Search results for " mobile computing"
showing 7 items of 7 documents
Developing hand-worn input and haptic support for real-world target finding
2019
Locating places in cities is typically facilitated by handheld mobile devices, which draw the visual attention of the user on the screen of the device instead of the surroundings. In this research, we aim at strengthening the connection between people and their surroundings through enabling mid-air gestural interaction with real-world landmarks and delivering information through audio to retain users' visual attention on the scene. Recent research on gesture-based and haptic techniques for such purposes has mainly considered handheld devices that eventually direct users' attention back to the devices. We contribute a hand-worn, mid-air gestural interaction design with directional vibrotacti…
iOS Applications Testing
2015
<p class="R-AbstractKeywords"><span lang="EN-US">Mobile applications conquer the world, but iOS devices hold the major share of tablets market among the corporate workers. This study aims to identify the aspects (i.e. features and/ or limitations) that influence the testing of the native iOS applications. The aspects related to general mobile applications testing are identified through the systematic literature review of academic sources. iOS applications testing aspects are identified through the review of non-academic (multivocal) literature sources. The identified aspects are merged and discussed in detail using the reviewed sources and based on the author’s professional expe…
Conceptualizing engagement in the mobile context
2016
This conceptual study answers how engagement is defined and conceptualized in the mobile service/technology context. A systematic literature review was conducted in the fields of business and human-computer interactions to achieve this objective. The 22 studies included in the final analysis are classified into two categories that distinguish the main perspectives of mobile engagement. This study demonstrates that prior research has either conceptualized mobile engagement as a behavioral activity (i.e., using or interacting with mobile service/technology) or has perceived it holistically as customer engagement that occurs in a mobile environment. Based on the analysis, it is proposed that c…
Streaming for vehicular users via elastic proxy buffer management
2004
In this article we refer to the market of vehicular networks, where groups of customers located in the same public vehicle (e.g., a train or bus) connect to a terrestrial network through a wireless/satellite backbone link. Elastic buffering is a proxy management technique devised to decouple the multimedia information retrieval rate on the network backbone from the playout streaming rate at the user terminal. It has been shown in the past that the application of elastic buffering mechanisms in terrestrial networks brings significant advantages in terms of network effectiveness. We show that elastic buffering is an extremely effective means to reduce, or even eliminate, streaming service out…
mCLT: an application for collaborative learning on a mobile telephone
2005
Mobile technologies offer new opportunities for distance learning and enable people to collaborate anywhere. This paper introduces an innovative mobile platform for computer-supported collaborative learning in which traditional methodologies of collaboration have been improved, based on 3rd-generation mobile telephones. Students can collect and share live data immediately, anywhere and at any time. This enables them to play an active role in the knowledge-building process. The mCLT is potentially an application for ubiquitous collaborative learning.
Human-Human Interaction: Trends and Challenges for Pervasive and Mobile Computing
2012
Human-to-human interaction (HHI) is a challenging new domain where networked information systems and intelligent environments surrounding people converge for the purpose of better satisfaction of users' requirements and anticipation of their needs. Ubiquitous and pervasive computing are currently considered mature domains that implement and employ networked information systems on many important applications. Ambient intelligence involves the deployment of sensors and devices into the environment to
The Myths of and Solutions for Android OS Controlled and Secure Environment
2015
<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords">…