The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel service-oriented mobile social networking platform called MS2A for disaster situations. MS2A consists of two layers: service layer and application layer. The service layer is implemented based on the service-oriented architecture (SOA) to ease application developments. By extending and composing the web services at this layer, application developers can efficiently and...
The growing adoption of smart mobile devices, such as smart phones and tablets, is fundamentally changing the way how business is conducted. New mobile technologies exert a significant influence on individuals, organizations, and society at large. Our paper provides an analysis of empirical research on mobile computing in the information systems literature. The mobile computing paradigm has been used...
In this paper we analyze the competitive effects between mobile and fixed broadband. We use the Lotka Volterra competition model, known from ecology, to analyze these competitive effects in the OECD area. The results suggest that mobile broadband demand is stimulated by a high demand for fixed broadband services. Hence, the majority of consumers does not view fixed broadband as a substitute for mobile...
Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science techniques to map attack vectors and seeing the security problem as either a puzzle to be resolved or...
Due to the rapid spread of smart phones and SNS (social network services), the use of Internet applications has increased and their need for bandwidth has begun to exceed the capacity of 3G networks. This has caused a reduction in speed and service quality and has underscored the need for network companies to invest in additional bandwidth. The increase in mobile network users has caused identity...
We are using a detailed realistic discrete event simulation model of the automatic German toll system to study resource usage of the mobile data network for various system configurations. Starting with an existing simulation model [1] we describe the driving patterns used in the simulation and the functionality added to the simulation model. Next we explain enhancements in simulation performance implemented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.