Search results for "Mobile Computing"
showing 10 items of 128 documents
Towards a Reference Architecture for Model-Driven Business Apps
2016
Model-driven development techniques have been proposed for cross-platform app development. Typically, an individual domain-specific language (DSL) is used. The MD² framework consists of a DSL for business apps and generators, which transform a domain model to native platform code. Prior research on it focused on language and general generator design, this paper accentuates the code generation stage. A reference architecture for the generated apps is proposed to accelerate the development of new generators for which architectural decisions had been made on ad-hoc basis up to now. Moreover, generators are going to expose similar structures that facilitate maintenance. Our proposal takes MD²'s…
Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study
2016
In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…
QoS Mechanisms for IEEE 802.11 Wireless LANs
2004
Currently the Internet provides users with access to information across the world using IP technology. Until now most access points to the Internet have been fixed stations at given locations, but with increasing sales of mobile devices, mobility has become a major trend. Therefore, the Internet is becoming more and more heterogeneous due to the recent explosion of wireless networks. The IEEE 802.11 wireless LAN (WLAN) is the most widely used WLAN standard nowadays. Currently the IEEE 802.11 standard specifies an over-the-air interface between wireless devices. However, QoS services over this technology are still being defined aiming to provide support to multiple applications. Thus, a larg…
Data management and concurrency control in broadcast based asymmetric environments
2006
Masteroppgave i informasjons- og kommunikasjonsteknologi 2006 - Høgskolen i Agder, Grimstad Tens of millions of users have personal handheld devices with several network interfaces built-in, and the number of users and of network interfaces included are only increasing. This growth suggests a need for new methods to disseminate data to multiple clients, and cyclic broadcast is one approach. We do a survey on the various data management protocols that describe how to broadcast the data, and the concurrency control protocols that make sure all access to the database is consistent. The various data management and concurrency control techniques deals with the restrictions in asymmetric broadcas…
To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications
2007
User's privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model which tackles the problem from the perspective of trade-off between privacy and trust, where the user takes the decision with minimal privacy loss. To support the user decision, we introduce the Mobile Access Control List (Macl), a privacy management mechanism which takes into account the user attitude towards mobile sharing, his communication history and social network relationships.
Exploration of Location-Based Services Adoption
2011
The purpose of this chapter is to explore aspects of user perceptions of their use of location-based services. As mobile technologies become more ubiquitous in the general population, it is reasonable to assume that individuals will consume services and software to enhance their aspirations and entertainment desires. This study begins by constructing a location-based service prototype simulation. It then conducts an experiment and analysis based on the Unified Theory of Acceptance and Use of Technology (UTAUT) model. A survey was developed to extract usage information from participants, followed by an analysis of the results using PLS. The analysis shows significant indicators that suggest …
Introduction to Information and Communication Technologies for Development (ICTD) Minitrack: Contributing to Human Development and Social Justice
2015
This minitrack explores opportunities to use Information and communication technologies to promote human development and social justice. In the early days this field began with radio and television as tools to help improve the lives of marginalized communities, but this has now become a global movement of people using computers, the internet, and mobile devices to help human development. Information technologies have become more accessible, more used, and more relevant than ever in the lives of people around the world. A growing body of scholars and researchers work to understand, design, evaluate and critique ICTD interventions, which can bring numerous benefits as well as unanticipated ne…
Mobile Communities in Developing Countries
2010
The number of mobile devices has exceeded four billions and is still growing. Especially in developing countries mobile devices are often the only access to Internet and digital services. In the most developed countries laptops, Wi-Fi and faster and faster wireless telecom networks have for long time made mobile access to various digital services possible while on the move. Still, large and instant mobile communities can only rely on more portable devices, such as mobile phones. In this paper we will analyze various mobile communities and the support they are offered by the social media sites. We will discuss the phenomena encountered in developing countries, like how the mobile technology …
Transaction management for m-commerce at a mobile terminal
2006
Although there has been a lot of discussion of "transactions" in mobile e-commerce (m-commerce), very little attention has been paid for distributed transactional properties of the computations facilitating m-commerce. In this paper, we first present a requirement analysis and then present a wireless terminal-based transaction manager (TM) architecture. This architecture is based on the assumption that there is an application that supports certain business transaction(s) and that it uses the TM to store transactional state information and retrieve it after a communication link, application, or terminal crash. We present the design of such a TM, including the application interface, modules a…
Mobile Application Diffusion and Success: An Interpretative Approach to Influential Factors
2018
The rapid evolution of mobile computing technology has been attributed to the increasing capitalizing by companies on this innovative business medium. The result of conformity between technology advancement and market demand increment for mobility has led to the development of different categories of mobile businesses in recent years. This research reviews the previous related literature to the subject and by deploying meta-synthesis as a systematic quantitative method; a generic model covering important factors contributing to mobile application diffusion is presented. The proposed comprehensive model consists of users' specifications, technical aspects and contextual factors in the first …