The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices are ubiquitous but their resources are limited. However, they must be capable to run computationally intensive software, for example for image stitching, face recognition, and simulation-based artificial intelligence. As a solution, mobile devices can use nearby resources to offload computation. Distributed computing environments provide such features but ignore the nature of mobile...
Web services bring more conveniences for users and developers. However, it makes user face the problem of service information explosion. The personalized service recommendation solves the problem. This paper proposes a method to predicting the system reliability which bases on user context information in mobile computing environment. The method construct user behavior model by formatting user location...
Developing applications with intelligent context access capabilities is challenged by the difficulty of obtaining advanced context information. The complexity of the logic required for processing context information adds another barrier for developing advanced context-aware applications. In this research paper, we propose a solution that allows context information sharing and extension toward the...
With the expansion of mobile computing and mobile data services, the number, type, and application of location-based services will continue to expand rapidly in the coming years. These apps have attracted the interest of users from different fields, such as gaming, mobile commerce, navigation systems, emergency services, and various tracking systems. As these apps use large volumes of location data...
This paper discusses the design and development efforts made to collect data using an opportunistic crowdsensing mobile application. Relevant issues are underlined, and solutions proposed within the CHIST-ERA Macaco project for the specifics of collecting fine-grained content and context data are highlighted. Global statistics on the data gathered for over a year of collection show its quality: Macaco...
Social context is important to a variety of significant applications such as business intelligence, public security and epidemic. For example, companies can refine the advertisement strategy by targeting the influential people within the social group. Social context modelling and recognition is an emerging research area which aims to infer the information that characterizes multiple users such as...
IMS (IP Multimedia Subsystem) is confronted to various evolutions. The purpose of these evolutions is focused on enhancing subscriber experience by offering a variety of services that meets his needs and requirements. To respond to this problematic, we must consider subscriber profile information in service discovery process. IMS presents a significant mass of information of subscribers' profiles...
With the rise of smart mobile devices, context-aware mobile applications became an integral part of our everyday life. However, testing, evaluating or demonstrating context-aware mobile applications for outdoor environments remains a resource-intensive and cumbersome task. The investigations need to be conducted in real-world experiments in order to gain proper insights into how well an application...
The human daily and the professional life demand a high amount of communication ability, but every fourth adult above 50 is hearing-impaired, a fraction that steadily in- creases in an aging society. For an autonomous, self-condent and long productive life, a good speech understanding in ev- eryday life situations is necessary to reduce the listening ef- fort. For this purpose, a mobile app-based...
This paper is presented the study of the social influence by using social features in fitness mobile applications and habit that persuades the working-aged people, in the context of continuous fitness mobile application usage to promote the physical activity. Our conceptual model consisted of Habit and Social Influence. The social features based on the Persuasive Technology (1) Normative Influence,...
Exponential growth of media generated in online social networks demands effective recommendation to improve the efficiency of media access especially for mobile users. In particular, content, objective quality or general popularity are less decisive for the prediction of user-click behavior than friendship-conditioned patterns. Existing recommender systems however, rarely consider user behavior in...
Human mobility analysis and modeling is a very interdisciplinary field of research. Mobility models play an important role particularly in assessing the simulative performance of mobile and opportunistic networks. The mobility traces, which most of these models are based on, however, mostly suffer from several shortcomings. In this paper, we use the extensive Lausanne Data Collection Campaign (LDCC)...
As wireless communication and mobile devicesadvances, recommendation system is one of the keytechnologies to realize personalized service. This paperproposes a service recommendation mechanism using aprobabilistic model in mobile devices. With the contextualinformation and the use's demand state inferred by the model, we can recommend a service to meet the user's preferencesand needs at real time...
A key property in tactical network environments is that the wireless network itself is typically the major limiting factor in how much information can be shared between users. In such environments, tactical operations often employ group communication protocols (one-to-many or many-to-many) to send information between users. This often results in situations where every message sent gets delivered to...
Mobile cloud computing (MCC) is the most promising cloud solution for the future mobile environment. It aims to integrate mobile devices with cloud computing, and provide to mobile users an online access to unlimited cloud resources. Furthermore, MCC has changed the concept of mobile devices from primitive gadget to full computers that accommodate work, personal and mobility needs. Thus, in this paper...
The Domain Name System (DNS) is used almost everywhere in mobile networks to determine the IP addresses of the network elements and thanks to the DNS architecture of the inter-operator IP backbone network, a network element of a public mobile network (PMN) can easily determine IP addresses of any other PMN. The analysis of some customers' complaints showed that it could be the cause of billing mistakes...
This paper describes the general service recommendation process matched to the telecommunication service delivery characteristics of the Ubiquitous Consumer Wireless World (UCWW). The goal is to provide consumers with the ‘best’ service instances that match their dynamic, contextualized and personalized requirements and expectations, thereby aligning their usage of mobile services to the always best...
Cloud Radio Access Network (C-RAN) is a novel mobile network architecture that brings baseband processing units (BBUs) of a set of base stations into a central server keeping only remote radio heads (RRHs) at the cell sites. Because of their limited resources, running sophisticated applications on mobile handsets could result in poor performances and shortened battery lifetime. One promising solution...
This paper is a follow-up to presentations made in 2010 and 2014. Since 2008, the Apple iOS devices have become an integral part of student learning experiences at Abilene Christian University (ACU). This paper shares the experiences of the authors from teaching an undergraduate introductory course on mobile computing at ACU since 2009 to the present. Discussed within this paper are the authors' experiences...
Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, written down and stolen, eavesdropped or deliberately being told to other people. In this article, we propose a solution in order to improve authentication in mobile cloud computing and mainly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.