The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent years, as mobile devices are getting more and more popular, Apps on mobile devices accessing to multiple cloud services through mobile Internet is continuously increasing. However, compared to the traditional PC, mobile devices have a limitation in the ability of storage, the ability of computation, battery capacity and so on, which makes it difficult to handle complicated tasks under mobile...
Along with the explosive growth of the mobile applications and up-raising cloud computing concept, mobile cloud computing appears to be a new potential technology for mobile services. Mobile cloud computing maps cloud computing ideas on top of the mobile environment, and overcomes obstacles that deal with performance (i.e. battery life, CPU, storage, and bandwidth), environment (i.e. heterogeneity,...
In Today's world Mobile devices are the important handheld devices spreading throughout the world, and it is necessary to integrate web services into the mobile device. We introduce a simple approach for dynamically invoking web service methods from mobile devices with minimal user intervention that only involves entering a search phrase and values for the method parameters. This energy efficient...
This paper addresses whether Mobile Cloud Computing models can be used to extend the capabilities of resource constrained mobile devices to provide the illusion of infinite, elastic resources on demand. We identify five key limited resources as being CPU, memory, battery, data usage and time. Existing solutions for these limitations are explored, and we identify offloading computation and storage...
In the last decade we have witnessed the birth and dramatic growth of mobile devices, from cellular-to smart-phones. Despite the huge amount of information achievable from an always-connected reality, researchers that work in the mobile devices field fight against the impossibility to explore, inspect and test their work on such a vast set of possible environments, use case scenarios, hardware and...
Mobile users always require an excellent user experience which is the top challenge faced by today's mobile device designers and producers. Mobile devices are battery constrained, thus developing energy-saving techniques to extend the battery life is critical in terms of the user experience. Since the discrepancy between the device energy and battery energy consumption is becoming large when the battery...
Notification distribution is a great feature to have as: (1) it lets employees receive notifications directly on their mobile devices in near real-time; and (2) it reduces the effort required by IT administrators to manage a diverse fleet of mobile devices and platforms. However, it should take into account the fact that the battery lives of mobile devices have been decreasing a lot over the last...
Improving energy efficiency of mobile devices is one of the main challenges to extend the battery life. The Wireless Network Interface Card (WNIC) or 3G is usually considered as primary source of energy consumption. To reduce the energy consumption, different proxying schemes have been proposed in literature mostly focusing on increasing WNIC idle periods through traffic shaping, reducing number of...
The combined effect of Moore's law and the failure of Den nard scaling have led to multi-core mobile devices with immense computation capabilities. The biggest limitation of the computation capability for any mobile device is its battery. Mobile cloud computing is used to offload compute intensive tasks that affect a mobile device's battery. Mobile ad-hoc computing can be used as an alternative to...
Mobile Applications are rapidly emerging as a convenient medium for using a variety of services. In ubiquitous environment, the challenge relies on developing applications that sense and react to environmental changes to provide a value-added user experience. This context awareness property improves application usability. Context information can be related to the environment, user but also to the...
Due to the advances on mobile technology, it is becoming feasible to host Web Services on a mobile device, making it perceived as potential data collector and provider. Hosting Web Services on mobile devices gains in importance when it comes to deliver real-time contextual data, such as current location or real-time heart rate. In addition to the characteristics of the available network, the usability...
Software on mobile devices has become increasingly complicated as end users demand a PC-converged user experience on the mobile Internet. This has complicated the software configuration and boot procedures, resulting in a longer boot time. This is damaging to the mobile user experience. Many legacy techniques to enable the fast boot time differentiation in mobile handsets are not applicable to the...
The most important parts of our Biotelemetry system is a hardware platform. If we could develop visualization, we must have to measure real data. They are two main choices to solve this part of system. We can use commercial devices, such as embedded PCs, PDAs and wireless ECG unit Blue ECG communicating via Bluetooth. Suggests major problems and disadvantages of their use and offers possible solutions...
Sharing ad hoc resources by offering remote services through an appropriate infrastructure enables new applications for mobile devices. However, the willingness of device owners to contribute resources to such applications remains low as long as they cannot control the amount of energy spent in sharing. In this paper, we explore the potential, limitations, and tradeoffs of ad hoc resource sharing...
Cell phone battery life has been a fundamental design consideration ever since the first mobile devices were introduced in the 1970's. When mobile services were restricted to voice, the problem from a system design perspective often boiled down to finding best of breed components (e.g. amplifiers, signal processors, etc.) that optimized power while not sacrificing size. However, today's cell phones...
Encryption is becoming an increasingly dominant component in online and mobile applications. While robust security is an important property desired in encryption schemes, it is equally important for such schemes to be highly energy efficient. In this paper we evaluate traditional AES implementations and non-traditional Chaotic Maps based encryption schemes. Our experiments reveal that Chaotic Maps...
Presence systems are widely used today to get information of user availability and their willingness to communicate. As presence and Unified Communications (UC) services are viewed as productivity enhancements within enterprises, the need to connect these services across enterprise WANs and MANs becomes more important. Adding to the availability to communicate is the growing use of mobile devices...
This article undertakes the most important parts of hardware platform of our Biotelemetric system. It describes the way of use of standard devices from commercial manufacturers, such as embedded PCs, PDAs and wireless ECG unit BlueECG communicating via bluetooth. Suggests major problems and disadvantages of their use and offers possible solutions in the form of construction of our own purpose-built...
To deal with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of mobile ad hoc environment and mobile devices. This paper presents a Secure and Lightweight...
Wireless networks have contributed to the technological advance that popularized the use of mobile devices, and fostered the development of applications targeted to these devices. However, issues such as mobility and communication intermittency, as well as processing, storage and battery constraints demand changes in the traditional software testing process. This paper aims to present testing requirements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.