The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Using smart mobile devices to support human-centric services is a frequent demand in business scenarios. As a particular challenge, tasks performed in a paper-driven way shall be digitally transformed with the use of mobile devices. With the goal to enable business applications supporting human-centric mobile services in mind, we developed a framework that extends existing process management technology...
The increasing complexity of smartphone applications and services necessitate high battery consumption but the growth of smartphones' battery capacity is not keeping pace with these increasing power demands. To overcome this problem, researchers gave birth to the Mobile Cloud Computing (MCC) research area. In this paper we advance on previous ideas, by proposing and implementing the first known Near...
Existing wireless sensor network are developing rapidly and soon will occupy a dominant place among the data collection and communication. The remote location of the sensors and automatic operation increases their vulnerability to outside intrusions and attacks. Because of out of constant sensor supply the providing of authentication is quite challenging whereas the best protocols is negotiated sensor...
This paper explores Adaptive Fibonacci-based Tuning Protocol for Service and Resource discovery in the Internet of Things (AFT). Through using constrained application protocol (CoAP), Internet of Things (IoT) can support Machines to Machines (M2M) communications. CoAP has centralized and distributed operation modes to discover resources. In the centralized mode, resource directory (RD) is used to...
In recent years Wireless sensor networks (WSNs) play a vital role in various real time application, by collecting a huge amount of various sensory data from the field. The routing protocol for wireless sensor networks mainly aims in the energy-efficiency of the network. Due to restricted energy, memory, transmission range, power and high traffic load, the nodes which act as a sink get depleted quickly...
The search for service providers (e.g., ambulance, fire truck, etc.) after a disaster, must take place within ashort time. Therefore, service discovery protocol which looks forproviders that can attend victims, respecting time constraints, iscrucial. In such a situation, a commonly solution for ensuringnetwork connectivity between victims and providers is ad hocnetworks (MANET), composed by battery-operated...
In this paper a mechanism to identify a cloudlet for computation offloading in a decentralized manner is proposed. The cloudlet identification is carried out in two phases. In the first phase, cloudlets within WiFi range of the mobile device are identified without connecting to any of the cloudlets. In the second phase, selection of the ideal offloading cloudlet is done based on infrastructure specific...
In recent years, Delay Tolerant Networks (DTNs) have been successfully presented as a possible extension of the Internet architecture in order to provide communication support to existing networks. However, these networks have a major issue which is the coordination among relays. In this paper, we propose a novel mechanism source-relay association approach for heterogeneous DTNs that exploits the...
The new generation of smart devices, equipped with a large variety of sensors, enhances the Participatory Sensing of data. However, many issues arise when selecting participants to perform the sensing tasks. These issues are necessarily related to the limited energetic resources of devices, the impact of users mobility as well as the quality of collected data, recently defined as “Quality of Information”...
Mobile data traffic has increased drastically during last few years and expected to increase multifold in the coming years. Heterogeneous wireless networks have made it possible to have simultaneous traffic flows on all available wireless accesses. IP Flow Mobility (IFOM) which has been standardized from 3GPP Release 10 provides possibility to seamlessly transfer individual flows from one access to...
The duration of batteries is a key factor that must be considered in the design and deployment of applications and services on mobile devices. The users of this technology are not aware of the energetic impact of the applications executing in their devices, especially if these applications present an adaptive behavior.
Mobile Grids (MoGs) are an emerging sphere in distributed computing and are expected to become a crucial part of computational Grids in future. Apart from allowing a convenient user access to the Grid, mobile hosts can act as valuable computing resources in the Grid. However, mobile hosts have limitations of resources such as stable storage, wireless bandwidth, battery power etc. and are also subject...
The prevalence of smart mobile IT industry is changing very rapidly worldwide. Wide varieties of products are linked to the smart mobile and offer various services. Among them, handicapped assistive devices are also growing rapidly and a variety of products have been released. This paper proposes a system that uses a customized cloud-based mobile device to control the wheel chair. Through a simple...
In cooperative Mobile Ad-hoc Networks (MANETs), copies of data are replicated on different mobile devices to increase resource accessibility and data availability. In order to preserve data consistency, a leader or authoritative control node is assigned to act as an organizer for the shared data copies. Since mobile devices have limited battery power, the leader may fail at any time. When the leader...
The MIPI® Alliance Battery Interface (BIF) is the first comprehensive battery communication interface standard for mobile devices. MIPI BIF is a robust, scalable and cost-effective single-wire communication interface between the mobile terminal and smart or low cost batteries. It is suited for removable batteries as well as for embedded batteries. BIF improves mobile terminal safety and performance...
The success of peer-to-peer live video streaming in wireline networks has inspired the development of mobile peer-to-peer streaming technologies. However, the traditional peer-to-peer live streaming techniques have been found to perform sub-optimal in wireless networks. Furthermore, the increasing energy consumption in wireless networks due to inefficient communication protocols has resulted in the...
Mobile vehicles equipped with wireless energy transmission technology can recharge sensor nodes over the air. When to recharge which nodes, and in what order, critically impact the network performance. So far only a few works have studied the recharging policy for a single mobile vehicle. In this paper, we study how to coordinate the recharging activities of multiple mobile vehicles, which provide...
In this paper, we use the ascending reverse auction method in incentive-based cooperative networks in order to increase the cooperation level of malicious users. Our approach integrates the reverse auction method with traditional pricing and reputation based algorithms and uses fuzzy thresholds to increase freedom of service providers in making the decision whether to cooperate or not. In contrast...
In order to provide a more resilient communication for a Neighborhood Watch type (NHW) system, a mobile middleware architecture using delay-tolerant network (DTN) technology and publish/subscribe concepts is described. The purpose of the middleware is to add resilience and reach to wireless communications, and also to reduce the battery drainage of the mobile devices, hence extending their operational...
This work is a survey presenting attacks on smartphones and recommending the best possible locations for deploying defensive mechanisms to mitigate those attacks. The attack vectors are categorized into three classes according to their characteristics as attacks via application layer, communication layer and operating system layer. We describe various attacks belonging to each of these classes and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.