Define physical context, Computer Engineering

Assignment Help:

Question :

Context aware mobile web applications are the important to achieve ubiquity, device independence and personalization. The context provides detailed information about the environment of a web application and the web application itself. Thereby the context influences not only the requirements as gathered by requirements elicitation but also triggers the actual customisation as soon as the context changes. Context can be divided into a physical and logical context.

a) Define physical context and provide examples of the physical context properties.

b) Using your definition above, and with the help of the Unified Modeling Language (UML), describe how you can design a physical context model for mobile Web applications. You can consider a small well defined set of physical context properties, but as the list is virtually unlimited and certain applications would require specific ones, you have to focus on a model which is extensible.

c) Define logical context and explain why it is a necessary element in context aware mobile Web applications?

d) Explain how the logical context can take the form of profiles.

e) Describe the following profiles
i. Location Profile
ii. Time Profile
iii. User Agent Profile
iv. Network Profile


Related Discussions:- Define physical context

What is check box, A dialog box, generally square, that records an on or of...

A dialog box, generally square, that records an on or off value.

Define memory allocation scheme in ''external'' fragmentation, The memory a...

The memory allocation scheme subject to “external” fragmentation is? Segmentation is the memory allocation scheme subject to “external” fragmentation.

What is null pointer, What is NULL POINTER Inside main, a FILE * called...

What is NULL POINTER Inside main, a FILE * called file. Afterwards, the fopen function, passing it the path to data file, as well as "r", only intending to read from the file.

When should the method invokelater() be used, This method is used to make s...

This method is used to make sure that Swing components are updated by the event-dispatching thread.

What decision has the highest expected value, The Prisoner's Dilemma is a w...

The Prisoner's Dilemma is a well-known problem in game theory. Two thieves are arrested and held in custody separately. The police offer each the same deal. Inform on your partn

Explain what are the different hazards, There are situations, called hazard...

There are situations, called hazards that stop the next instruction in the instruction stream from implementing during its designated clock cycle. Hazards decrease the performance

What is a decoder, What is a Decoder ? Ans. Decoder: - This dec...

What is a Decoder ? Ans. Decoder: - This decodes the information. The decoders contain n inputs 7 at the end maximum 2 n outputs since n bit no can decode max 2n infor

Intentional hacking helps in maintaining better security, Intentional hacki...

Intentional hacking helps in maintaining better security Several companies employ professionals as security specialists whose basic job is to detect and cover loopholes in t

What are the steps in executing the program, What are the steps in executin...

What are the steps in executing the program? 1.Fetch 2.Decode 3.Execute 4.Store

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd