The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of malware behavior in networks to date. In this paper, we investigate how malware propagates in networks from a global perspective. We formulate the problem, and establish a rigorous two layer epidemic model for malware propagation from network to network. Based on the proposed...
Mobile applications are widely used in many research areas as well as in current daily life. Applications on smart phones are closely related to the physical device. An application may run differently on different mobiles. It is hard and expensive for college students to adapt and test their applications on several types of smart phones. This paper presents a work in progress on the development of...
Skyline queries are useful in decision making applications. Skyline queries in highly mobile distributed environments have attracted many attentions recently due to the development of mobile internet device. The properties of distributed computing make skyline queries more complicated especially in any subspace. Conventional skyline algorithms do not support subspace skyline queries in distributed...
In service-oriented mobile social networks (S-MSN), many location-based services are developed to provide various applications to social participants. Services can in turn be composed with the help of these participants. However, the composite structure, the subjective interpretation of trust demand, and the opportunistic connectivity make service composition a challenging task in S-MSN. In this paper,...
This paper examines mobile applications classification models and the methods applied within the field of mobile human-computer interaction. Recent smartphone interfaces demonstrated the existence of usability problems with respect to the mobile apps in terms of accessing these apps after being downloaded by the user. This paper suggests three different approaches for intelligent classification of...
Personal Communication Services refers to a wide variety of wireless access and personal Mobility Services provided through a smaller terminal with the goal of enabling communication with a person at any time, at any place, and in any form. More and More Smart Phones compact in size, lightweight, OLED devised, high-resolution touchscreens, engineered with various mobile operating system such as google's...
In this paper, we present a mobile-device level approach to estimating the network data (traffic) that is generated over time. While efforts oftentime utilize complex approaches, our model captures the main characteristics in the time and data domains of a high utilization application class as Hidden Markov Model while modeling the remaining applications' characteristics in form of a simple background...
Nowadays, smart devices have excellent computing power and connectivity and at the same time are used for various purposes. This creates the possibility for complex, cooperative multi-device programs. However, current programming paradigms are not tailored for such a setting. This paper tackles the problem by introducing a new paradigm: an action-oriented programming model. Actions are proactively...
This paper addresses the problem of tactical planning of mobile whole blood collection in a region in order to guarantee the regional self-sufficiency over a yearly planning horizon. Two MILP models (Mixed integer linear programming) are proposed is to determine when a mobile collection must be organized at a location by taking into account human resource capacity, stock level and regulation constraints...
This paper presents a labeled transition system (LTS) for mobile ambients. We define labels for transitions using contexts of processes. We present a set of rules that derives transitions with contextual labels. We define bisimulation equivalence relation based on the LTS. We also show that the bisimulation equivalence is a congruence relation.
Numerous studies have proposed and implemented various innovative designs of collaborative mobile learning practices, and several pedagogical affordances of mobile technologies in different subject domains have also been suggested. This study follows a proposed innovative design notion in prior study and elaborates on its design challenges and learning effects. The proposed design notion, interwoven...
In the increasingly intense competitive environment, how to improve their service quality, enhance customer satisfaction, had become the Mobile, Unicom and Telecommunications urgently problem needed to be solved. Through to the domestic and foreign scholars about the various areas of customer satisfaction research, this paper try to construct suitable for measurement of mobile operators customer satisfaction...
Based on studying the characteristics of topology and business model of wireless mesh networks, depth analysis of the suitable routing protocol type for WMN was given out which shows that proactive hop-by-hop routing is most suitable for WMN. On the basis of Optimized Link State Routing which is a typical proactive hop-by-hop routing protocol. A routing protocol P-OLSR of perceptive 1inks is proposed...
There is an exponential increase in the demand for the online-only courses and this demand is recorded by several higher educational institutions. E-learning using traditional computing is not a sufficient solution against this voluminous demand of learning content sharing. It requires large storage space and the overhead of a high speed network infrastructure. Cloud computing is the composition of...
Skill level estimation is very important since it allows an instructor, a human or an artificial instructor through an intelligent tutoring system, to predict the level of a student and adjust the learning materials accordingly. In this paper, a new approach based on 1-NN (First Nearest Neighbor) is introduced to determine the skill level of a student based on the pattern of skill levels learned over...
In this paper, we built a behavior model for the Ubiquitous Display (UD) to provide a situation oriented service to the users in a large-scale public facility. The UD is a mobile-projection robot to support the user with visual information. If the UD provides a service in a public facility, we should assume the possible situations previously. According to the situation, the model should be built in...
In this paper, we first introduced Web services and its model. In Web services, Web data plays an important role. And then, we introduced the inspiration of mobile ambients. It comes from the potential for mobile computation over the World-Wide Web. Finally, we present a model of mobility with data, which features Web data, hyperlinks and scripts. We gave the structural congruence and subject reduction.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.