The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the expansion of mobile computing and mobile data services, the number, type, and application of location-based services will continue to expand rapidly in the coming years. These apps have attracted the interest of users from different fields, such as gaming, mobile commerce, navigation systems, emergency services, and various tracking systems. As these apps use large volumes of location data...
ith the wide deployment of various kinds of sensors in fixed infrastructures and in mobile devices, technologies and applications of crowd-sensing has drawn attentions in the fields of mobile computing. This paper studies the design of frameworks for crowd-sensing process in a distributed environment. We discuss the realization of the compatibilities of devices and services, as well as the algorithms...
Mobile crowdsourcing (MC) is a transformative paradigm that engages a crowd of mobile users (i.e., workers) in the act of collecting, analyzing, and disseminating information or sharing their resources. To ensure quality of service, MC platforms tend to recommend MC tasks to workers based on their context information extracted from their interactions and smartphone sensors. This raises privacy concerns...
For the last decade, researchers are showing interest in mobile cloud computing (MCC) for its promising potentiality. It combines cloud computing and mobile computing providing better quality of service to user with mobile device. Resource famished applications can now be executed on mobile devices by offloading the task on cloud. Major research areas in MCC are how, where and when to offload a task...
In this paper, we present the Physical Web Browser project for web applications depending on the environment. At this moment, many of users all over the world visit websites using their mobile devices only. Any mobile device (e.g., smartphone) has sensors to capture the environmental information. This information (context) could be analyzed and used within the web applications. There are, at least,...
Computation offloading is a promising way to improve the performance as well as reducing the battery power consumption of a mobile application by executing some parts of the application on a remote server. Recent researches on mobile cloud computing mainly focus on the code partitioning and offloading techniques, assuming that mobile codes are offloaded to a prepared server. However, the context of...
With the proliferation of mobile devices, many users now take advantage of location-based services that use their current position. However, careful consideration should be made when sending one's location to another as the location often includes personal attributes such as home address and reveals private information such as health or religion. To resolve this issue, a dummy generation technique...
Individuals with Autism Spectrum Disorder (ASD) can face great challenges in learning and maintaining basic living skills. This not only reduces their possibilities of independent living and employment, but also continuously brings social and financial burdens to their caregivers/mentors. Although research has been proposed to help autism users, most of them focus on improving social and communication...
The trend of adapting BYOD or "Bring Your Own Device" concept in enterprise environment is increasing due to mutual benefits that the company and employees get. Organizations get benefit of increased productivity and reduced IT expenditure whereas the employees are able to use the mobile device which is comfortable and convenient for them. However, BYOD deployment brings serious security...
An original architecture for production and usage of modal linguistic summaries in IoT contexts and domains is presented. The underlying research takes into account basic features of real IoT contexts and tries to map them effectively into a set of functional requirements. The architecture is strongly influenced and supported by original models of natural language processing, developed interactive...
In this paper, we propose a context-aware distributed data storage mechanism to optimize the performance of reading/writing in the emerging mobile cloud computing environment. In particular, the exploited context information including user mobility pattern, network condition, and data access preference (intensity to read and write/update). The context information is utilized to improve the efficiency...
The boom of portable electronics and high-speed wireless networks has brought changes throughout society, including the style of teaching in schools. Modern technologies can, substitute the teacher in the process of teaching to a large extent. Thanks to possibilities of personalization and contextual of current device software equipment it is possible to take into account the individual needs of each...
We improve data access efficiency in mobile cloud storage by exploring users' context information. Specifically, we optimize data reading and writing on mobile devices from/to distributed cloud storage according to network condition, user mobility pattern, and data access preference. We propose a Reed-Solomon erasure code based context-aware distributed storage system. Then, a mixed integer linear...
The ubiquitous nature of mobile devices offering high computing capabilities has attracted a large number of users. The sensors available on these devices provide valuable data about user contexts, which when combined with sensor data from other mobile devices can reveal interesting environmental contexts, which can then be used for applications like real-time traffic monitoring, noise mapping, crowdmapping,...
Video sharing traditionally is an upload-then-share process for users. Users upload videos to cloud servers expecting their friends to login and share from these data centers. Therefore, real-time sharing is not possible since prior to the transmission, the uploading requires reformatting and transcoding the video file. This is both energy and time consuming especially that the cloud server is long-distant...
With the proliferation of mobile devices and the development of wireless technologies, users can run a wide range of applications on mobile devices. However, the mismatch between applications and mobile devices does not guarantee the application quality. To solve this problem, this paper proposes a context-aware application matching system.
When playing a game, the user expects an easy and intuitive interaction. Current controllers are physical hardware components with a default number, size and position of buttons. While in some cases a game uses a few controllers buttons, in others it requires all buttons and even a combination of them. Besides that, the use of few buttons in a physical controller (i.e. controllers that can't change...
It has become easier to create a lifelog by using smart phones. Lifelogs can be used in several ways. However, some problems exist in memory recollection; as many lifelogs owned by a person are partial information, it is impractical to remember days themselves. Therefore, a lifelog sharing system for memory recollection is proposed. The system elicits related information from other people's lifelogs...
In recent years, with growing demands towards big data application, various research on context-awareness has once again become active. This paper proposes a new type of context-aware user authentication that controls the authentication level of users, using the context of “physical trust relationship” that is built between users by visual contact. In our proposal, the authentication control is carried...
Mobile services are gaining importance in handling data on mobile devices. With heaps of information flowing in the network, a service for caching preferential posts will be helpful. Understanding the profile of an individual in a social network will help determine the relationship value with respect to other individuals in the network. Similarly a post in a social network can have contexts associated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.