The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By processing sensory data in the vicinity of its generation, edge computing reduces latency, improves responsiveness, and saves network bandwidth in data-intensive applications. However, existing edge computing solutions operate under the assumption that the edge infrastructure will comprise a set of pre-deployed, custom-configured computing devices, connected by a reliable local network. Although...
Mobile devices often operate in resource constrained envi- ronments with intermittent connectivity, bandwidth, bat- tery power, etc. On these devices, existing cooperative con- tent sharing protocols and models (e.g. Peer to Peer and client-server) present major drawbacks. Presently, a user has to maintain the connection between the peers when down- loading content. For instance, when a large multimedia...
With the rapid development of portable mobile devices, crowd sensing systems have been recognized as a key technology to utilize the data collected by the portable mobile devices towards scalable and flexible mobile services. However, since the information provided by devices may not be reliable, the aggregated results of the collected data may not be accurate. To tackle this challenge, various truth...
Access to information is predicated on the access to a digital infrastructure. However, access to electricity and the Internet remain elusive for a significant percentage of the world's population, let alone a sustainable access in one’s local language, local context, and relating to local culture. This paper examines the issues of resource constraints, and proposes a framework to classify them. It...
With the advancement of sensor-embedded mobile electronic devices, participatory sensing has attracted more and more attention because it can collect data, analyze information and outsource tasks to those devices' users. However, range query results obtained at the requesters and dissemination data produced at the providers are usually sensitive and private to be disclosed, e.g., users' locations,...
Mobile cloud computing has dual benefits that includes cloud computing and mobile computing. In mobile cloud computing data storage and data processing take place outside the mobile device. As a result, there is a high chance of security attack. The security even becomes more critical when mobile phone is initiating the handoff during handover management process. Thus, the attacker may easily get...
We envision a future where real-time computation on the battlefield provides the tactical advantage to an Army over its adversary. The ability to collect and process large amounts of data to provide actionable information to soldiers will greatly enhance their situational awareness. Our vision is based on the observation that the U.S. Military is attempting to equip soldiers with smartphones. While...
The paper describes architecture of a prototype networked student information delivery system. Main system functionalities include interactive access to lecture room timetables and group messaging. The system exploits modern mobile technologies to allow flexible usage scenarios. The use of open APIs of telecommunications service delivery platforms in combination with e-mail messaging provides diverse...
The emergence of mobile P2P systems is largely due to the evolution of mobile devices into powerful information processing units. The relatively structured context that results from the mapping of mobile patterns of behaviour onto P2P models is however constrained by the vulnerabilities of P2P networks and the inherent limitations of mobile devices. Whilst the implementation of P2P models gives rise...
Information communication technology in IT field is being united with technologies in many other fields. Even the medical field was united with IT technology, thereby having allowed new technology called Ubiquitous Health System to appear. As the U-health system, which is being served now, is in the early stage, it relies upon sensor equipment of checking patient's condition, and is using a coping...
Usability and user interfaces play a huge and important role in todaypsilas mobile application. Besides a good design, acceptable performance, scalability, and robustness, a mobile application needs to be easy to use and, to some extent, customizable. To create a system able to custom the mobile applicationpsilas user interface and mirror it immediately to final users is the purpose of this article...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.