The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last years we have experienced a growing industrial interest in Mobile Cloud Networking (MCN) as the opportunity to exploit the cloud computing paradigm through Network Function Virtualization (NFV), primarily with the goal to reduce CAPEX/OPEX for future mobile networks deployment and operation. The gain from the point of view of infrastructure costs reduction is almost clear and recognized,...
With the rapid development of computer technology and network transmission technology, more and more demand are put forward to improve the work efficiency, which are not limited to just use computers and laptops. In most institute of Measurement, too many instrument transfer process seriously restricted the work efficiency, how to solve the problem with smart mobile terminal has become a common topic...
Systems supporting collaborative geo-referencing of data and information activities are increasingly being used for various purposes like urban planning, risk management, geological prospection, by engineers, city planners, policemen, firefighters, geologists, architects, etc. These systems commonly implement processes and functionalities supporting decision making as well as design and planning....
Pocket Data Mining (PDM) is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data streams are now available for subscription on our smart mobile phones, the potential of using this data for decision making using data stream mining techniques has now been achievable owing to the increasing power of these handheld...
In the pervasive system, it is important for its application to adapt to mobile devices. But most of pervasive systems are not quickly suitable for mobile device. In order to provide adaptive mobile services, the approach for self-adaptation is proposed in this paper. Firstly, context of mobile devices and its influence on pervasive application are analyzed and business rules based on this analysis...
In this paper, we introduce an m-commerce security architecture; discuss how the communication takes place between user, mobile station (MS) and access point (AP). We use an new authenticated mechanism between user and MS. And we add Access Point in wireless net in order to avoid being attack and eavesdropping message. We analyze the characters of the architecture with the Summary of Mobile E-commerce...
Peer-to-peer content-distribution networks are nowadays highly popular among users that have stationary computers with high-bandwidth Internet connections. Mobile devices (e.g. cell phones) that are connected to the Internet via cellular-radio networks, however, could not yet be launched into this field to a satisfactory extent. Although most mobile devices have the necessary hardware resources for...
VoiceXML is a language of the W3C to create voice-user interfaces, particularly for the telephone. This paper first shows the importance of voice interface to m-commerce, then presents the VoiceXML techniques and a certain business applications on M-commerce. At last, we draw some conclusions.
In today's scientific research, computers and networks are playing an increasingly important role in the laboratory. It is desirable to researchers that any machines outside the laboratory provide a uniform, consistent, desktop computing environment and the ability to access private laboratory computing resources when outside the familiar work place. This paper proposes a system called mobile e-Lab,...
This paper focuses on channel allocation methods for multiversion data dissemination in mobile computing systems in which maximizing data currency (minimizing staleness) and minimizing the mean response time are of equal importance as providing consistent data items to mobile transactions. We propose broadcast marshalling method that clusters data to be broadcast, depending on their access frequencies,...
The twin mainstream computing shifts of mobility and programable Web are fundamentally impacting how humans interact, socialize, and accessinformation. Never before has computing been so disruptive and important in our daily activities. With such profound change looming what are the challengeswe still face and the challenges that we will increasingly have to deal with to make these coming changes...
The objective of this invited talk is to present selected visions of ubiquitous computing and ambient communication based on the notion of the disappearing computer and to reflect on the resulting challenges for designing experiences in future smart environments. Our approach places the human at the centre of our design considerations and is based on exploiting the affordances of real objects by augmenting...
As ubiquitous virtual reality (U-VR) systems become more and more popular and several systems coexist all together, sharing events between them in order to improve the user experience and increase their scope and functionality will be mandatory. Since U-VR systems have a dynamic and decoupled nature, and they have their own event model, we propose in this paper a semantic publish/subscribe infrastructure...
Over the past 20 years, a lot of effort has gone into making the vision of ubiquitous computing a reality. A major focus of this effort has been on the understanding of human activity as input to enable the design and implementation of context-aware applications. Context-awareness is a vital enabling technology for ubiquitous virtual reality applications. However, it is only recently that we have...
Low-cost wireless routers are changing the way people connect to the Internet. They are also very cheap, albeit quite limited, Linux boxes. These attributes make them ideal candidates for wireless mesh routers. This paper presents a minimally invasive mechanism for redundant multipath routing in kernel-space to achieve high reliability with high throughput in a mesh network. This service is essential...
In this paper, we introduce and evaluate ScaleMesh, a scalable miniaturized dual-radio wireless mesh testbed based on IEEE 802.11b/g technology- ScaleMesh can emulate large-scale mesh networks within a miniaturized experimentation area by adaptively shrinking the transmission range of mesh nodes by means of variable signal attenuators. To this end, we derive a theoretical formula for approximating...
Mobile agents are considered a suitable technology to develop applications for wireless environments with limited communication capabilities. Thus, they offer interesting advantages compared with a traditional client/server approach, derived from their autonomy and capability to move to remote computers. An important benefit is that mobile agents can carry the computation wherever it is needed at...
An alarm system suitable for pervasive healthcare in rural areas is presented. Taking advantage of ZigBee features, users can move freely around their habitual environment while enjoying constant protection. The resulting system is cost-effective, easily deployed (no wiring is needed) and the mobile device's batteries last for months. The user interface is a key issue when working with the elderly...
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
Todaypsilas access network is migrating towards broadband IP, fixed/mobile convergence and service convergence. Thus, the next generation access network (NGAN) requires a converged optical/wireless access network infrastructure, other than the existing architecture that connect to the cellular, broadband wireless, and optical access networks separately, which complicate the network and increase the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.