The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a topic-based method to reflect calls and proximities simultaneously into finding interaction patterns from a mobile log. For this purpose, the proposed method regards calls and proximities as a homogeneous information type that are drawn from the same temporal space expressed by the same distribution, but with different parameters. The number of proximities in a mobile log usually...
Two crucial issues to the success of participatory sensing are (a) how to incentivize the large crowd of mobile users to participate and (b) how to ensure the sensing data to be trustworthy. While they are traditionally being studied separately in the literature, this paper proposes a Simple Endorsement Web (SEW) to address both issues in a synergistic manner. The key idea is (a) introducing a social...
With the popularity of bandwidth-intensive mobile applications and mobile devices, the data traffic is increasing fast nowadays. This poses huge burden to the Internet service providers (ISPs) to support such wireless data traffic as they need to invest on developing advance networks, e.g., 4G, or expending the capacity of the current networks in a much faster pace. One way to keep up financing such...
This paper studies a monopoly telecom operator's decision on the adoption of shared data plans. A shared data plan allows sharing data quota among multiple devices or users, while conventional single device data plans only allow the use of a single device. We devise analytical models and compare a simple shared data plan (also called bundling pricing) to single device data plans (also called partitioned...
Machine-to-Machine (M2M) communications is a topic of great importance that maintains an ongoing interest in the academic community and in countless industries and services. Technological advances allow the successful deployment of particular solutions but many potential applications still face limitations that prevent them from happening. This paper compares data collected from five implementation...
In order to achieve a clear purpose of value chain model, we sort out a number of factors, such as its participants, structure and mechanism, which influence mobile e-commerce value chain. This study applies and extends the value chain theory of Porter, and reconstructs it into two parts, the basic value chain (the value chain to achieve the conditions of mobile commerce) and supporting value chain...
Developing an adequate network architecture for supporting data communications in vehicular networks is critical to overcome the challenges caused by highly dynamic network topology, connectivity disruption, and intermittent connectivity issues. Among several approaches available in the related literature to address these problems, vehicular delay-tolerant networks (VDTNs) appear as a recent and innovative...
Delivering power efficiently to advanced technology VLSI is a top challenge and priority for mobile platforms. In addition, nearly 50% of the real estate on a typical mobile platform, such as a handheld, is used to convert power to the low voltages required by the advanced technology. This is so because as voltage continues to scale down with technology, the tolerances required by these circuits for...
In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value...
With loss aversion and game theory as research tools, this paper investigates deeply on price competition behavior between mobile commerce retailers (MCR) and traditional off-line retailers (TOR) in m-commerce era, elicits 2 kinds of market structures. Furthermore, it gives out perfect equilibrium prices as well as market scale under each condition of market structure. On this basis, two related propositions...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
This paper presents a mechanism to evaluate fault-tolerant WiFi network performance in a mobile environment. Fault-tolerance at the access point (AP) level is presented in a degraded performance mode. In case of an access point (AP) failure the surrounding APs increase their power to compensate for this failure. Mobile IPv6 is used as mobile protocol for the moving entities. A new metric is introduced...
This correspondence demonstrates the significant gains that multiple-access users can achieve from sharing a single amplify-forward relay in slow-fading environments. The proposed protocol, namely, multiple-access amplify-forward (MAF), allows for a low-complexity relay and achieves the optimal diversity-multiplexing tradeoff (DMT) at high multiplexing gains. Analysis of the protocol further reveals...
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.