The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes an attempt to identify the relationships between the using of a mobile device and an online shopper's trust in use of electronic payment systems in order to see how the adoption of a mobile device can contributes positively to increase shoppers' trust in their used of electronic payment systems. Therefore, this trust will increase shopper's intention to purchase online. It also...
This work proposes the use of a weighted Finite State Machine to serve as a computational model for analyzing the performance of communication protocols. The new model's use is demonstrated by concentrating on web-based services, Internet level-5 protocols in particular, because when the latter are ported onto mobile handsets, fail to meet performance expectations. The same modeling technique can...
The rapid advancement of information and communication technologies (ICTs) has being shaping up a new value chain for tourism. Some travel organizers are getting less profit from the standard package tours because of the shift in the structure of tourism. If we take the mass customization into consideration with module package tours, the increasing number of independent travelers including backpackers...
Drawing on the literatures on what factors making consumer accept mobile commerce (MC) and what mobile commerce applications are acceptable by consumers, this study suggests that five main elements can help to select the best MC product project for the MC provider. And we construct a multiple-layer evaluation model using these elements. Then, for the specific new product projects selection process,...
Mobile Web browsing services bring the full PC browsing experience to customer's mobile handsets which have been emerged. This study is to investigate the intention to use mobile Web browsing based on technology acceptance model (TAM) which has been widely used to explain and predict the IT acceptance and incorporated with self-efficacy which was identified as an important determinant of user's new...
Distributed and mobile collaboration technologies continue to play an important role in supporting complex, flexible and interconnected collaborations within networked enterprises and e-science. The latest trends in distributed and mobile collaboration technologies allow people to work across organizational boundaries, to collaborate among/in organizations and communities and to be part of the collaborative...
Technology acceptance research has tended to focus on extrinsic motivation based on sole theoretical paradigm. Building upon and integrating the key findings of four closely related theoretical paradigms (the technology acceptance model, the theory of planned behavior, innovation diffusion theory, and the flow theory), we developed and test a more comprehensive and unified model in the context of...
A new mobile computing model of spatial information service is studied based on grid computing environment. Key technologies are presented in the model, including mobile agent (MA) mobile computing, grid computing, location based service (LBS), global positioning system (GPS), and wireless communication technologies, such as, general packet radio service (GPRS), transfer control protocol/Internet...
This article talks about the concept of mobile learning, technology to support mobile learning and models of mobile learning practice. The authors also give us a lot of scenarios to introduce mobile learning as a way to improve learnerspsila experience of learning, optimize learning process and get better learning results.
The advent of Web 2.0 has brought a surprise to users, which helps us acquire massive information dynamically and communicate with others flexibly. Meanwhile, social computing for learning has developed also to help further information processing and analyzing in a powerful way. People can learn and communicate through several ways, including Internet based on computers and mobile networks based on...
The main idea of pervasive computing is to embed computer into the living environment or tool of human, so as to make the computer invisible from userpsilas sight and the users can focus on their task itself, instead of the computer. As having natural relationship with the spatial distribution and mobile, the pervasive computing has been applied in geospatial information areas widely. However, the...
We propose an access control model that extends RBAC (role-based access control) to take time and location into account, and use term rewriting systems to specify access control policies in this model. We discuss implementation techniques for rewrite-based policy specifications, and the integration of these policies in Web applications. The declarative nature of the model facilitates the analysis...
Along with the development of wireless technology and especially 3Gpsilas throw into commercial, the mobile value-added services gradually popular used, such as mobile automatic question and answer (Q/A) system. But the current mobile Q/A system mainly based on FAQ database, the question and answer can not be validated and updated by itself. So this paper attempts to implement a p2p based model updatable...
The growing popularity of mobile ad hoc networks (MANETs) makes them increasingly attractive to malicious code writers, and malicious code targeting MANETs has already begun to appear. In this paper, using the theories of complex networks, we present a propagation model of malicious code in WiFi-based MANETs and investigate the propagating behaviors of the malicious code in such networks by means...
Consumers are making increasing use of digital camera, phone camera, and camcorder every minute. Normal users have desires to produce high-quality photos although they are less of photography techniques. Consumers hunger for online instructing on how to capture a good photograph in terms of camera pose (location, orientation, field of view, etc.) Making it ubiquitously accessible is essential which...
With the popularization of information technology, the development trend of internet is transferring from PC- Internet to Mobile-Internet. More and more enterprises adopt M-commerce business model to achieve competitive advantage. Based on the review of present business model theory, this article clarifies the concept of M-commerce as a kind of emerging business model, and analyses the advantage of...
In this paper, we propose an adaptive pacing scheme at the link layer for IEEE 802.11 based multihop wireless networks. Our objective is to improve the performance of higher layer protocols without any modifications to them. Our adaptive pacing scheme estimates the four-hop transmission delay in the network path without incurring any additional overheads, and accordingly paces the packets to reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.