Search results for "Mobile Computing"

showing 10 items of 128 documents

Modeling and 'smart' prototyping human-in-the-loop interactions for AmI environments

2021

[EN] Autonomous capabilities are required in AmI environments in order to adapt systems to new environmental conditions and situations. However, keeping the human in the loop and in control of such systems is still necessary because of the diversity of systems, domains, environments, context situations, and social and legal constraints, which makes full autonomy a utopia within the short or medium term. Human-system integration introduces an important number of challenges and problems that have to be solved. On the one hand, humans should interact with systems even in those situations where their attentional, cognitive, and physical resources are limited in order to perform the interaction.…

Process (engineering)Computer scienceMobile computingContext (language use)02 engineering and technologyManagement Science and Operations ResearchLibrary and Information SciencesSmart prototypingHuman-centered designSoftwareHuman–computer interaction020204 information systemsContext-aware interactionsInformàticaMachine learning0202 electrical engineering electronic engineering information engineeringHuman-in-the-loopSet (psychology)Point (typography)business.industry020207 software engineeringComputer Science ApplicationsHuman-system interactionsHuman in the loopConceptual frameworkHardware and ArchitecturebusinessLENGUAJES Y SISTEMAS INFORMATICOS
researchProduct

Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 …

2002

The recent NSF Workshop on Infrastructure for Mobile and Wireless Systems, held on Oct. 15, 2001 in Phoenix had a goal of defining and establishing a common infrastructure for the discipline of mobile wireless networking. This consensus-based paper is the outcome of that workshop. The paper provides a foundation for implementation, standardization, and further research and discussion on the issues of what should constitute such an infrastructure. Workshop participants came from many different wireless communities, including those of communications, operating systems, core networking, mobility, databases, and middleware. The workshop presented various research directions in the field and inc…

Public land mobile networkWireless site surveyWi-Fi arrayComputer sciencebusiness.industryMobile broadbandMobile computingMobile technologyMobile WebTelecommunicationsbusinessMunicipal wireless networkComputer network
researchProduct

The RAMON module: architecture framework and performance results

2003

A design study of a Re-configurable Access Module for Mobile Computing Applications is described. After a presentation of its cross-layered architecture, Control Parameters (CPs) of the module are introduced. The set of CPs both describes the functional state of the communication process in relation to the time-varying transport facilities and provides, as input of suitable Algorithms, the control information to re-configure the whole protocol stack for facing modified working conditions. The paper also presents the structure of the simulator realized to demonstrate the feasibility of the design guidelines and to evaluate reconfigurability performances.

Relation (database)business.industryComputer scienceMobile computingReconfigurabilityReconfigurable networkAvailable bandwidth End-to-end performance Internal parameters Maximum segment size Reconfigurability Reconfigurable network Reference environments Wireless technologiesWireless technologiesProtocol stackArchitecture frameworkAvailable bandwidthInternal parametersEmbedded systemMobile stationMaximum segment sizeReconfigurabilityLink layerState (computer science)End-to-end performancebusinessReference environments
researchProduct

Delivering Services to Residential Appliances by Utilizing Remote Resource Awareness

2008

Service providers are nowadays offering a variety of services, and in particular multimedia content delivery. Besides, consumer appliances are increasingly becoming digitalized including support for communication networks. However, it is difficult, and in many cases impossible, to use these services with standard consumer appliances, such as TV and media player devices. Rather, usage is often restricted so that they can only be accessed through web browsers from PCs, mobile phones and similar terminals. This is unfortunate, because dedicated consumer appliances are often better suited to handle the content and thereby give consumers a better experience. Within this paper, three design appro…

Resource awarenessWeb browserMultimediaComputer scienceService discoveryMobile computingService providercomputer.software_genreTelecommunications networkVariety (cybernetics)World Wide WebVideoconferencingVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552computer
researchProduct

