch; Asa MacWilliams; Jelena Mitic; Bernhard Wally

Collaboration


Dive into the Jelena Mitic's collaboration.

Researchain Logo
Decentralizing Knowledge