The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Delay and Disruption Tolerant Networking (DTN), Epidemic, PRoPHET and Spray and Wait protocols work by distributing one or more message copies (Bundles). They can naturally adapt to the mobile situation where the destination node moves from an old connection endpoint to a new connection endpoint because any Bundle copy may luckily be able to reach the new connection endpoint where the mobile node...
Caching is the key technology for Mobile Database. In the mobile computing environment, how to guarantee the data in local cache is consistent with the primary copy on the server is the chief consideration in this paper. An improved cache invalidation schema based on Mobile Agent is designed. The proposed schema uses asynchronous invalidation method and the Control Message broadcasted by MSS periodically...
Network latency is one of the most critical factors for the usability of mobile SOA applications. This paper introduces prefetching and caching enhancements for an existing SOA framework for mobile applications to reduce the user perceived latency. Latency reduction is achieved by proactively sending data to the mobile device that could most likely be requested at a later time. This additional data...
A Location-based Service has to protect user's location and query information to alleviate privacy concerns. Several location and query privacy preserving approaches, based on the concept of k-anonymity and l-diversity, have been proposed in the literature. These approaches assume a trusted anonymizer. Caching has been used as the trusted anonymizer to save communication and computation cost and to...
Video streaming on mobile devices such as PDA's, laptop PCs, pocket PCs and cell phones is becoming increasingly popular. These mobile devices are typically constrained by their battery capacity, bandwidth, screen resolution and video decoding and rendering capabilities. Consequently, video personalization strategies are used to provide these resource-constrained mobile devices with personalized video...
One of the important issues in the design of a mobile computing system is how to manage the real-time locations of mobile clients. In the existing commercial cellular mobile computing systems, a two-tier architecture is used. However, the two-tier architecture is not scalable and is not suitable to support the novel new mobile computing applications. Recently, a hierarchical database structure is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.