The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proliferation of mobile devices has led to advanced cybercriminal activities that exploit their ubiquity. Contemporary mobile forensics techniques and the challenges facing forensic investigators are discussed. Also identified are research opportunities that must be explored to enable more efficient mobile forensic techniques and technologies.
Mobile advertisements are critical for both mobile users and businesses as people spend more time on mobile devices than on PCs. However, how to send relevant advertisements and avoid unnecessary ones to specific mobile users is always a challenge. For example, a concert-goer may like to visit restaurants or parks before the concert and may not like the advertisements of grocery stores or farmers'...
Mobile social networks (MSNs) are the networks of individuals with similar interests connected to each other through their mobile devices. Recently, MSNs are proliferating fast supported by emerging wireless technologies that allow to achieve more efficient communication and better networking performance across the key parameters, such as lower delay, higher data rate, and better coverage. At the...
App developers publish apps on different platforms, such as Google Play, App Store, and Windows Store, to maximize the user volumes and potential revenues. Due to the different characteristics of the platforms and the different user preference (e.g., Android is more customized than iOS), app testing cases on these three platforms should also be designed differently. Comprehensive app testing can be...
In the era of the mobile Internet, the problem of personal information leakage is becoming more and more serious. It is possible that third-parities (e.g., advertising companies, telecom operators) can easily obtain private user information by analyzing the Internet traffic flows to (or from) users. In this paper, in order to examine the degree of information leakage via the URLs, we propose an efficient...
Internet-based health interventions are behavioral treatments aim at changing behaviors to promote healthy living and prevent diseases and illness. This paper first discusses the benefits and effectiveness of Internet-based health interventions. It continues to explore the opportunities and challenges of Internet-based health interventions made possible by the Future Internet and emerging technologies...
The world is witnessing a spectacular shift in the delivery of health and wellness care. The key ingredient of this transformation consists in the use of revolutionary digital technologies to empower people in their self-management as well as to enhance traditional care procedures. While substantial domain-specific contributions have been provided to that end in the recent years, there is a clear...
Location-based messaging applications (LMAs), a kind of messaging applications for mobile devices which enable users to connect with people based on their geographical locations, have recently experienced a huge popularity growth. The killer feature in LMAs that embodies the concept of geo-based instant messaging, named people nearby, allows users at any place to search and communicate with other...
This paper preferences extraction and ranking functions in mobile search that captures the users' preferences in the form of concepts by mining their click through data. Due to the importance of location information in mobile search, it classifies these concepts into content concepts and location concepts. In addition, users' locations (positioned by GPS) are used to supplement the location concepts...
With the increasing demand and popularity in wireless mobile technologies, more and more applications have been developed in the market to use the technologies and to achieve higher work efficiency to facilitate client users to fetch and manage information anytime and anywhere. In this paper, an investigation and analysis report of NFC (Near Field Communication) technology in mHealthcare (mobile healthcare)...
The following topics are dealt with: cyber-enabled distributed computing; knowledge discovery; distributed control; data mining; wireless communication; mobile communication; agent; middleware; mobile system; Internet protocol; quality of service; parallel computing; authentication; privacy; system management; neural network; reasoning; and cloud computing.
For the deficiency of the current location-aware mobile information service system in information search because of cross-platform, cross-regional and cross-networks, a new concept with multi-way information collection, information fusion, data mining, information security and cooperative processing of intelligent push technology was proposed, and an intelligent Location-Aware Mobile cooperative System...
Roadside units (RSUs) aided certificate service is a promising approach for ensuring security and privacy preservation in vehicular ad hoc networks (VANETs). In existing approaches, a vehicle can update certificate only when it passes by RSUs, however, this is impractical in many scenarios. Consequently, if there are no RSUs on the original driving trip, drivers have to adjust routes which means wasting...
Mastering knowledge of user profile is one of the technical cornerstones for service providers who handle a large amount of service consumption data and are well positioned to dynamically infer user interests. This paper presents a technology allowing to gather usage data from different multimedia services, create and track users profiles in real-time and monetize them by targeting content or other...
This paper explores ways to enhance services provided to a user, based on the user's own behavior and context. The assumption is that the user continues to simply use data communication services, while the service provider (SP) mines the content exchanged over the communication pipes for information that can be used to further personalize the same service or other services to which the user has subscribed...
With the proliferation of new online services and wireless personal devices, location-based services and applications for mobile users are widespread in use today. But the privacy of these users exposes to others increasingly in accessing those location based services. Exposure of the location information may result in privacy threat by malicious servers and hackers. In this paper, we propose a new...
This paper addresses the problem of sustaining the privacy of a vehicle in a vehicular ad hoc network (VANET). In a VANET, vehicles broadcast information as they move on the road. The location of a vehicle can estimated using localization techniques and its identity can be read from its messages. A link can be established between the physical vehicle through localization and its identity is a threat...
Firstly, mobile commerce adopters have been classified into three roles as technology user, network member and consumer. Secondly, based on this, this paper investigated whether such three roles have different customer attitudes. Finally, consumer attitude affecting adopt intention for mobile commerce has been verified. As for sample data, 245 questionnaires of college students have been collected...
The following topics are dealt with: grid and cluster computing; performance evaluation and measurement; architectures and systems; wireless and mobile communications; network communications; security and privacy; reliability and fault tolerance; data mining and caching; AHPCN; multicore and multithreaded architectures and programming; network storage and data management; and parallel algorithm and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.