The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The advances in technologies of cloud computing and mobile computing enable the newly emerging mobile cloud computing paradigm. Three approaches have been proposed for mobile cloud applications: 1) extending the access to cloud services to mobile devices; 2) enabling mobile devices to work collaboratively as cloud resource providers; 3) augmenting the execution of mobile applications on portable devices...
Mobile devices such as netbooks, smartphones, and tablets have made computing ubiquitous. However, such battery powered devices often have limited computing power for the benefit of an extended runtime. Nevertheless, despite the reduced processing power, users expect to perform the same types of operations as they could do using their desktop or laptop computers. We address mobile devices's lack of...
Due to the growing of business market, there is an increasing need to enhance the connectivity of the market and provide a flexible tool which allows fast access. Mobile application can provide such type of accessibility. A mobile with the necessary applications connected with a wireless internet gives the user the required connectivity. Although hardware processing capabilities of the mobile might...
In trust-based models for MANETs, it is often assumed that the trust value between two nodes decays proportional to the time these nodes are out of transmission range of each other. We present in this paper an analysis of the trust decay rate for some general networking and trust computation models. Our analysis allows for the consideration of the subjective trust values assigned by present and past...
Hierarchical Mobile IPv6 (HMIPv6) was proposed by Internet Engineering Task Force (IETF) to reduce signalling cost by localising the mobility signalling traffic of Mobile Nodes (MNs). However, certain MNs still generate excessive signalling overhead, due to their ping pong movement at borders of different Mobility Anchor Point (MAP) domains. In this paper, an algorithm is proposed, to effectively...
Groups of people with mobile phones using short range connections like WiFi and Bluetooth to propagate messages can be modeled as, with regard to regular absence of end-to-end connection, Delay Tolerant Networks (DTNs). The study of message transmission speed in such kind of networks has attracted increasing attention in recent years. In this paper, we present a realistic framework to model the message...
The quick evolution in computing platforms represents an ongoing cat-and-mouse game with the techniques we can build to measure and analyze them. Where performance used to be the dominant metric to measure, current tools and techniques must also accurately estimate power, error resiliency, and other attributes. Furthermore, the trajectory towards extensive, dynamic, and heterogeneous parallelism make...
Large scale experimentation and analysis of mobile ad-hoc networks (MANETs) is an expensive and time consuming task. Even with the best planning, the environment at the time of the experiment is unpredictable, making large scale controlled experiments difficult to impossible to perform. At the U.S. Army Research Laboratory (ARL) we are using the EMANE (Extensible Mobile Ad-hoc Network Emulation) environment...
In this paper, we address a important and still unanswered question in mobile cloud computing "how mobility impacts the distributed processing power of network and computing clouds formed from mobile ad-hoc networks ?". Indeed, mobile ad-hoc networks potentially offer an aggregate cloud of resources delivering collectively processing, storage and networking resources. We demonstrate that...
First, we observe that several analyses of two-dimensional (2-D) broadcast ad hoc networks, such as hidden (exposed) terminal analysis and multi-hop broadcast coverage etc., require computation of an extended coverge area. The coverage area computation is not straightforward or trivial given nodes distributed in a 2-D area. In this paper, we define and formulate a geometric two-dimensional coverage...
In location-based services (LBSs), the service is provided based on the users' locations through location determination and mobility realization. Several location prediction models have been proposed to enhance and increase the relevance of the information retrieved by users of mobile information systems, but none of them studied the relationship between accuracy rate of prediction and the performance...
It is challenging to react to dynamically changing of network topology for routing schemes in Delay Tolerant Networks (DTNs). The main concern about routing in DTNs is to minimize delivery delay while maintaining low overhead. In this paper, we propose a DTN routing scheme Density-Aware Message Spraying (DAMS). The scheme is based on the idea of exploiting spatial node distribution and encounter history...
Wireless networks growing popularity coupled with a wide availability of wireless-enabled personal devices is today the basis for user-centric Internet architectures to evolve. Central to this new paradigm of user-centricity is the fact that today the Internet end-user exhibits a highly nomadic behavior, where most of the portable devices are carried by humans. The thesis proposed relates to the recent...
Due to the increase in the number of users in mobile communications networks, the minimization of the signaling costs associated with the roaming of the users throughout the coverage area has become a key research topic. In this sense, several algorithms have been proposed in recent years for location management, with the timer-based method achieving an excellent trade-off in terms of performance...
One of the challenging problems in mobility modeling on Mobile Ad-hoc NETworks (MANET) is reproducing real motion of mobile nodes. First mobility models were mostly random or with some dependencies (temporal, spatial, geographical,…) but they didn't care about the need of people to socialize with each other. The social behavior of users must not be neglected since it directs the motion of nodes in...
In this paper we present a new positioning algorithm, called Orbit, for mobile sensor networks. The algorithm runs in a fully distributed manner at all nodes. The information available to the algorithm is the radio range of the sensors and, the latest location estimates of neighbours and neighbours of neighbours. The algorithm has several novel aspects. First, we use geometric structures and results...
Employees are becoming increasingly aware of the wealth of functionality available using smartphone computing; they fall hopelessly short in the awareness of the associated organisational information security risks associated with smartphone computing. Existing security measures are not adequately adapted for the risks introduced through smartphone usage. Therefore, there exists a need to apply principles...
Two recent trends are major motivators for service component migration: the upcoming use of cloud-based services and the increasing number of mobile users accessing Internet-based services via wireless networks. While cloud-based services target the vision of Software as a Service, where services are ubiquitously available, mobile use leads to varying connectivity properties. In spite of temporary...
Key management scheme is a critical issue of Mobile Ad hoc Networks (MANETs). Malicious nodes may attack the legitimate nodes by eavesdropping. Data encryption is a solution to resolve this problem. Due to the restricted energy and computational capability of MANETs, it's necessary to design a lightweight and storage efficient key management scheme. In this paper, we propose a hop-by-hop authentication...
Today's computationally able mobile devices are capable of acting as service providers as opposed to their traditional role as consumers. To address the challenges associated with the development of these mobile services, we have developed Odin, a middleware which masks complexity, allowing rapid development of mobile services. Odin, however, does not allow cross-platform development, which is an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.