The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern browsers implement private mode to protect user privacy. However, they do not agree on what protection private mode should provide. We performed the first study on comparing private modes in popular desktop and mobile browsers and found many inconsistencies between different browsers and between the desktop and mobile versions of the same browser. We show that some inconsistencies result from...
For the next generation mobile video broadcasting, especially in-band solutions that serves the mobile devices, a limited feedback scheme via cellular channel polling is feasible to give accurate real-time information on the broadcast receivers' channel erasure rate, and decoding buffer status. In this work, we propose an AL-FEC coding degree scheme based on this feedback, to achieve a better decode...
Nowadays, the demand for travel personality and intelligence is growing with each passing day. In this paper, the authors have designed a cloud-services-oriented personal travel application called "Cloud Travel" which used in mobile phones. The "Cloud Travel" is a highly personalized travel arrangement and auxiliary tool with distributed computing technology, it recommends travel...
With the rapid growth of cloud computing, developing business applications on Platform-as-a-Service (PaaS) systems is increasingly popular among industry companies. Various services are developed to support different business requirements on PaaS systems. However, to the best of our knowledge, currently there is no service that provides mobile social messaging services to enable users of their apps...
Transport Layer Security (TLS) is the most commonly used security protocol to encrypt web traffic. TLS connections are computationally expensive to set up, so the TLS protocol supports session resumption, where previously negotiated connection parameters can be used to short- circuit the TLS handshake. The server assigns new sessions a session identifier (ID) and caches each session by its ID so it...
Machine-to-Machine (M2M) communicationsaims to enablemachines to communicate with each other withouthuman intervention. The M2M traffic is quite different from Human-to-Human (H2H) traffic. Discontinuous reception (DRX) isone of the promising technologies for energy saving in LTE-A networks. The existing works on DRX pay more attention to H2H traffic, especially focusing on DRX in RRC active mode...
This paper describes E-Health Monitoring (EHM) ecosystem and current EHM market segments. Based on IoT reference model, three EHM technical models are proposed. Model 1 focuses on device to device communication; model 2 focuses on network providing connection only; model 3 focuses on network combined with platform. Model 3 is equipped with a service support platform which is a new entity comparing...
This paper presents a representative use case of mHealth. The use case, called patient monitoring, is described from a Mobile Network Operator (MNO) point of view and should be seen as complimentary to other use cases that already exist from other parts of the industry. Then three communication scenarios are abstracted form the use case in order to clarify MNO's concerns and new requirements. The...
Based on authors' previous work on a travel hub and semantic recommender, a mobile travel service recommender is proposed in this article, to discover and recommend composite travel services though mobile terminals. Among the recommender's features are (i) using OWL-based user semantics to discover travel services, (ii) searching travel Web services both from predefined resources and from UDDI-supported...
Mobile communication network provides the terminals of IOT (Internet of Things) with a convenient way to access the network. However a large number of connected IOT terminals will inevitably produce a significant impact on the existing mobile communication network. After summarizing the characteristics of typical applications of IOT, this review provides analysis of the specific impact of IOT on mobile...
In the past two decades, the demands for web applications grow dramatically. The Client/Server architecture and the Browse/Server architecture are widely implemented into web applications. But some shortcomings are revealed in practical using, especially when many applications are run at mobile terminals nowadays. The information efficiency of B/S, which is indicated by the information quantity per...
The performance of AODV protocol of MANET at the rate of 4G is studied. A network frame is introduced, the network model is set up, and simulations are run in NS2. After analysis the results show that AODV is suitable for the network of low moving speed at the rate of 4G, but not suitable for the network with too high speed. The work has some value in the integration of MANETs and 4G mobile communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.