The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information and Communication Technology (ICT) is one of the key enablers for including underserved communities in economic and societal development across the world. Our research analyzes several banking service projects developing technical solutions for rural India. This poster presents an experience report based on systematic debriefing of involved project leaders and initiators, triangulated...
Recent technological advances have accelerated the design and worldwide deployment of mobile payment systems (m-payment). However, m-payment over open devices and networks poses security challenges of a new dimension that users disclose lots of sensitive information and privacy can't be protected properly in open environment. In this paper, we propose a mobile payment architecture employing with trusted...
In this work, we present a brief report on a pilot project based on the concepts of Mobile Remote Experimentation (MRE). The project aims to provide an environment and a model using open source tools that can be replicated, since these are likely to re-use and have low cost, essential factors when it comes to public education, that allows students to perform laboratory practices remotely via mobile...
With the increasing needs for frequent instant communications, it becomes attractive to create an assistive device to facilitate software interaction. In this paper, we introduce a wearable communicating device featuring hands-free interaction. A prototype incorporating MCU, Bluetooth and App on mobile phone has been tested for feasibility and usability. Experimental results show that the proposed...
This paper shows a prototype software to ask and answer question in an interactive learning environment. The set of software is composed by an interactive web editor based on IMS-QTI specifications, an interactions player, and a web repository. The interactive web editor and the interaction player were designed to be used in smartphones, tablet or laptop. To build questions, the AquRate authoring...
Today security concerns are on the rise in all areas such as banks, governmental applications, healthcare industry, military organization, educational institutions, etc. Government organizations are setting standards, passing laws and forcing organizations and agencies to comply with these standards with noncompliance being met with wide-ranging consequences. There are several issues when it comes...
In the past years pervasive devices, especially mobile phones, have increased in complexity. Particularly the proliferation of features is tough to handle, not least because new features might require a hardware update or conflict with existing features. In order to overcome these issues we propose an approach which tackles the problem at an early development phase by increasing the semantic requirement...
Nowadays, applications must be provided for mobile devices with very different resources. In order to provide the user with a satisfying experience, some of the computation can be offloaded to a remote server. This paper presents an approach for this offloading process for remote data-gathering applications. The set of requirements to be fulfilled by the approach is identified and presented. This...
In this paper, we demonstrate the use of context-profiling for making access control decisions in mobile devices. In particular, we discuss the device locking use case, where the device locking timeout and unlocking method are dynamically decided based on the perceived safety of current context.
Recently, there has been a remarkable upsurge in activity surrounding the adoption of Personal Health Records (PHRs). Since PHRs contain global patient information and not certain pieces collected by individual healthcare providers, they can be used as basic infrastructures for building and operating several important systems for both healthcare and the tax payers. Emergency medical systems (EMS)...
Near Field Communication (NFC) has become widely available on smart phones. It helps users to intuitively establish communication between local devices. Accessing devices such as public terminals raises several security concerns in terms of confidentiality and trust. To overcome this issue, NFC can be used to leverage the trusted-computing protocol of remote attestation. In this paper, we propose...
Android is an open mobile phone platform. To accommodate value-added services such as selling wallpapers, ringtones, applications, and games on Android phones, it is essential to ensure copyright protection on these products. This paper studies how the Android source code to implement the Open Mobile Alliance (OMA) Digital Right Management (DRM) 1.0, software installation and protection. We also identify...
In recent years instant messaging tools have been successfully introduced to support communication and collaboration processes in work environments. Research suggests that the use of instant messaging tools lead to an increased feeling of connectedness, social presence and awareness within a collaborative group. Consequently, the goal of our research is to improve communication and collaboration within...
In this paper we will describe an open architecture for detecting earthquakes using the built in accelerometers available in some mobile phones. Although the idea of building a network of accelerometers for this application is not new, we will take an iterative approach starting with a prototype which exhibits some core functionality. Key questions include: what level of sophistication is required...
We report qualitative consumer field trials of a prototype digital memory device known as SenseCam. We presented SenseCam to 25 consumers in the US (N=9), Japan (N=8), and South Korea (N=8) to determine initial interest and expected use cases. This was followed by respondents using an actual prototype camera for approximately one week and reporting on their experience. Actual use cases differed substantially...
Mobile devices as the iPhone and Android-based smartphones can be turned into useful tools for researchers in the field. The concept of a scholarly or scientific workbench can be extended by a mobile usage scenario, where the researcher takes photographs, records sounds, and performs basic metadata editing. We present the prototype and the architecture of a mobile workbench that uploads geo-tagged...
Home networks are an increasingly popular platforms for the deployment of ICT solutions for common people. Universal Plug-and-Play has enabled the seamless connection of different home appliances and the services they offer. However, interconnecting home networks, e.g. among friends, in a way that is flexible, easy to deploy and use, and yet well controllable still remains a challenge. This paper...
The number of wireless LAN capable cellular phone models is rapidly increasing. This article studies the possibility to use WLAN capable cellular phone as driving aid in a highway environment. In this scenario the traffic signs are equipped with wireless transmitters to send traffic sign information, which is received and displayed by the WLAN capable mobile devices. Received information acts as a...
Anti-counterfeiting is a global problem. Brand owners suffer from huge losses due to counterfeits every year, and turn to advanced solutions to gain back control over their brands. An anti-counterfeiting system normally encodes a digital identifier in a physical identifier in essence. The physical identifier then is attached with the product. If the physical identifier is cloneable or reusable, the...
Today's mobile devices have inherited many of the characteristics of desktop computing -- including the assumptions that the user's full attention and dexterity can be focused on the interface. Unfortunately, on-the-go users are impaired by their mobility and often find desktop-style Windows Icon Menu and Pointer (WIMP) interfaces difficult, if not impossible, to use while performing their primary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.