The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
More email is opened on mobile devices today than on other platforms [1]. At the same time, enterprises are constantly investing in approaches to improve employee productivity. In this paper, we consider the problem of automated information suggestions to assist in reply construction. The basic premise of the work is that a significant portion of the information content of a reply is likely to be...
In today's always-connected world, we receive a large number of notifications on our mobile devices. These notifications cause interruptions, stress, and even impact users' lifestyle. To understand how users respond to notifications, we develop an application that monitors various features (e.g., importance) of the notifications, users' actions, and the level of users' engagement with the notifications...
Given a current point, a final destination, and visiting data point categories on a trip, a sequenced route query finds the shortest route which meets the query condition. Several algorithms have been proposed targeting to this query. When this query is used in real applications, the popularity of the visiting points (for example, restaurant, shopping center, etc.) in a trip are also important besides...
While wearable devices have been the buzzword inthese days, they are still in the infant market stage. Thoughdemand for wearable devices has skyrocketed, the early abandonmentof devices become an important issue. Many studiesexamine the usage of wearable devices with user survey. However,it is essential to look at the real behavior of wearable users howand why wearable users enjoy or abandon devices...
Satellite transmission based on IP may play important role for communication between event site and PPDR centers during large planned scenarios and disaster/unplanned ones. Geostationary SATCOM links that can be installed ad-hoc in any location present reliable and efficient way to transmit IP data even for voice communication based on VoIP. Using different mechanisms that handle multi connections...
Recently, there has been growing interest in indoor localization, because numerous applications depend on the rapid and accurate position estimation of tagged objects. While RFID-based indoor localization is attractive, the need for a large-scale and high-density deployment of readers and reference tags is costly. Being the range-free localization, our schemes depend solely on mobile readers without...
In the immediate aftermath of a natural disaster, network infrastructure is likely to have suffered severe damages that challenge normal communications. In addition to that, traffic substantially increases as a result of people attempting to get in touch with friends, relatives or the rescue teams. To address such requirements of a challenged network, we propose a communication framework based on...
In this paper we focus on the problem of dynamic event coverage. We assume that no knowledge about either event position or duration is given a priori. Nonetheless, the events need to be monitored and covered thanks to mobile wireless sensors. Thus, mobile sensors have to discover the events and move towards a new Zone of Interest (ZoI) when the previous monitored event is over. An efficient, distributed...
In order to be always best connected for various applications, the network selection procedure, in heterogeneous multi-access environment during vertical handover decision is intended to choose the most appropriate time and the most suitable network for mobile user. This paper addresses this difficulty by adopting multi attribute decision making methods(MADM). A classification method is initialy applied...
Compression enables communicating information with a smaller amount of data and, in some cases, also saves energy in mobile environments. In order to achieve this we formalize conditions for energy efficient compression. In a basic compression case the condition is ec/(1-C) ≤ Eb. It defines compression to be efficient, if the compression energy cost for the gained compression on the left hand side...
The paper develops a home security system that is equipped with RS-232, security module, appliance control module, Ethernet and mobile communication. The supervised computer can control the security module, appliance control module and small robots using RF interface. The controllers of these modules are HOLTECK chip. The user can supervised the security system using cell phone or PDA through GSM...
The power consumption and the matching will be the principal issues at the 32 nm node and below. In this context, Ultra-Thin Body devices are extensively studied for the end-of-roadmap CMOS. In this paper we present the SON technology, leading to the simple fabrication of sustained mono-Si nano-membranes over an empty tunnel, and discuss on the application of this process to build-up electronic devices...
We consider data-streaming from an access point to multiple receivers, which is modeled as packet erasure channel. A simple network coding is shown to achieve larger rate region than without network coding, using minimal control information. The performance is characterized exactly using state transition graph. The scheme is then mapped to an information theoretic formulation for broadcast channel...
Image segmentation is the key step from image processing to image analysis. Ostu thresholding, which features a good performance, is one of the main image threshold segmentation methods. Like other threshold methods, the application of the Otsu has been restricted for the long-paying computation. In order to overcome the disadvantages and get better results, a new method based on quantum particle...
Task trees are common notations used to describe the interaction between a user and an interactive application. Thus, they contain valuable information about the expected user behaviour. In this paper, we present a method for automatically generating test data from a task tree. The task tree is extended to support operational profile specification. The user behaviour is automatically extracted as...
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
This paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (PHY) layer, media access control (MAC) layer and network (NET) layer into consideration. This paper reviews the entire network optimization across all the PHY/MAC/NET layers. At the PHY...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.