Define physical context, Computer Engineering

Assignment Help:

Question :

Context aware mobile web applications are the important to achieve ubiquity, device independence and personalization. The context provides detailed information about the environment of a web application and the web application itself. Thereby the context influences not only the requirements as gathered by requirements elicitation but also triggers the actual customisation as soon as the context changes. Context can be divided into a physical and logical context.

a) Define physical context and provide examples of the physical context properties.

b) Using your definition above, and with the help of the Unified Modeling Language (UML), describe how you can design a physical context model for mobile Web applications. You can consider a small well defined set of physical context properties, but as the list is virtually unlimited and certain applications would require specific ones, you have to focus on a model which is extensible.

c) Define logical context and explain why it is a necessary element in context aware mobile Web applications?

d) Explain how the logical context can take the form of profiles.

e) Describe the following profiles
i. Location Profile
ii. Time Profile
iii. User Agent Profile
iv. Network Profile


Related Discussions:- Define physical context

DFD, Define software architecture and describe which types of architectures...

Define software architecture and describe which types of architectures can be used in Email or Facebook applications

Explain the process of inter-register signalling, Explain the process of in...

Explain the process of inter-register signalling. Registers are utilized in common control exchanges to store and analyze routing data. They are given on a common basis is a

What are the structural notations, What are the Structural Notations Th...

What are the Structural Notations These notations comprise static elements of a model. They are considered as nouns of UML model that could be conceptual or physical. Their ele

Explain difference between security and protection, Explain difference betw...

Explain difference between Security and Protection? Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a

What is master slave kernel, Q. What is Master slave kernel? Master sl...

Q. What is Master slave kernel? Master slave kernel: In this model just one of processors is assigned as Master.  The master is in charge for subsequent activities:  i)

What are the functions of dispatcher, What are the functions of dispatcher?...

What are the functions of dispatcher? There are four fuctions of dispatcher:- A)  Equal distribution of transaction load to the work processes.  B) Management of buffer a

How many select lines will have a 16 to 1 multiplexer, How many select line...

How many select lines will a 16 to 1 multiplexer will have ?   Ans. For 16 to 1 MUX four select lines will be needed to select 16 (2 4 ) inputs.

Computer network architecture, A protocol is a formal description of messag...

A protocol is a formal description of message formats and the rules two or more machines must follow to exchange those messages. Because TCP (transmission control protocol) and IP

Definition of lists, Q. Definition of Lists? Another type of list is a ...

Q. Definition of Lists? Another type of list is a definition list. Definition lists have a heading and text appears below that. EXPERTSMI

What is organizational structure, What is Organizational Structure? A b...

What is Organizational Structure? A business organization may be structured in many dissimilar ways, depending upon the environment within which it handles.  There is always

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd