Search results for " mobile computing"

showing 7 items of 7 documents

Developing hand-worn input and haptic support for real-world target finding

2019

Locating places in cities is typically facilitated by handheld mobile devices, which draw the visual attention of the user on the screen of the device instead of the surroundings. In this research, we aim at strengthening the connection between people and their surroundings through enabling mid-air gestural interaction with real-world landmarks and delivering information through audio to retain users' visual attention on the scene. Recent research on gesture-based and haptic techniques for such purposes has mainly considered handheld devices that eventually direct users' attention back to the devices. We contribute a hand-worn, mid-air gestural interaction design with directional vibrotacti…

Computer scienceNovel interaction paradigmMobile computingAugmented reality02 engineering and technologyInteraction designManagement Science and Operations ResearchGestural inputHuman–computer interactionNovel interaction paradigms020204 information systems0202 electrical engineering electronic engineering information engineeringAuditory feedback; Augmented reality; Gestural input; Haptic devices; Novel interaction paradigms; Pointing; Ubiquitous and mobile computing design and evaluationHaptic devicesHaptic technologySettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuditory feedbackHaptic deviceSettore INF/01 - InformaticaUbiquitous and mobile computing design and evaluation020206 networking & telecommunicationsInteraction techniquePointingComputer Science ApplicationsHardware and ArchitectureAugmented realityMobile deviceAuditory feedbackGesturePersonal and Ubiquitous Computing
researchProduct

iOS Applications Testing

2015

<p class="R-AbstractKeywords"><span lang="EN-US">Mobile applications conquer the world, but iOS devices hold the major share of tablets market among the corporate workers. This study aims to identify the aspects (i.e. features and/ or limitations) that influence the testing of the native iOS applications. The aspects related to general mobile applications testing are identified through the systematic literature review of academic sources. iOS applications testing aspects are identified through the review of non-academic (multivocal) literature sources. The identified aspects are merged and discussed in detail using the reviewed sources and based on the author’s professional expe…

Computer sciencemedia_common.quotation_subjectMobile computingData scienceSoftware qualityiOS application; mobile application; testing; quality; verification and validation; systematic literature review;World Wide WebSystematic reviewiOS applications; mobile computing; software testing; software qualityOrder (exchange)Software testingQuality (business)Software verification and validationmedia_common
researchProduct

Conceptualizing engagement in the mobile context

2016

This conceptual study answers how engagement is defined and conceptualized in the mobile service/technology context. A systematic literature review was conducted in the fields of business and human-computer interactions to achieve this objective. The 22 studies included in the final analysis are classified into two categories that distinguish the main perspectives of mobile engagement. This study demonstrates that prior research has either conceptualized mobile engagement as a behavioral activity (i.e., using or interacting with mobile service/technology) or has perceived it holistically as customer engagement that occurs in a mobile environment. Based on the analysis, it is proposed that c…

Customer engagementEngineeringKnowledge managementbusiness.industry05 social scienceshuman-centered computingConceptual model (computer science)Context (language use)ubiquitous and mobile computingMobile contextConceptual studyCognitive dimensions of notationsSystematic review0502 economics and business050211 marketingbusinessta512050203 business & managementMobile serviceProceedings of the 20th International Academic Mindtrek Conference
researchProduct

Streaming for vehicular users via elastic proxy buffer management

2004

In this article we refer to the market of vehicular networks, where groups of customers located in the same public vehicle (e.g., a train or bus) connect to a terrestrial network through a wireless/satellite backbone link. Elastic buffering is a proxy management technique devised to decouple the multimedia information retrieval rate on the network backbone from the playout streaming rate at the user terminal. It has been shown in the past that the application of elastic buffering mechanisms in terrestrial networks brings significant advantages in terms of network effectiveness. We show that elastic buffering is an extremely effective means to reduce, or even eliminate, streaming service out…

Mobile radioService (systems architecture)Computer Networks and CommunicationsComputer scienceDelayed real time servicesMultimedia information retrievalCommunication channels (information theory)Resource sharing algorithmBuffer storageWirelessInformation retrievalWireless telecommunication systemsElectrical and Electronic EngineeringReal time streaming servicesProxy (statistics)Railroad car equipmentVehicular area networksBackbone networkInternetMobile computingVehicular ad hoc networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSatellite communication systemsElastic proxy buffer managementLocal area networksReal time systemsAlgorithms; Buffer storage; Communication channels (information theory); Information retrieval; Internet; Local area networks; Multimedia systems; Railroad car equipment; Real time systems; Satellite communication systems; Satellite links; Wireless telecommunication systems; Delayed real time services; Elastic proxy buffer management; Fast internet for fast train hosts (FIFTH); Real time streaming services; Resource sharing algorithm; Vehicular area networks; Mobile computingComputer Science ApplicationsTerminal (electronics)Fast internet for fast train hosts (FIFTH)businessSatellite linksAlgorithmsMultimedia systemsComputer network
researchProduct

mCLT: an application for collaborative learning on a mobile telephone

2005

Mobile technologies offer new opportunities for distance learning and enable people to collaborate anywhere. This paper introduces an innovative mobile platform for computer-supported collaborative learning in which traditional methodologies of collaboration have been improved, based on 3rd-generation mobile telephones. Students can collect and share live data immediately, anywhere and at any time. This enables them to play an active role in the knowledge-building process. The mCLT is potentially an application for ubiquitous collaborative learning.

Settore INF/01 - Informaticamobile computingcollaborative learningcollaborative learning mobile computing
researchProduct

Human-­Human Interaction: Trends and Challenges for Pervasive and Mobile Computing

2012

Human-to-human interaction (HHI) is a challenging new domain where networked information systems and intelligent environments surrounding people converge for the purpose of better satisfaction of users' requirements and anticipation of their needs. Ubiquitous and pervasive computing are currently considered mature domains that implement and employ networked information systems on many important applications. Ambient intelligence involves the deployment of sensors and devices into the environment to

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniHuman-human interaction pervasive computing mobile computing
researchProduct

The Myths of and Solutions for Android OS Controlled and Secure Environment

2015

<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords"&gt…

Web serverEngineeringbusiness.industryMobile computingBring your own devicecomputer.software_genreComputer securityEncryptionWorld Wide WebServerMalwareWeb contentAndroid (operating system)businesscomputerAndroid; mobile computing; security; BYOD; smartphones; ICTEnvironment. Technology. Resources.
researchProduct