The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The explosion of mobile computing and the sharing of content ubiquitously has enabled users to create and share memories instantly. Access to different data sources, such as location, movement, and physiology, has helped to create a data rich society where new and enhanced memories will form part of everyday life. Peer-to-Peer (P2P) systems have also increased in popularity over the years, due to...
In pervasive environment various devices with varying medium of access, mobility and connectivity have different types of services available among themselves. We are in need of a computing scheme which can utilize this limited amount of resources in the network in an efficient way. In this paper, we have considered various aspects of routing to find out the most efficient devices for service provisioning...
This paper describes a pervasive solution for Health and Life-support based LBS context-aware services, based on the integration and fusion of sensors and wireless technologies. It is proposed the integration of IEEE 802.15.4, RFID, Bluetooth, 3G and CAN devices and protocols to provide biotelemetry and alarm signals. The alarm signals and default communications links are context-aware to the physical...
In ubiquitous computing environment, user application requires close interaction with the network nodes in its proximity, the interactions are opportunistic and unpredictable with the user's movement. This paper names this phenomenon as a locality problem and provides a model of this problem based on fuzzy set theory. Fuzzy synthetic evaluation method is used to evaluate the local scene members. An...
The growing demand for ubiquitous computing lead manufactures to develop multi-band devices supporting different network access technologies, such as GSM, Wi-fi, and UMTS. Although these devices support different access technologies, they lack of native vertical handover support, breaking any ongoing connections whenever users switch between access technologies. In this paper we present a next-generation...
In recent years the Department of Defense has aggressively invested in development of an Internet Protocol (IP) based network that interconnects mobile air platforms and ultimately will also connect to the Global Information Grid (GIG) as part of its Net-Centric Warfare initiatives. One of the major visions for the IP based networks is to support interoperable voice communication amongst heterogeneous...
Personal computing devices, such as smart-phones and PDAs, are commonplace, bundle several wireless network interfaces, can support compute intensive tasks, and are equipped with powerful means to produce multimedia content. Thus, they provide the resources for what we envision as a human pervasive network: a network formed by user devices, suitable to convey to users rich multimedia content and services...
Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents...
Peer-to-peer (P2P) network is a decentralized and self organized architecture for the sharing of resources such as files. P2P network on wired network (Internet) has been extensively studied. The advancement in the wireless and mobile technology has lead to the deployment of the P2P filesharing on mobile ad hoc networks (MANETs). The direct deployment of wired P2P network would result in poor performance...
This paper presents an architectural model for wireless peer-to-peer (WP2P) file sharing system for ubiquitous mobile devices. File sharing is one of the rationales for computer networks with increasing demand for file sharing applications and technologies in small and large enterprise networks and on the Internet. With the popularity of mobile phones in day-to-day activities, P2P file sharing in...
The issue of digital identity is at the heart of many contemporary strategic innovations, covering crime, internal and external security, business models etc. The area of MANets (Mobile Ad-hoc Networks) is still in its infancy in the research community, but it plays a vital role surrounded by the growing trend of mobile technology for business, private and governmental uses. The emergent notion of...
With the emergence of pervasive computing environments, mobile information sharing and retrieval is becoming an exciting domain that challenges information scientists. In this paper, we describe a hybrid peer to peer context-aware framework for building mobile information sharing applications. A scalable and flexible architecture based on JXTA is presented. The architecture called "JHPeer"...
Recent advances in solid state and packaging technologies have enabled production of more efficient and reasonably small devices such as micro electro mechanical systems (MEMS). Wireless sensor networks (WSNs) can gather data from sensor nodes and are now at the practical stage of realizations because of the above advances. Conventional researches have mainly focused on extending the lifetime of WSNs...
The objective of pervasive computing is to provide anytime and everywhere, computing and communication services in particular, for mobiles that interact through ad hoc connections. This paper presents centralized and distributed service based clustering approaches wherein ad hoc or composite services are represented by clusters of nodes that establish relationships based on affinities. The relationships...
The development of mobile communication technologies and smart portable device has great impact on the society, which makes the ubiquitous computing and seamless service come true. However, a major challenge is that how to provide a software platform supporting personalized and context-aware services and applications. Research on universal service terminal (UST) aims at providing light-weight application...
Mobile adhoc network (MANET) is a network of a number of mobile routers and associated hosts, organized in a random fashion via wireless links. During recent years MANET has gained enormous amount of attention and has been widely used for not only military purposes but for search-and-rescue operations, intelligent transportation system, data collection, virtual classrooms and ubiquitous computing...
Over the last ten years, evolutions in nomadic terminals and mobile networks led to ubiquitous and pervasive computing. Existing query evaluation and optimization techniques for distributed databases using global schemas and cost models are no longer relevant. Query service, the key element allowing users to access data, must adapt itself to frequent changes in pervasive environments (application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.