Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In service-oriented mobile social networks (S-MSN), many location-based services are developed to provide various applications to social participants. Services can in turn be composed with the help of these participants. However, the composite structure, the subjective interpretation of trust demand, and the opportunistic connectivity make service composition a challenging task in S-MSN. In this paper,...
This paper considers mobile bionanosensor networks designed for target tracking in molecular environments. The mobile bionanosensor network considered in this paper consists of nano-to-microscale bio-nanomachines that coordinate their activity by propagating the two types of signaling molecules: attractants for a group of bio-nanomachines to move toward targets, and repellents to spread over the environment...
The fundamental goal of education and training is to provide capabilities that can help humans improve performance and accelerate decision-making. Advances in mobile computing (e.g., sensor technology, context aware computing, and cloud computing) allow for the design of systems that goes beyond the traditional methods of simulation training to support adaptive learning. The focus of this paper will...
This paper present correlated hazard function in multivariate network survival analysis in MANETS. Correlated hazard function is an extended hazard function in Cox model to capture correlated events. The function takes correlated degree as a covariate to measure the effect of correlated node behavior and describe the relationship between correlated degree and survival times. The covariates analysis...
This paper presents a simple broadcast algorithm suited to dynamic systems where links can repeatedly appear and disappear. The algorithm is proved correct and a simple improvement is introduced, that reduces the number and the size of control messages. As it extends in a simple way a classical network traversal algorithm to the dynamic context, the proposed algorithm has also pedagogical flavor.
Viruses and malwares spread around mobile networks with the rapid growth of smart cell phone users. In a mobile network, viruses and malwares can cause privacy data leakage and remote listening. Additionally, they can jam wireless servers by sending thousands of spam messages or track user location through GPS. Because of the potential damage of mobile viruses, it is important for us to gain a profound...
Generally a Vehicular Ad-hoc Network (VANET) is considered with vehicles being the resource consumers. The other way of looking at it is arguably the vehicles as resource providers. From this we put forward the concept of vehicular network managed cloud or simply a Vehicular Cloud where the on-road safety services and the like can be assisted using In-Vehicle resources. Because of the distinct features...
The concept of cloud computing is based on the time-sharing of costly resources and advantages of the economies of scale. Cloud computing applies conventional supercomputing, or high-performance computing power, to perform computations in consumer-oriented applications. It is a result of exploring ways and means to ensure availability of computing power to users through sharing of resources and algorithms...
In this paper, we present a mobile-device level approach to estimating the network data (traffic) that is generated over time. While efforts oftentime utilize complex approaches, our model captures the main characteristics in the time and data domains of a high utilization application class as Hidden Markov Model while modeling the remaining applications' characteristics in form of a simple background...
The increased availability of free telematics smartphone applications is expected to lead to greater consumer usage. Telematics services require that servers and consumer devices, such as smartphones and car navigation terminals, transmit large amounts of different types of data via uplink and downlink. One of the most significant issues in this area is finding methods to reduce the volume of data...
In modern networks, consumers are becoming more and more demanding in terms of the services they require. To explore future technologies in order to bring improvements in the entire network infrastructure has pushed the limits of energy efficiency which leads to Green Communication. At the same time, the demand for higher data rates and the ever-increasing number of wireless users led to rapid increase...
We propose a topic model to better estimate activities from tweets. The whole estimation process consists of two phases: one is the cluster generation, and the other is the activity estimation. At the first phase, we obtain the expected trilayer clusters with the components: a topic layer, an activity layer and a word layer. Then, at the second phase, we utilize the activity-specific word distribution...
As mobile cloud computing applications are becoming widely used to mitigate the limitations of mobile devices and exploit cloud services, testing these applications becomes critical. Testing mobile cloud application is complicated further due to dynamic assign of cloud resource to applications that run on mobile devices, due to the increased multiple factors in test case generations and execution...
The idea of sharing caches among neighboring nodes is an important technique to improve data access efficiency in mobile ad hoc networks. This paper introduces a new coordinated cache data placement scheme combined with cache replacement ideally suited for mobile host with limited memory. In particular, we propose a coordinated data placement scheme that eliminates redundant data stored in multiple...
Reputation is considered to be an important aspect for enabling reliable data communication among the mobile nodes present in a multihop network like mobile ad hoc network. But, the presence of the selfish nodes could wreak considerable damage to the network performance. Reputation based models were mainly formulated for enforcing cooperation and at the same time for punishing misbehaving nodes like...
Thermoelectric (TE) energy harvesting is investigated in this study for compact mobile computers. A suitable hotspot is identified for TE integration based on thermal modeling and characterization of a target system. Under maximum workload conditions, 0.410 mW of electrical power is thermoelectrically harvested without any notable degradation in performance. An enhancement to the system thermal design...
The increasing use of wireless Internet and smartphone has accelerated the need for widespread computing. Smartphones stimulate growth of Global Position Systems (GPS) and mobile cloud computing. Mobile cloud computing is the cloud infrastructure where the computation and storage are moved away from mobile devices. However, smartphone mobile computing poses challenges because of the limited battery...
Mobile Cloud Computing (MCC) has been introduced as a viable solution to the inherited limitations of mobile computing. These limitations include battery lifetime, processing power, and storage capacity. By using MCC, the processing and the storage of intensive mobile device jobs will take place in the cloud system and the results will be returned to the mobile device. This will reduce the required...
We present the use of DEVS and Cell-DEVS formalisms to model different approaches in networking applications. We discuss various applications of discrete event system specifications for modeling and simulation of Wireless networks and Wireless Sensor Networks (WSN). We discuss how to use the Cell-DEVS formalism to model a WSN for investigating on stochastic properties of malware propagation and the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.