Search results for "Mobile Computing"

showing 10 items of 128 documents

MoMo: enabling hybrid museums

2005

Present-day museums are not mere passive institutions for the preservation of a society's cultural heritage. They have become instead learning environments, research centres and even tourist attractions. The paper introduces the notion of a hybrid museum (HM) in which wireless personal digital devices (PDAs) are used to tailor digital contents to the visitor to enrich both the learning and entertainment experience. The paper describes a fully functional hybrid museum infrastructure (MoMo) implemented with the.NET compact framework running on the PocketPC platform. Several research challenges that had to be faced during the implementation of the system such as the exploration of large sets o…

.NET Compact FrameworkEngineeringMultimediabusiness.industryLearning environmentVisitor patternMobile computingcomputer.software_genreComputer Graphics and Computer-Aided DesignPersonalizationCultural heritageEntertainmentbusinesscomputerSoftwareBlossom algorithmIEE Proceedings - Software
researchProduct

On the Use of a GPU-Accelerated Mobile Device Processor for Sound Source Localization

2017

Abstract The growing interest to incorporate new features into mobile devices has increased the number of signal processing applications running over processors designed for mobile computing. A challenging signal processing field is acoustic source localization, which is attractive for applications such as automatic camera steering systems, human-machine interfaces, video gaming or audio surveillance. In this context, the emergence of systems-on-chip (SoC) that contain a small graphics accelerator (or GPU), contributes a notable increment of the computational capacity while partially retaining the appealing low-power consumption of embedded systems. This is the case, for example, of the Sam…

020203 distributed computingSignal processingbusiness.industryComputer scienceReal-time computingMobile computing020206 networking & telecommunicationsContext (language use)02 engineering and technologyAcoustic source localizationcomputer.software_genreField (computer science)Power (physics)0202 electrical engineering electronic engineering information engineeringGeneral Earth and Planetary SciencesbusinessAudio signal processingMobile devicecomputerComputer hardwareGeneral Environmental ScienceProcedia Computer Science
researchProduct

Estimating Applicability of New Mobile Content Formats to Organizational Use

2003

Innovations on information and communication technology reshape organizational communication. Our ability to estimate applicability of new technologies and content formats to organizational use has been limited to generic quantitative methods at the level of technologies and industries and elaborate qualitative methods targeting specific phenomena at the organizational level. In this paper we estimate quantitatively the applicability of MMS, SMS, XHTML, and XML to organizational use based on an analysis of all communication of an organization unit. We enumerate over 700 communication genres using a genre-based information systems planning method, categorise them with taxonomy of communicati…

3G mobile communicationmobile computingmultimedia communicationelectronic data interchangeelectronic messaging
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Empowering citizens for well-being and chronic disease management with wellness diary.

2010

Chronic conditions closely related to lifestyles are the major cause of disability and death in the developed world. Behavior change is the key to managing well-being and preventing and managing chronic diseases. Wellness diary (WD) is a mobile application designed to support citizens in learning about their behavior, and both making and maintaining behavior changes. WD has been found acceptable, useful, and suitable for long-term use as a part of an intervention. When used independently, however, it does not seem to have enough engaging and motivating features to support adoption and long-term commitment. The main improvement needs identified based on a review of WD-related studies were: p…

Adultself-managementKnowledge managementApplied psychologyMobile computingCognitive-behavior therapyself-observationMedical RecordsPersonalizationBehavior TherapyIntervention (counseling)Health careWeight LossMedicineHumansMedical Informatics ApplicationsElectrical and Electronic EngineeringRisk managementSelf-managementCognitive Behavioral Therapybusiness.industryBehavior changeRehabilitationDisease ManagementGeneral Medicinemobile applicationMiddle AgedModels TheoreticalComputer Science ApplicationsSelf CareWell-beingbusinessSoftwareBiotechnologyIEEE transactions on information technology in biomedicine : a publication of the IEEE Engineering in Medicine and Biology Society
researchProduct

Personalized multimedia touristic services for hybrid broadcast/broadband mobile receivers

