The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The combined effect of Moore's law and the failure of Den nard scaling have led to multi-core mobile devices with immense computation capabilities. The biggest limitation of the computation capability for any mobile device is its battery. Mobile cloud computing is used to offload compute intensive tasks that affect a mobile device's battery. Mobile ad-hoc computing can be used as an alternative to...
We propose a novel trust and probabilistic node selection mechanism for content distribution in mobile ad hoc networks, which aims to achieve trustworthy node selection and to preserve mobile node resources. The proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that our proposal achieves its goals.
The enhancements of the transmission speed in wireless access networks and mobile-device capacity enable us to use data/audio streaming/video streaming multicast service in large scale networks via their personal mobile devices. Peer-to-peer (P2P) architecture ensures scalability and robustness more easily and more economically than server-client architecture; as the number of nodes in a P2P network...
The interest towards real-time computing has lead an even more interest in grid computing. While in the past the implementation of grid computing has been done on high performance computers, in the recent years there is an increasing interest in the pervasive grid scenarios, where multiple devices can be used for a distributed computing. The most challenging idea is to use mobile devices connected...
We investigated consumer attitudes towards energy consumption of mobile phones and mobile services with a questionnaire study among Finnish university students (N = 150). Our questions covered topics like how battery consumption affected phone and application selection and configuration, what effect different battery levels had on user behavior, what kind of recharging policies were used, how satisfied...
Enhancements of transmission speed and mobile node capability in wireless access networks enable people to watch movies and share large files with friends via their personal mobile devices. Considering the increased demand for such services in the next five to ten years, we will need to introduce P2P architectures to mobile networks to handle the large number of requests from mobile nodes. However,...
Data replication can improve data availability in mobile networks; but due to typical resource limitations in such environments, specific replication mechanisms are needed. In this paper, we propose CReaM, user-Centric REplicAtion Model for mobile environment. This model puts users at the centre by letting them determine the amount of resources they are willing to share. CReaM is suitable for dynamic...
REsource LOcation And Discovery (RELOAD) is a peer-to-peer signaling protocol that can be used to maintain an overlay network, and to store data in and retrieve data from the overlay. RELOAD is currently being standardized in the Internet Engineering Task Force (IETF). The main application using RELOAD is Peer-to-Peer Session Initiation Protocol (P2PSIP). In this paper, we study the performance of...
We propose a model of dynamically evolving random networks and give an analytical result of the cover time of the simple random walk algorithm on a dynamic random symmetric planar point graph. Our dynamic network model considers random node distribution and random node mobility. We analyze the cover time of the parallel random walk algorithm on a complete network and show by numerical data that k...
Mobile and environmental sensing technology can be used to assess human behaviour and mental health trajectories outside of laboratories and in ecologically-relevant settings. To achieve maximum benefit, the set of equipment and the monitoring patterns must be personalised to respect individual needs and fit into individual lifestyles. We have developed a sensor network infrastructure for mobile phones...
Intrusion detection systems (IDS) for mobile ad hoc networks (MANETs) are necessary when they are deployed in reality. In This paper, we have presented a combined method of selecting IDS agent nodes in mobile ad hoc networks. Since, the IDS agents in MANET due to more activities need to more battery power. In our method, first, compromised nodes are detected and then the nodes with the highest energy...
We studied consumer attitudes towards different aspects of mobile peer-to-peer services by administering questionnaires to Finnish consumers using advanced handsets (N = 196). Most of the intention to use non-established services did not materialize as actual usage. Music and software downloading attracted most payment willingness. Legal file sharing stood out as a promising new business model. Respondents...
We evaluate the battery life of mobile devices that act as full-fledged peer nodes in a Kademlia DHT based P2P overlay network. The motivation is to find out how long a mobile peer is able to function in a UMTS or WLAN access network, and how the different parameter settings affect this battery life; this is interesting as mobile access to P2P networks is expected to become common in the near future...
This paper describes LocMAC, a new location aware power saving MAC layer for target tracking applications in smart space environments. Target tracking applications focus on providing proximity based local services to mobile users within a fixed deployment of wireless nodes. Conventional wireless sensor MAC layers increase the lifespans of battery powered wireless nodes by scheduling sleep periods...
In the mobile environment, effective use of limited energy of mobile devices is ever required. Especially, in a mobile peer-to-peer (P2P) system, if a mobile device uses all its energy up, it can no longer participate in the system. Furthermore, as the number of peers without energy increases, so does the file search failure rate of the system. In this paper we present an energy-effective routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.