The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, investigations on ad hoc networks have received considerable interest due to its capability to deploy quickly without any infrastructure. And with the development of mobile terminal, mobile CSCW gradually becomes the developing direction of CSCW. The ad hoc networks' characteristics and the traditional CSCW's sharing mechanism are introduced at first. And then put forward the theory...
In order to monitor the production condition exactly and real-timely in underground and surface of coal mine, a new mobile application solutions scheme based on TD-SCDMA in coal mine is proposed. According to the high speed data service of third generation mobile communication systems, the wireless network of surface scheme was designed by the C/S structure, which can provide mobile communication...
This paper introduces a novel design of the behavioral analysis capability in mobile SNS. The capability has a basic part comprises relationship based interface, content based interface and time based interface. The basic capability can either provide APIs directly up to applications or encapsulate into advanced capability with the core of relationship based interface. Afterwards, explaining the usability...
As integration of heterogeneous networks has become one of the most important characters for next-generation networks, it becomes a very challenging issue to ensure effective handoff when mobile node moves between different heterogeneous networks. In this paper we propose an effective handoff mechanism based on location information. By processing geographical data (consisting of information about...
We consider variations of a problem in which data must be delivered to mobile clients en-route, as they travel towards their destinations. The data can only be delivered to the mobile clients as they pass within range of wireless base stations. Example scenarios include the delivery of building maps to firefighters responding to multiple alarms, and the in-transit ldquoilluminationrdquo of simultaneous...
In this paper, we address the problem of collaborative video caching in mobile ad-hoc networks. We consider network portraying static video server with wired interface to gateway node that is equipped with wireless interfaces, other nodes are requiring access to the video streams that is stored at video server. In order to reduce the average access latency as well as enhance the video accessibility,...
Most location service approaches for mobile ad hoc network rely on one static server or number of mobile servers distributed over the network area. These approaches suffer from servers' failures which cause out-of-date information and hence, using expired location information of the service. In this paper, a solution of such failures is presented through an adaptive server availability mechanism....
Mobile learning is transforming the way of tradition education. But most of e-learning system and contents are not suitable for mobile device. In order to provide suitable mobile learning services, the approach for self-adaptation is proposed in this paper. Firstly, the formal definitions of context and its influence on learning service, including NCxt, side S, weighing Q and adaptation coefficient...
Accounting is a key task in commercial networks. With the increasing number of IP-based services and mobility support, accounting needs to evolve towards an integrated, service-oriented accounting approach in a mobile environment. Therefore, this dissertation digest paper presents the Service-oriented Tailored Accounting Configuration (STACO) architecture that enables a service-oriented accounting...
Maintaining cache consistency in mobile environment is an important issue which is extensively studied in the last decade. In mobile ad hoc networks (MANETs), a large number of nonstationary mobile terminals connect with each other through multi-hop unreliable communication channels, coupling with the fact that disconnections from the network are very frequent. Most existing cache consistency strategies...
Decentral recommender systems appear well suited for mobile scenarios, but have not been investigated thoroughly or implemented very much so far. We have designed and implemented a system to recommend images on personal digital assistants (PDAs). Our approach also incorporates recommending for groups of users that are present at a public shared display. The system exchanges rating vectors among PDAs,...
Mobile search is becoming increasingly important for mobile users as mobile devices are more widely used. Mobile search differs from standard PC-based Web search in a number of ways: (1) the user interfaces and I/O are limited by screen real estate and tiny key pads are tiny, (2) limited bandwidth and costly connection time, (3) increased local search due to mobility. These limitations result in more...
Advancements in wireless technologies and mobile networks are increasing the demands for novel mobile services beyond voice and text-messaging applications. However, discovering such services from any device is still a major challenge. This can be considered from two perspectives: the variety of mobile devices available and the lack of service descriptions. In order to address these issues, in this...
In todaypsilas modern world people use to move from one place to another regularly. So there is a need for a mechanism which gives mobile user the necessary information about the new location. The proposed project implements two such mechanisms known as Pull technology and Push technology. The project proposes a trajectory prediction which estimates the users futures movement based on the information...
Existing solutions for building wireless mesh networks suffer from reduced efficiency. This is due to lack of reliable self-configuration procedures that can dynamically adapt to varying network conditions, lack of efficient and scalable end-to-end quality of service (QoS) support, and lack of generalized and seamless mobility support. Therefore, ensuring a certain level of QoS to mobile users is...
This paper presents a concept that enables consumers to access and share product recommendations using their mobile phone. Based on a review of current product recommendation mechanisms it devises a concept called APriori. APriori leverages the potential of auto-ID-enabled mobile phones (barcode/RFID) to receive and submit product ratings. Since mobile users cannot be expected to have the patience...
Near Field Communication is a short-range wireless communication technology. The majority of handset manufacturers showed interests in it and invested in developing NFC-enabled devices. Several NFC trials and researches have been launched all over the world. However, these trials only used NFC-enabled handset as a contactless smart card. It did not really reveal the ability of NFC technology. In order...
In the literature there are several location based routing schemes available for MANET. The effective management of location information has the maximum impact on the performance of this type of routing protocols. In this paper first we have made a study of the different categories of existing location services. Then we have proposed a new location management scheme which effectively implements the...
In order to access location-based services, mobile users have to disclose their exact locations to service providers. However, adversaries could collect the location information for purposes against mobile users' privacy. There are existing solutions for privacy protection by utilizing the K-anonymity model. However, the computational and communication costs are high. This research proposes cache...
Several methods have been proposed to support location-based services without revealing mobile users' privacy information. There are two types of privacy concerns in location-based services: location privacy and query privacy. Existing work, based on location k-anonymity, mainly focused on location privacy and are insufficient to protect query privacy. In particular, due to lack of semantics, location...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.