The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers the efficacy of using active network technology to offload computation from small mobile devices into network node computing centers. The performance of six algorithms for use in this process is compared and conclusions are drawn.
Kings Eye is a platform independent situational awareness prototype for smart devices. Platform independence is important as there are more and more soldiers bringing their own devices, with different operating systems, into the field. The concept of Bring Your Own Device (BYOD) is a low-cost approach to equipping soldiers with situational awareness tools and by this it is important to facilitate...
The unabated plethora of research activities to augment multifarious mobile devices by leveraging cloud resources have created new research field called Mobile Cloud Computing (MCC). Recently, researchers have found Mobile Cloud Computing (MCC) to be a promising venture combining the advantage of both the cloud and mobility in giving users available resources on the cloud wherever they are using their...
In this interview, Mahadev Satyanarayanan (Satya) looks back 15+ years to consider what motivated him to write his seminal 2001 paper, "Pervasive Computing: Vision and Challenges." He considers where we are in terms of battery life, cyber foraging, and smart spaces; explains how the Internet of Things relates to pervasive computing; and addresses issues of user intent, user distraction,...
The presented article analyzes, adopts and develops new solutions with regard to the aerial electric supply solutions for operational surveillance drones. This article proposes a number of innovative new usages and original solutions for continuously operating surveillance drones on a predefined path or around a predefined perimeter and, afterwards, steps are discussed which have to be followed to...
We present an approach for dynamically outsourcing and composing security functions for mobile devices, according to the network behavior of their running applications. Applications are characterized from a network point of view using data mining and clustering techniques with the aim to select their appropriate security functions. Software-defined networking mechanisms are employed to chain the selected...
Smartphones are here to stay, transforming how we communicate, collaborate and share in our everyday lives, providing a wide variety of applications. Smartphones are becoming more affordable, 3G and 4G networks expand and mobile applications offer a convenient way to access information. The current study aims to investigate smartphone and smartphone applications utilization by university students...
Smartphones are becoming increasingly popular with a wide range of capabilities for the purpose of handling heavy applications like gaming, video editing, and face recognition etc. These kinds of applications continuously require intensive computational power, memory, and battery. Many of the early techniques solve this problem by offloading these applications to run on the Cloud due to its famous...
Mobile-cloud offloading mechanisms delegate heavy mobile computation to the cloud. In real life use, the energy tradeoff of computing the task locally or sending the input data and the code of the task to the cloud is often negative, especially with popular communication intensive jobs like social-networking, gaming, and emailing. We design and build a working implementation of CDroid, a system that...
Emerging new era of computing in fashionable trendy infrastructure to boot up a business perspective application services are provided through internet via the technological paradigm shift named as cloud computing. Furthermore cloud enhances the technological issues termed with mobile energy lifetimes and provides the better solution to save potential energy existence. Cloud plays the infrastructural...
This work is a survey presenting attacks on smartphones and recommending the best possible locations for deploying defensive mechanisms to mitigate those attacks. The attack vectors are categorized into three classes according to their characteristics as attacks via application layer, communication layer and operating system layer. We describe various attacks belonging to each of these classes and...
Because of their unique characteristics, smartphones present challenges requiring new business models that offer countermeasures to help ensure their security.
The undoubted success of very powerful and pervasively IP enabled cellular phones raises the obvious question whether the cellular world will also enter a severe security crisis like the PC itself. Moreover, this serious question is amplified through the use of new Open and even Web-OS oriented phone platforms. Considering the most dangerous security threat which might be given in the form of cellular...
The number of smartphone users and mobile application offerings are growing rapidly. A smartphone is often expected to offer PC-like functionality. In this paper, we present Virtual Smartphone over IP system that allows users to create virtual smartphone images in the mobile cloud and to customize each image to meet different needs. Users can easily and freely tap into the power of the data center...
The cloud heralds a new era of computing where application services are provided through the Internet. Cloud computing can enhance the computing capability of mobile systems, but is it the ultimate solution for extending such systems' battery lifetimes?
A mobile communication device is a small size of portable computer which provides communication service. One of the biggest barriers in developing the mobile communication device is security. To protect itself against security threats, the mobile communication device need to be loaded with various kinds of security functions such as firewall, access control, and so on. However because the mobile communication...
To deal with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of mobile ad hoc environment and mobile devices. This paper presents a Secure and Lightweight...
Mobile ad-hoc network (MANET) basically, consists of collection of mobile hosts incorporating wireless interfaces. These mobile nodes forms a transitory autonomous network and do not base on fixed infrastructure or central administration, rather they work on the principle of self-organized interconnections among mobile nodes. The idea at the core of the MANET technology is that while in movement when...
As mobile communication business rapidly developing, the distribution system of communication building often faces pressure to upgrade capacity. According to the system's configuration features of the mobile communication building, the paper applies the dynamic programming methods to the charging process of the building's batteries. Then this method could excellently release a great part of capacity...
In existing clustering algorithms in mobile ad hoc networks, some of them consider only stability of cluster heads, and some others take only security into account, while only a few of them consider both factors. We propose Voting-based Clustering Algorithm with subjective trust and stability (VCA) by accessing subjective trust of node through Bayesian method and by evaluating stability of node through...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.