The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Long Term Evolution Advanced (LTE-Advanced) networks have problems of low data rate for cell-edge users, as well as coverage gaps. Contemporary communication standards use different techniques to deal with these problems; one candidate technique is called Coordinated Multi-Point (CoMP). In this context, we introduce Shared Segmented Upload (SSU), a novel method for uploading large files from a UE...
Policy-based management is a flexible approach for the management of networks as policies make context-sensitive and automated decisions. For their effective development it is desired to specify policies at a high level of abstraction initially and to refine them until they are represented in a machine-executable way. We present an approach that uses models to specify event-condition-action (ECA)...
Due to the resource limitations of mobile devices, it is difficult to run complex applications on the devices. To overcome the limitation, we adopt the concept of service-based mobile applications (SMAs) where some functionality is off loaded or provided as a service. Due to the complex nature of SMA architectures, it is challenging to design and implement efficient SMA. Hence, there is a demand for...
The domain of mobile and context-aware applications involves challenging requirements, such as mobility and adaptation, which makes the application development complex for this area. Considering this scenario, we used a nested software product line (SPL) that aims to facilitate the construction of such software by domain decomposition in two levels of analysis. The first concerns the characteristics...
Modeling of complex and computationally intense applications supported by modern mobile devices via standard modeling languages is a challenging task. Within the GENESYS process model the application modeling phase is thus of key importance. GENESYS manages complexity by employing cross domain and platform-based application design. The main contribution of this article is to describe the instantiation...
Mobile learning (M-learning) is getting famous as a method of giving learners study materials at anytime and anywhere. In providing “at anytime and anywhere” way of study, there are various architectures and Unified Modeling Languages (UML) models that have been introduced by the developers. This paper presents a study of the architectures and the UML models that are designed by the developers for...
This paper uses mobile agents to solve the problems of temporary disconnection and device heterogeneity in wireless network. A four tiers mobile agent based architecture is introduced in wireless network. The four tiers are: presentation tier, agent platform tier, business logic tier and data tier. Experiments show that mobile agents are an effective method to face the problem of temporal network...
While new competitors are threatening the traditional business models of Telecommunications operators by providing their services directly to the customer, user-centric service creation paradigm brings new opportunities for operators to deliver diverse, attractive, and profitable services directly to the end-user. This paper discusses the service creation model, architecture and implementation in...
The following topics are dealt with: computer and information science; agent-based system; artificial intelligence; communication systems and network; computer architecture; VLSI; computer security; data mining; knowledge discovery; database, data warehousing and data engineering; distributed and parallel computing; image processing and pattern recognition; intelligent control systems; Internet; mobile...
Modern mobile devices support diverse applications that are enabled by rapid increase of computational power of mobile platforms. A brisk performance evaluation phase is required after the application modelling to evaluate feasibility of new applications on the platform. GENESYS modelling methodology employing service-oriented component based application design has been extended for this purpose such...
In the EDBMGIS (Embedded Database Based Mobile Geospatial Information Service) architecture application, the data of embedded database in the mobile terminal is duplicated from the server. After a period's system operation, data in both the mobile client and server will be changed. In order to keep the data consistency, the synchronization of data on both side is discussed in this paper. In addition,...
Micro-mobility protocols aim to improve localized mobility by reducing the handover overhead. The mobility plane architecture (MPA) was designed to support micro-mobility in standard IP or MPLS/GMPLS networks in a network-centric way: that is, the burden demanded by micro-mobility is placed on the network, not on the mobile nodes. The aim of this paper is to present some insights on performance evaluation...
The paper describes a generic service-oriented and agent-based approach for the development of eLearning intelligent system architectures providing mobile access to electronic services (eServices) and electronic content (eContent) for users equipped with wireless devices, via a set of infoStations deployed in key points around a University Campus. The approach adopts the ideas suggested by the MDA...
Mobile communication systems are increasingly used in companies. In order to make these applications secure, the security analysis has to be an integral part of the system design and IT management process for such mobile communication systems. This work presents the experiences and results from the security analysis of a mobile system architecture at a large German telecommunications company, by making...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.