The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advent of powerful and inexpensive sensing technology the ability to study human behaviour and activity at large scale and for long periods is becoming a firm reality. Wearables and mobile devices further allow the continuous physical colocation with the users. This reality generates new challenges but also opens the door to potentially innovative ways of understanding our daily lives. In...
In this keynote, we look the fundamental limits of the information propagation speed in large scale mobile and intermittently connected networks, where end-to-end multihop paths may not exist and communication routes may only be available through time and mobility. We first introduce some analytical tools to derive generic theoretical bounds for the information propagation speed in this networks....
Crowdsourcing offers a cost-effective approach to distributed problem solving and data collection by soliciting contributions (solutions, ideas, data, etc.) from a large group of people. Recently, due to the burgeoning smartphone industry and the surging demand for sensing data, a new mobile computing and sensing paradigm called mobile crowdsensing has emerged and has created significant momentum...
This keynote presentation will highlight the unique research issues and challenges in the emerging field of smart living and cyber-physical-social systems, and also discuss novel solutions to address some of these challenges. The proposed solutions will be based on a rich set of theoretical and practical design principles, such as situational-aware data collection and fusion algorithms, uncertainty...
This paper presents a novel system and method for saving battery life by master mobile station network search. The savings in battery life is achieved by preventing the system from constantly searching for available network(s). The protocol requires a mobile station to constantly search and acquire Public Land Mobile Network, other than Home Public Land Mobile Network. This search consumes battery...
Pervasive and mobile computing technologies can make our everyday living environments and our cities "smart", i.e., capable of reaching awareness of physical and social processes and of dynamically affecting them in a purposeful way. In general, living in a smart environment and being made part of its activities somehow make us — as individuals — smarter as well, by increasing our perceptory...
The proliferation of RF networks coupled with the diverse and growing set of mobile devices, opened the doors for a new class of context awareness through contact-free ambient sensing. Since our initial challenges paper in 2007, the field of device-free passive sensing has witnessed an exponential growth; covering areas such as intrusion detection, mobile healthcare, whole-home gesture recognition,...
Security is one of the main challenges in Ad HocMobile Networks (MANETs - Mobile Ad Hoc Networks). Thenatural characteristics of MANETs make these networks highlyvulnerable to many attacks, starting from physical layer to theapplication layer. There are various algorithms and protocolsto deal with these threats. All these algorithms have a commonelement: the use of encryption. Among the cryptographic...
Ultra-dense network (UDN) is becoming significant with the rapid growth of smart terminals and traffic demands of the mobile network. In UDN, the number of small BSs is much more than that in the legacy network to satisfy the traffic demands from dense users. It is not suitable in UDN that a user is served by only one small BS. The prior research concentrated on coordinated multipoint transmissions...
One of the most logical applications of face recognition for authentication is on mobile handset devices. However, face recognition still faces challenges in providing environment tolerance: being able to compensate for changes in light conditions within an environment where authentication is occurring, due to users carrying their mobile handset devices to different locations with varying and unpredictable...
Mobile traffic is increasing exponentially year by year and it will be over 1000 times higher than that of today in the near future. In order to tackle this matter, millimeter wave mobile access networks which can provide several GHz bandwidth attract international attention. This paper investigates the candidates of millimeter wave spectrum for 5G by referring to several ongoing 5G R&D projects...
The Third Generation Partnership Project (3GPP) has been working on developing specifications on Machine Type Communications (MTC), also known as Machine to Machine Communications (M2M), which is all part of Internet of Things (IoT), a technology that enables machines and devices to be inter-connected via the internet. This paper presents recent M2M/IoT feature enhancements in 3GPP. These features...
With the rapid growth in mobile and wireless computing technology, location management techniques become a paramount issue to enable the terminals to continuously receive services when moving from one location to another. Future Personal Communication Systems (PCS) will support a huge user's population and a network spanning over a large geographical area. In such systems, the signalling traffic and...
WLAN has been considered as a compliment technology for cellular network in the heterogeneous wireless network. Thus, seamless connection between these technologies play important role as the performance indicator. In this paper, we consider the user's velocity and channel holding time to predict the user's dwelling time in the WLAN area to assist in the initial network selection. If the expected...
Today, we see ICT everywhere in our life. ICT has been continuously finding new application fields to enrich our quality of life. This also implies that ICT has been continuously finding new challenges that promotes deeper understanding of computing. New application fields would include green computing, e-Health, mobile computing and big data analysis. To solve the problems in these fields, we are...
CORDIAL is a collaborative service discovery strategy designed for mobile and opportunistic networks, which takes advantage of some features of human behavior, namely the periodicity of movements, the membership to a restricted number of communities and the sharing of interests among members of a community. CORDIAL exploits these features by adapting the strategies of query and service advertisements...
Video streaming is the most popular application in today's mobile Internet and its growing demands and popularity put more and more load on cellular networks. In a recent trend to mitigate the cellular load, followed by many providers, users are offered to offload mobile connections to WiFi hotspots, which are predominately deployed in urban environments. In this work, we conduct a simulative performance...
The IEEE Engineering Mobile Service Oriented Systems (EMSOS) Workshop aims to bring together researchers from academia and industry, as well as practitioners in the area of engineering services in mobile environments in order to provide a forum where recent research results can be presented and discussed. The objective is to understand open issues in the software engineering area of services applied...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.