The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We describe a “crowd measurement” project, referred to as PoQeMoN, whose main objective is to identify Quality of Service (QoS) indicators in order to predict the Quality of Experience (QoE) for HTTP YouTube content on mobile networks. Results are based on experiments on an operational network. The second contribution of this paper is to show that the proposed indicator is easy to implement in order...
More email is opened on mobile devices today than on other platforms [1]. At the same time, enterprises are constantly investing in approaches to improve employee productivity. In this paper, we consider the problem of automated information suggestions to assist in reply construction. The basic premise of the work is that a significant portion of the information content of a reply is likely to be...
In recent studies, researchers have developed various computation offloading frameworks for bringing cloud services closer to the user via edge networks. Specifically, an edge device needs to offload computationally intensive tasks because of energy and processing constraints. These constraints present the challenge of identifying which edge nodes should receive tasks to reduce overall resource consumption...
In this paper, the performance of the toroidal cellular simulation structure under users' mobility, time-varying traffic, and dynamic channel assignment is evaluated. The toroidal cellular simulation structure has been proposed to effectively eliminate the so called edge effect (elimination of the inflow/outflow of handoff traffic streams to/from the examined area). However, in the toroidal cellular...
In this paper we apply self-labeling algorithms as Semi-Supervised Classification (SSC) techniques in order to automate the classification of functional and non-functional requirements contained in reviews in the App Store. In this domain, where it is easy collect a large number of reviews but difficult to manually annotate then, we found that SSC techniques can successfully perform this task and...
With the constant increase in the number of interconnected devices in today networks, and the high demand of adaptiveness, more and more computations can be designed according to self-organisation principles. In this context, a key building block for large-scale system coordination, called gradient, is used to estimate distances in a fully-distributed way: it is the basis for a vast variety of higher...
The rise of mobile smartphones and its usage of mobile applications made the human life more productive and boosted several activities in everyday routine jobs and business areas. In another side now a day, most of the business and personal applications transferred to the mobile apps. The one hand mobile application providing more features than traditional desktop applicationas and proving endless...
Face recognition-based authentication techniques can be easily spoofed using various types of attack. Consistent counter-measures need to meet certain requirements, mainly regarding reliable robustness and low complexity. In this paper, we aim to find the best compromise between these two criteria, as we propose an anti-spoofing solution based on Image Quality Assessment (IQA) to distinguish between...
Supporting mobility in wireless sensor networks is one of the major requirements for future Internet of Things (IoT) applications. This work focuses on optimizing the objective function of Routing Protocol for Low-power and Lossy Networks (RPL) in mobile applications. RPL routing is the most common standard routing protocol designed for IoT applications. We optimized RPL objective function by combining...
The mobile video playback involves many subsystems of the devices such as computing, rendering and displaying subsystems. Among all subsystems, the displaying subsystem accounts for at least 38% of all consumed power, and it can be up to 68% with the maximum backlight brightness. What is more, lots of people watch videos via mobile devices in various situations, where the ambient luminance condition...
This paper indicates the dataset and challenges evaluated under PETS2017. In this edition PETS continues the evaluation theme of on-board surveillance systems for protection of mobile critical assets as set in PETS 2016. The datasets include (1) the ARENA Dataset; an RGB camera dataset, as used for PETS2014 to PETS 2016, which addresses protection of trucks; and (2) the IPATCH Dataset; a multi sensor...
Modern mobile devices contain powerful Multi-Processor System-on-Chips (MPSoCs) that are performance throttled by Dynamic Power Management (DPM) runtime systems to extend battery lifetime. Applications on mobile devices commonly generate highly interactive workloads, dependent on interaction between the processor cores, peripherals, external resources and the user, such as touch input during web-browsing...
Mobile video service becomes more and more popular with commercial deployment of Long Term Evolution (LTE) networks and other wireless access mechanisms. However, perfect LTE coverage with ubiquitous signal quality is not available in reality. Recently, adaptive HTTP video streaming over LTE has been gaining popularity. The quality of video service faces challenges. In this paper, we study the Quality...
When two nodes in an opportunistic network meet, a utility function is generally employed to select the data that have to be exchanged between them, in order to maximize the chance of message delivery and to minimize congestion. The utility function computes weighted sums of various parameters, such as node centrality, similarity, trust, etc. Most of the existing solutions pre-compute the weights...
The growing adoption of automated data collection systems in the transit industry, such as automated fare-collection (AFC) and automated vehicle location (AVL), is providing operators with extensive data about the state of the system and its usage by passengers. The paper proposes a framework for using automated data to support the various functions, both planning and real time, and demonstrates its...
With the 5G technology, data traffic is going to grow by a factor of 1000, while the number of connected devices is likely going to be two orders of magnitude higher. With smartphones being cornerstone in our daily lives, understanding mobile network performance is critical for providing a superior user experience and, consequently, determining the success of an application. This paper presents a...
We consider a system where a local cache maintains a collection of N dynamic content items that are randomly requested by local users. A capacity-constrained link to a remote network server limits the ability of the cache to hold the latest version of each item at all times, making it necessary to design an update policy. Using an age of information metric, we show under a relaxed problem formulation...
Mobile Broadband (MBB) access networks are becoming more and more used worldwide, and the devices adopted to access them are increasing in number and complexity (smartphones, mobile hotspots, vehicular infotainment systems). The highly dynamic nature of such scenarios calls for continuous monitoring and measurement of the network, and possibly cross-layer management of network applications. A recent...
The popularity of Location-Based Services (LBSs) has resulted in varieties of applications with more conveniences in our daily life. However, since mobile users need to submit some sensitive information to the untrusted LBS servers, they may lose their privacy while they are enjoying the provided social activities. In this paper, we first point out and define the Time-Sensitive Side Information (TSSI)...
Profiling the diversity of land use in modern cities by mining data related to human mobility represents a challenging problem in urban planning, transportation and smart city management. Previous work on mobile phone data (i.e., Call Detail Records) has shown the existence of strong correlations between the urban tissue and the associated mobile communication demand. Similarly, GPS traces of vehicles...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.