The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile device features such as camera and other sensors are evolving rapidly nowadays. Supported by a reliable communications network, it raises new methods in information retrieval. Mobile devices can capture an image with its camera and pass it to the retrieval systems to get the information needed. This system, called Mobile Content-Based Image Retrieval (MCBIR), generally consists of two parts:...
Achieving high QoE for AR applications on a mobile device is challenging because the required advanced computer vision and machine learning algorithms are computationally intensive by nature. Hence, some task for AR applications must be offloaded to more powerful remote servers. Offloading for mobile applications remains an active area of research. In the context of mobile AR applications which requires...
It is standard practice in enterprises to analyze large amounts of logs to detect software failures and malicious behaviors. Mobile applications pose a major challenge to centralized monitoring as network and storage limitations prevent fine-grained logs to be stored and transferred for off-line analysis. In this paper we introduce EMMA, a framework for automatic anomaly detection that enables security...
Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral...
Revisiting Mahadev Satyanarayanan's original vision of cyber foraging and reflecting on the last 15 years of related research, the authors discuss the major accomplishments achieved as well as remaining challenges. They also look to current and future applications that could provide compelling application scenarios for making cyber foraging a widely deployed technology. This article is part of a special...
Although personal health record (PHR) systems are widely used in the developed world, little has been done to explore the utility of these PHR systems in the developing world. One of the key reasons behind this is the fact that a lot of areas in the developing world suffer from technological impediments that are a result of poor infrastructure, low literacy, intermittent power connectivity, and unstable...
In the past years the progress on the mobile market has made possible an advancement in terms of telemedicine systems and definition of systems for monitoring chronic illnesses. The distribution of mobile devices in developed countries is increasing. Many of these devices are equipped with wireless standards including Bluetooth and the amount of sold Smartphones is constantly increasing. Our approach...
When playing a game, the user expects an easy and intuitive interaction. Current controllers are physical hardware components with a default number, size and position of buttons. While in some cases a game uses a few controllers buttons, in others it requires all buttons and even a combination of them. Besides that, the use of few buttons in a physical controller (i.e. controllers that can't change...
We consider a mobile replicated database that consists of several mobile nodes, each containing a replicated copy of a common database. The nodes are interconnected through a wireless network along with a fixed server which retains the primary copy of the database. In this work, we have proposed an efficient database synchronization algorithm — Mobile Replicated Database Management Synchronization...
The current mobile application distribution model cannot cope with the complex security requirements of the emerging "bring your own device" (BYOD) paradigm. A secure metamarket architecture supports the definition and enforcement of BYOD policies and offers a promising prototype implementation tested under realistic conditions. The Web extra at http://youtu.be/0hEJoGhzczs is a video slideshow...
Mobile cloud gaming provides a whole new service model for the video game industry to overcome the intrinsic restrictions of mobile devices and piracy issues. However, the diversity of end-user devices and frequent changes in network quality of service and cloud responses result in unstable Quality of Experience (QoE) for game players. A cognitive cloud gaming platform, which could overcome the above...
Mobile phone is the most widely used portable device. Every mobile phone user can conveniently communicate with each other through SMS (Short Message Service) at very low price. It is so commonly used that, in some countries like China, an SMS culture has emerged. Although there are some SMS based applications in m-Learning, most of them are only for administrative purposes, like delivering messages...
An agile, lightweight, but secure extensible hybrid application container and deployment mechanism for mobile devices has the potential to provide improved cross platform support, reduced development lifecycle time and a consistent application security model within large organizations. We demonstrate how such an architecture can provide a set of security and mobile device management interfaces to...
For the frequent disconnection, low bandwidth, high latency in wireless computing environment and other characteristics of mobile handheld devices such as resourceconstrained, we analyze the limitations of the current three mobile J2ME Web Service integration schemes. By means of extending agent theory and its expanded functions, a new three layers mobile web service integrate scheme based on it is...
The modern mobile ubiquitous computing environment, with reasonable connectivity, processing power and sensing capabilities on portable devices, present applications and services with the opportunity to be truly context-aware. But building context-aware applications has large development overheads due to complexities of sensing, aggregating and inferencing context information. To reduce the developers'...
Nowadays, applications must be provided for mobile devices with very different resources. In order to provide the user with a satisfying experience, some of the computation can be offloaded to a remote server. This paper presents an approach for this offloading process for remote data-gathering applications. The set of requirements to be fulfilled by the approach is identified and presented. This...
Self-reporting patient data are valuable feedback for medical treatment and care process, as well as for clinical trial studies and support of medical treatment. However, traditional paper-based medical patient longitudinal surveys or questionnaires for health and well-being status information are time- and cost-consuming, and may suffer from low patient compliance. Consequently, an NFC-based electronic...
NFC technology can be integrated into existing systems to simplify and speed up the process of monitoring and control of these systems. In this paper we address a problem pertaining to the complexity of the monitoring and control of sensor or measurement equipment. Manual monitoring of measurement systems can be a tedious endeavor, especially in systems where the measurements are numerous and at regular...
Nowadays it is common practice to handle any type of file with the personal computer. The introduction of mobile devices in modern life opened the doors to the possibility to do that ubiquitously, fostering a vast plethora of new entertainment applications. Unfortunately, the storage capacity of these devices is limited; it may hence be useful to have the possibility to store the files on the web...
The “Web of Things” vision promotes the integration of smart devices into web, using web technologies and protocols as underlying interaction mechanisms with smart devices. Technically many phones include various sensors and provide a large-scale sensing platform. To make this functionality available to a large number of (web) developers our research aims at easing the creation of applications that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.