The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
ith the wide deployment of various kinds of sensors in fixed infrastructures and in mobile devices, technologies and applications of crowd-sensing has drawn attentions in the fields of mobile computing. This paper studies the design of frameworks for crowd-sensing process in a distributed environment. We discuss the realization of the compatibilities of devices and services, as well as the algorithms...
Capturing and retaining the attention of students while learning complex topics like modeling and simulation is a critical task. In discrete-event simulation (DES), educators rely on examples like queueing systems in fast food restaurants or manufacturing organizations to provide the necessary context for learning. In many instances, these examples fall short in capturing the attention of students,...
Travelers mobility simulation is a powerful tool to test strategies in a virtual environment, without impacting the quality of the real traffic network. However, existing mobility multiagent and micro-simulations can only consider a sample of the real volumes of travelers, especially for big regions. With distributed simulations, it would be easier to analyze and predict the status of nowadays networks...
In this paper, we present the Physical Web Browser project for web applications depending on the environment. At this moment, many of users all over the world visit websites using their mobile devices only. Any mobile device (e.g., smartphone) has sensors to capture the environmental information. This information (context) could be analyzed and used within the web applications. There are, at least,...
In this paper, we propose a context-aware distributed data storage mechanism to optimize the performance of reading/writing in the emerging mobile cloud computing environment. In particular, the exploited context information including user mobility pattern, network condition, and data access preference (intensity to read and write/update). The context information is utilized to improve the efficiency...
The amount of different usages in sensor networks grows with the deployment of ever more diverse sensors within a same network. More varied data implies a more heterogeneous panel of users. Such a diversity in usages leads to a major problem about data modelling: being able to address, for each user, precisely his needs, and his needs only. In other words, providing a model which would avoid to overwhelm...
The increasing use of online social networks (OSNs) in emergency situations shows us a promising future of human cooperation through OSNs. Despite this intense interest, a number of fundamental limitations still exist, such as lack of appropriate conceptual models and limitations on cooperation methods and shareable resources. To address existing limitations, we propose Whistle - a cooperation framework...
With the proliferation of mobile devices and the development of wireless technologies, users can run a wide range of applications on mobile devices. However, the mismatch between applications and mobile devices does not guarantee the application quality. To solve this problem, this paper proposes a context-aware application matching system.
Mobility models play key role in design and development of simulation tools that generate realistic mobility movements to study and develop algorithms and procedures for Next Generation Networks. Developing such simulation tools require a sophisticated mobility model that generates mobility patterns and a procedure for routing mobiles. This paper aims to develop path guiding algorithm in order to...
Analyzing and predicting complex network attack strategies require an efficient way to produce realistic and up-to-date data representing a variety of attack behaviors on diverse network configurations. This work develops a simulation system that fuses four context models: the networks, the system vulnerabilities, the attack behaviors, and the attack scenarios, so as to synthesize multistage attack...
Developers often consult different sources of information like Application Programming Interfaces (API) documentation, forums, Q&A websites, etc. With the aim of gathering additional knowledge for the programming task at hand. The process of searching and identifying valuable pieces of information requires developers to spend time and energy in formulating the right queries, assessing the...
Mobile Peer-to-peer (P2P) realizes communications between mobile nodes without any access points. In general, Mobile P2P utilizes IEEE 802.11 Wireless LANs. However, IEEE 802.11 Wireless LANs do not support intelligent energy management schemes. Therefore, nodes should appropriately switch on and off its WLAN interface for reducing energy consumptions. In this paper, we propose energy efficient mobile...
Exposing the fundamental network capabilities on behalf of the mobile network operator may offer innovative way for the service providers to provide more user-oriented services. The network capability we focus on is online charging, and in particular the lack of functional relationship between the online charging and the service delivery processes (other than the obvious one, reducing the available...
Empowering the enterprise to control their own session policy for mobile broadband is not only necessary for consumerization, but is beneficial in controlling budgets and protecting corporate network resources. We propose a practical method of establishing dynamically enterprise-Business-Context (eBC) status to determine whether or not the enterprise should fund employees'' service requests and what...
In this paper, we present an approach to adapt and reuse learning annotations and contexts by describing the process to capitalization and reuse of learning annotations and associated learning contexts. This is to provide to the actor, an appropriate learning which is reviewed or validated previously by others, with similar learning contexts. The modeling and the formalization of learning annotations...
In a largely scalable Web services-based environment, context-awareness is concerned with reasoning about the surrounding well-defined context and adapting the interpreted services accordingly (almost) on the server-side, and finally distributing the services to clients in a reliable way through trustworthy network protocols. Most of Web services-based context-aware applications are either partially...
Context situation, which means a snapshot of the status of the real world, is formed by integrating a large amount of contexts collected from various resources. How to get the context situation and use the situation to provide better services is a challenging issue. In this paper, we focused on this challenge on the basis of the mobile cloud computing architecture. An abstract model is proposed in...
The main drawbacks and handled devices (small storage space, small size of the display screen, discontinuance of the connection to the WLAN etc) are often incompatible with the need of querying and browsing information extracted from enormous amounts of data which are accessible through the network. A key characteristic of emerging OLAP database systems will be to use them with mobile device. To overcome...
In this paper we describe our methodology for building context-aware applications. It supports a systematic definition, conception and development of the context-aware features of an application along the different phases of a software development process. Its application has helped us in the discussion and conception of these features in project teams with non-technical domain experts. A context...
This paper describes a ubiquitous learning log system called SCROLL (System for Capturing and Reminding of Ubiquitous Learning Log). The aim of SCROLL is to aid users to simply capture the learning logs they have learned, review and reflect their old learning logs, reuse the knowledge when in need, be reminded at right time at right place and be recommended others' learning logs properly. Both its...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.