Search results for "Mobile Computing"
showing 10 items of 128 documents
Transactions in Mobile Electronic Commerce
2000
With the development of global networking, invention of WWW, and proliferation of Internet-enabled computer hardware and software into homes and pockets, a huge customer base has been created for electronic commerce. It is rapidly expanding in USA and Europe and Japan are following the trend. So far, the development of E-commerce has happened in a rather unregulated way especially in USA, whereas in Europe the European Commission has been developing a regulatory basis mainly in form of directives. Currently (12/1999) they have not yet all been accepted and a major restructuring of the regulatory framework has also been planned. Another technological development is the rapid growth of mobile…
Conceptualizing engagement in the mobile context
2016
This conceptual study answers how engagement is defined and conceptualized in the mobile service/technology context. A systematic literature review was conducted in the fields of business and human-computer interactions to achieve this objective. The 22 studies included in the final analysis are classified into two categories that distinguish the main perspectives of mobile engagement. This study demonstrates that prior research has either conceptualized mobile engagement as a behavioral activity (i.e., using or interacting with mobile service/technology) or has perceived it holistically as customer engagement that occurs in a mobile environment. Based on the analysis, it is proposed that c…
Mobile Encounter Network - the missing data link
2008
In this paper, we discuss about the applicability of a short-range wireless communication scheme called Mobile Encounter Network (MEN). Encounters between devices communicating while moving allows ad-hoc -type data transfer to be performed. A background for the emerging of such networks is given. The essential properties of the MEN data transfer are specified. Based on this, the role of MEN as a data transfer medium is discussed. The conclusion is that such networking technique may provide additional value compared to the traditional wireless communication.
Fog Computing based traffic Safety for Connected Vulnerable Road Users
2019
Annually, millions of people die and many more sustain non-fatal injuries because of road traffic crashes. Despite multitude of countermeasures, the number of causalities and disabilities owing to traffic accidents are increasing each year causing grinding social, economic, and health problems. Due to their high volume and lack of protective-shells, more than half of road traffic deaths are imputed to vulnerable road users (VRUs): pedestrians, cyclists and motorcyclists. Mobile devices combined with fog computing can provide feasible solutions to protect VRUs by predicting collusions and warning users of an imminent traffic accident. Mobile devices’ ubiquity and high computational capabilit…
Design Patterns and Organisational Memory in Mobile Application Development
2005
Mobile application development is a challenging task for the software companies due to complicated technological and business environments. Patterns have been recognised to be a valuable tool in software development, for they allow design experiences and solutions to be documented systematically and facilitate the communication of design issues. Patterns can be seen as a part of organisational memory, a means to preserve the design knowledge and enable its reuse in later products and projects. In this paper we study how the design patterns can support organisational memory in mobile application design. We present the utilisation of patterns as a dynamic process and analyse their relationshi…
Mobile Wireless Interfaces: In Search for the Limits
2002
With the proliferation of 2G and 3G Telecom and other wireless networks hundred of millions of users will be able to access wireless services with their terminals in only a few years. In this paper we discuss the possibilities and limitations of existing and emerging mobile technologies and methodologies for porting information and functionality from traditional PCs to mobile devices and vice versa. We argue that in order to be able to properly port things between devices an equivalence concept for user interfaces is required.
Distributed and mobile systems based on wireless networks: definition of a generic control architecture
2005
The tendency toward the use of distributed systems is due to these systems have demonstrated to be a good option for the industrial control systems implementation, because of their flexibility and power, which can be increased with the application of artificial intelligence techniques. In this line, our research group has developed several distributed systems applied to chemical analysis and industrial automation. For these implementations the CAN network was used. Nowadays there is a market for technical tasks like distributed control, monitoring or data acquisition where there is a need for wireless connectivity. Thus, in this paper we want to discuss possibilities and necessary developme…
IncentMe: Effective Mechanism Design to Stimulate Crowdsensing Participants with Uncertain Mobility
2018
Mobile crowdsensing harnesses the sensing power of modern smartphones to collect and analyze data beyond the scale of what was previously possible with traditional sensor networks. Given the participatory nature of mobile crowdsensing, it is imperative to incentivize mobile users to provide sensing services in a timely and reliable manner. Most importantly, given sensed information is often valid for a limited period of time, the capability of smartphone users to execute sensing tasks largely depends on their mobility pattern, which is often uncertain. For this reason, in this paper, we propose IncentMe, a framework that solves this core issue by leveraging game-theoretical reverse auction …
Random Walk in a N-cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations
2017
Designing a pseudorandom number generator (PRNG) is a difficult and complex task. Many recent works have considered chaotic functions as the basis of built PRNGs: the quality of the output would indeed be an obvious consequence of some chaos properties. However, there is no direct reasoning that goes from chaotic functions to uniform distribution of the output. Moreover, embedding such kind of functions into a PRNG does not necessarily allow to get a chaotic output, which could be required for simulating some chaotic behaviors. In a previous work, some of the authors have proposed the idea of walking into a $\mathsf{N}$-cube where a balanced Hamiltonian cycle has been removed as the basis o…
A Survey on Proxy Mobile IPv6 Handover
2016
[EN] As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility m…