The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDS for MANETs have attracted much attention recently...
Positioning, being one of the main factors shaping services that deliver information to users based on their location, has experienced huge advancements over the past years. Today, the combination of device-centric positioning approaches, such as GPS, and device-assisted approaches, such as Cell-Id and WiFi positioning technologies, has proved to be very popular among mobile platforms. Nevertheless,...
The telecommunication enterprise networks are continuously facing increasing amount of messages and multi-media traffic due to growing deployment of messaging applications. The detection of SPAM over Instant Messaging (SPIM) is essential for the mobile service providers to achieve user satisfaction and efficient network load balancing. However, accurate SPIM detection is challenging at the server...
Recent headway in the domains of mobile communication and ubiquitous computing has given surge of interest to mobile commerce applications. Current information systems promote concept of information service provision to anyone, anytime and anywhere. Autonomous Decentralized Community System has been proposed to meet the varying requirements of users. In this paper, the decentralized search service...
Wireless mobile grids are one of the emerging grid types, which help to pool the resources of several willing and cooperative mobile devices to resolve computationally intensive tasks. These tasks are more sensitive to processor availability than are to memory or bandwidth. The mobile grids exhibit stronger challenges like mobility management of devices, providing transparent access to grid resources,...
Collecting and analyzing massive mobility data from mobile network is becoming an emerging research topic in past years. It is proved to have great potential in lots of domains, e.g. intelligence traffic system, urban analysis, public safety etc. However, due to variety of data collection mechanisms, the data characteristics are various and need to be abstracted. In this paper, we outline the mobility...
Spatial alarms are considered as one of the basic capabilities in future mobile computing systems for enabling personalization of location-based services. In this paper, we propose a distributed architecture and a suite of safe region techniques for scalable processing of spatial alarms. We show that safe region-based processing enables resource optimal distribution of partial alarm processing tasks...
In recent years, the indoor positioning systems using the existing wireless local area network and Location fingerprinting schemes are the most popular system. The accuracy of the system is the most important indicator. In this paper we present experimental studies to emphasize on location error. Two experimentation stages are realized. The first one is based on selected reference points. The second...
A new anomaly detection system for mobile handsets has been proposed. In this system, software behavior that deviates from a model representing normal behavior is considered to be an anomaly. It is generally impossible to cover software behavior exhaustively by the model, which could adversely affect accuracy. In order to resolve this problem, the proposed system assesses the anomalousness of behavior...
This research proposes alternative methods for estimating degrees of road traffic congestion by using cell dwell time (CDT) information available from cellular networks. CDT is the duration that a cellular phone remains associated to a base station between handoff events. As a phone in a vehicle travels along a road having different degrees of congestion, the value of CDT varies accordingly. Measurements...
In a mobile service scenario, users query a server for nearby points of interest but they may not want to disclose their locations to the service. Intuitively, location privacy may be obtained at the cost of query performance and query accuracy. The challenge addressed is how to obtain the best possible performance, subjected to given requirements for location privacy and query accuracy. Existing...
This paper presents a distributed fermat-point range estimation strategy, which is important in the moving sensor localization applications. The fermat-point is defined as a point which minimizes the sum of distances from three sensors inside a triangle. This point is indeed at the trianglepsilas center of gravity. We solve the problems of large errors and poor performance in the bounding box algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.