Performance of H.264 compressed video streams over 802.11b based MANETs

2004

We address the problem of video streams transmission in 802.11b based mobile ad-hoc networks (MANETs). Through the study of the delivery of a live encoded video stream, we expose the characteristics of different routing protocols and the infeasibility to provide QoS. The analysis shows the impact of a MANET on H.264 real-time video flows in terms of packet loss, end-to-end delay, jitter and distortion, and the behavior of H.264 error resilience tools in order to determine their effectiveness on such network scenarios. The results show that video traffic has demands that are hard to be met by a standard MANET, and that improvements are required in terms of routing protocols and QoS provision…

Routing protocolComputer sciencebusiness.industryWireless ad hoc networkPacket lossQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMacroblockMobile computingTraffic shapingbusinessResilience (network)Computer network
researchProduct

NICE-MRP: a Near-Optimal Radio-Interference Aware Multi-path Routing Protocol for MANETs

2013

International audience; Nowadays, with the miniaturization of communication devices, dense and highly mobile ad-hoc networks are very common. Besides, more and more devices have several radio interfaces. In such an environment, multi-path routing should be considered. Yet, only few multi-path ad-hoc routing protocols take into account the radio-interferences which might arise between two geographically close routes. Moreover, they generally only forbid the addition of interfering paths rather than looking for a different, more optimized, solution. This paper presents NICE-MRP, a novel multi-path routing protocol for mobile ad-hoc networks giving efficient solutions with respect to physical …

Routing protocolDynamic Source RoutingComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Wireless Routing Protocol050801 communication & media studies02 engineering and technologyRouting Information Protocol[INFO.INFO-MC]Computer Science [cs]/Mobile Computing[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0508 media and communications[INFO.INFO-MC] Computer Science [cs]/Mobile Computing0202 electrical engineering electronic engineering information engineeringZone Routing ProtocolStatic routing[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationLink-state routing protocolInterior gateway protocol[INFO.INFO-MO] Computer Science [cs]/Modeling and SimulationbusinessComputer network
researchProduct

Secure and efficient data storage in unattended wireless sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…

Scheme (programming language)business.industryComputer scienceMobile computingHomomorphic encryptionCryptographyComputer data storageSecrecyVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile telephonybusinesscomputerWireless sensor networkcomputer.programming_languageComputer network
researchProduct

M-commerce - mobile commerce: a new frontier for E-business

2005

Mobile commerce involves the use of mobile computing devices in carrying out different types of economic transactions or enabling them to take place over space and time. The m-commerce includes use of such technologies as SMS services over a number of carriers (GSM, IS95, CDMA, W-CDMA), Bluetooth applications, and the integration of low-level digital carriers to IP based services through WAP or Compact HTML like the Japanese I-Mode service. This integration is one of the fastest growing markets of E-business and it will involve the development and design of a host of new applications, services, business models and technological solutions. The theme is both topical and challenging, as the nu…

Service (business)Electronic businessComputer sciencebusiness.industrycomputer.internet_protocolMobile commerceMobile computingServices computingMobile business developmentE-commerceBusiness modellaw.inventionWorld Wide WebBluetoothGSMlawMiddlewareInformation systemWireless Application ProtocolbusinesscomputerProceedings of the 34th Annual Hawaii International Conference on System Sciences
researchProduct

Media Delivery to Remote Renderers Controlled by the Mobile Phone

2009

In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.

Service (business)MultimediaComputer sciencebusiness.industryService delivery frameworkMobile computingService providercomputer.software_genreMobile phoneNext-generation networkVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552The InternetSession (computer science)Best-effort deliverybusinesscomputerComputer network
researchProduct

Improving Usability of Location-Based Services with User-Centric Data Querying

2004

In this paper, we describe a computational model that produces a dataset which we consider to be an appropriate response for “give me a description of my neighborhood” type of queries in location-based services Our attempt is to reflect the abstraction ability of a specific user, and in this way to maximize the usability of the service under restrictions on data volume posed by technical, economical and cognitive factors of mobile environments We also present the results of instantiating the model for a simple LBS.

Service (systems architecture)Databasebusiness.industryComputer scienceMobile computingUsabilitycomputer.software_genreDatabase-centric architectureUsability goalsHuman–computer interactionLocation-based servicebusinesscomputerUser-centered designAbstraction (linguistics)
researchProduct