2010

This paper presents the topology of a multimedia tourism service that targets mobile devices equipped with broadband and either multicast or broadcast access capabilities. Multicast / Broadcast access is used to handle the delivery of multimedia data to many simultaneous users in the service area. The solution adopted is based on existing standards for mobile TV services, but introducing features that enable the provision of generic multimedia services on top of mobile hybrid broadband and broadcast networks. Furthermore, this paper shows how to use standardized interfaces originally defined for interactive mobile TV broadcasting to build personalized mobile multimedia services that do not …

Broadband networksComputer scienceMobile televisionMobile computingBroadcastingcomputer.software_genreMultimedia Broadcast Multicast ServiceMobile stationBroadbandMedia TechnologyMobile paymentMobile searchElectrical and Electronic EngineeringMultimediaMulticastbusiness.industryIMT AdvancedMobile broadbandMobile QoSDigital multimedia broadcastingMobile telephonyWeb servicebusinesscomputerMobile deviceComputer network2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE)
researchProduct

From Metaphors to Simulations to Idioms: Supporting the Conceptualisation Process

2004

The concept of metaphor has been used in UI design in a loose manner. There is a need to conceptually separate it from related concepts to restore the power it used to have in rhetoric. It is also important to understand the life cycle of metaphor, how it changes over time in the conceptualisation process. This is especially topical in ubiquitous computing, in which entirely new concepts and interaction styles are introduced. In this paper, we describe the use of metaphors and related concepts in theory and apply the approach in a mobile application.

Cognitive scienceUbiquitous computingbusiness.industryProcess (engineering)Computer scienceMetaphormedia_common.quotation_subjectRhetoricMobile computingInteraction StylesArtificial intelligencebusinessmedia_common
researchProduct

Developing a formative assessment system for mathematics using mobile technology: A student centred approach

2012

The success of mobile technology for learning tools depends not only on the technical design aspects but also on pedagogical issues. Students' involvement in designing the tools is one of the key factors for their engagement in technology supported learning. Students should be actively involved in developing innovative solutions which are likely to improve their skills as well as their performance. In this study work, the students participated in iterative design processes of a mobile tablet based peer-to-peer assessment system (P2PASS) for mathematics, and in real life deployment on a mathematics course. The paper reports on two major concepts: the user centred design in practice and the p…

Collaborative softwareMultimediabusiness.industryComputer scienceMobile computingCollaborative learningUsabilitycomputer.software_genreFormative assessmentMathematics educationMobile technologyUser interfacebusinesscomputerUser-centered designInternational Conference on Education and e-Learning Innovations
researchProduct

Social Computing: A Classification of Existing Paradigms

2012

In less than three decades, several paradigms of social computing have emerged. Among them, groupware, social software and mobile social software (MoSoSo) are the most widely known. Although all significant, it is challenging to recognize the function and unique features of each single paradigm. This situation represents an obstacle for a coherent development of social computing, a research domain that is highly fragmented and with relevant literature spread across several disciplines. In this paper, a classification of existing social computing paradigms is introduced as an initial effort to combine the lines of discourse concerning social computing.

Collaborative softwareSocial software engineeringSocial computingbusiness.industryComputer sciencemedia_common.quotation_subjectSocial softwareMobile computingcomputer.software_genreAutonomic computingWorld Wide WebEnd-user computingbusinessFunction (engineering)computermedia_common2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing
researchProduct

IT-Enabled Effective and Efficient International Technology Transfer for SMEs

1999

This study describes the introduction of a new international technology transfer paradigm. The essence of this new paradigm is based on IT-enabled ITT process. The modern business environment is overwhelmed by increased competition and uncertainty, rapid changes in technology, a diminished technology life cycle, and the advent of more powerful, cheaper and easier to use ITs. These factors reinforce the need for the investigation of globalization possibilities of western SMEs via the utilization of high potential ITs in ITT. The ITT process has become more efficient as new ITs are integrated with SMEs’ existing information systems. This type of integration also eliminates many barriers of di…

Competition (economics)GlobalizationProcess managementConceptual frameworkbusiness.industryProcess (engineering)Technology life cycleInformation systemMobile computingThe InternetMarketingbusiness
researchProduct