The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information filtering and personalization are central to the viability of many advanced connected services that are currently being developed for mobile consumer electronic devices. The usability of these services is closely tied to their ability to offer relevant, context sensitive information while shielding the user from both information overload and missing information that she/he did not know...
The advancement in wireless networking technologies and portable devices has motivated the explosive interests in heterogeneous wireless environments. However, the mobility and diversity of both devices and users bring new challenges for the design of mobile Internet applications. Seamless mobility support has always been one of the key problems. In this paper, we study context-aware adaptation for...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes' own responsibility of building their...
A challenge in the convergence of heterogeneous networks is how to combine the ubiquitous resources and provide the diversified individual services. By this, the vision of adaptive and context-aware service provision becomes possible and offers new opportunities for pervasive computing. In this paper, we describe an approach that addresses the convergence of wireless personal area and wide area networks...
The iPhone is one of the most powerful, complete and versatile portable phones on the market. There are presently more than 150.000 applications available for the iPhone, and its users had downloaded more than three billion applications so far. The iPhone have several capabilities that makes it an interesting platform for the development of applications that use image processing, computer graphics...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes own responsibility of building their trust...
Mobile Virtual Network Operators (MVNO) operate without owning spectrum usage rights, by leasing spectrum from Mobile Network Operators owning a license. Spectrum leasing may occur through a reservation process that assigns the MVNO the right, but not the obligation, to lease spectrum at a later time. Reservation contracts may be signed with strict guarantees, that provide MVNOs with the certainty...
Near Field Communication (NFC) is a promising new communication technology that, among other things, allows mobile phones to emulate smart cards such as the travel cards used in public transportation. Bringing the travel card into mobile phone creates numerous benefits for both end users and service providers, which is why mobile ticketing with NFC technology has been considered a promising service...
We consider a community of agents in the domain of patient healthcare where the community is populated by personal assistant agents residing on mobile phones assisting the human patients and sever agents managing the services offered to the patients. In this scenario, we look at patient care polices, and interpret them in the context of crisis situations. Existing models dealing with behaviours of...
Social networking service for mobile devices is presented and evaluated. The operating principle of the service is inspired by human-like cumulative gossiping. The usage of the service is browser based and implementation utilises standard ad hoc communication between smartphones. The cumulative gossiping protocol is built on the service level and on top of the existing ad hoc communication method...
Wireless networks have contributed to the technological advance that popularized the use of mobile devices, and fostered the development of applications targeted to these devices. However, issues such as mobility and communication intermittency, as well as processing, storage and battery constraints demand changes in the traditional software testing process. This paper aims to present testing requirements...
Mobile ad hoc networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media. Significant research efforts have been made to address the problem of misbehavior detection. However, little research work has been done to distinguish truly malicious behaviors from the faulty...
In the ever-changing pervasive computing paradigm, applications, especially those running on resource-scarce mobile devices, have to adapt to the runtime environment as the users are roaming around. Various adaptation techniques, relying on dynamic composition of components, have been proposed by a number of researchers. Nevertheless, most existing approaches only support component selection based...
Mobile learning is transforming the way of tradition education. But most of e-learning system and contents are not suitable for mobile device. In order to provide suitable mobile learning services, the approach for self-adaptation is proposed in this paper. Firstly, the formal definitions of context and its influence on learning service, including NCxt, side S, weighing Q and adaptation coefficient...
This paper is focused in a mobile ad hoc network, where, the nodes can be in/out of it at any time. Furthermore, the interaction of processes running on different nodes result in the creation of new tasks, named as coordinated tasks. The execution of these new tasks requires the on-line reconfiguration of the nodes. Such reconfiguration involves the scheduling of new processes. In this work, this...
Next generation network on the high speed train is aimed to achieve high mobility, broadband and large data rates as required. However, the wireless signal has been proved instable due to high doppler shift, poor weather conditions and various geography environment. In this context, the e-business on the high speed train has to face a few e-business quality problems for wavy data rates and transmission...
The issue of digital identity is at the heart of many contemporary strategic innovations, covering crime, internal and external security, business models etc. The area of MANets (Mobile Ad-hoc Networks) is still in its infancy in the research community, but it plays a vital role surrounded by the growing trend of mobile technology for business, private and governmental uses. The emergent notion of...
Mobile RFID-enhanced applications ("mobile RFID") offer a unique way of interacting with the physical world by using the touch paradigm. They offer an intuitive way to interact with physical objects to which RFID transponders are attached. However, the development of mobile RFID applications is not well supported yet, in contrast to stationary RFID applications where typically RFID middleware...
Web services have become extremely important when offering services through the Internet. However, current Web Services are very inflexible as regards their invocation from different types of device, especially when taking into account their adaptation when being invoked from a mobile device. In this paper, we propose several alternatives for the creation of flexible Web services which can be invoked...
Advancements in wireless technologies and mobile networks are increasing the demands for novel mobile services beyond voice and text-messaging applications. However, discovering such services from any device is still a major challenge. This can be considered from two perspectives: the variety of mobile devices available and the lack of service descriptions. In order to address these issues, in this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.