Search results for "mobile computing"

showing 10 items of 128 documents

Data offloading and task allocation for cloudlet-assisted ad hoc mobile clouds

2016

Nowadays, although the data processing capabilities of the modern mobile devices are developed in a fast speed, the resources are still limited in terms of processing capacity and battery lifetime. Some applications, in particular the computationally intensive ones, such as multimedia and gaming, often require more computational resources than a mobile device can afford. One way to address such a problem is that the mobile device can offload those tasks to the centralized cloud with data centers, the nearby cloudlet or ad hoc mobile cloud. In this paper, we propose a data offloading and task allocation scheme for a cloudlet-assisted ad hoc mobile cloud in which the master device (MD) who ha…

Computer Networks and CommunicationsComputer sciencemobile cloud computingDistributed computingMobile computingCloud computing02 engineering and technologyad hoc mobile cloudoffloading0202 electrical engineering electronic engineering information engineeringStackelberg competitionCloudletElectrical and Electronic Engineering020203 distributed computingbusiness.industrycloud computing020206 networking & telecommunicationsEnergy consumptionMobile ad hoc networkstackelberg gameMobile cloud computingTask (computing)businessMobile deviceInformation SystemsComputer networkcloudlet
researchProduct

Architectures and protocols for mobile computing applications: a reconfigurable approach

2004

This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs. The control functions are implemented in a software module, named Reconfigurable Access module for MObile computiNg applications (RAMON), placed in mobile and/or base stations. RAMON operates on abstract models of the main communication functions of a wireless systems (e.g., transmission over the radio channel, coding end error recovery, capacity sharing and packet scheduling, handover, congestion control, etc.). RAMON algorithms are programmed with reference to the abstract models, independently of specific radi…

Computer Networks and Communicationsbusiness.industryComputer sciencemobile computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingReconfigurabilityreconfigurable systemsresource controllaw.inventionBluetoothNetwork congestionBase stationHandoverlawmobile computing; mobility management; reconfigurable systems; resource control; session controlCellular networkWirelessbusinessMobility managementmobility managementUMTS frequency bandssession controlComputer network
researchProduct

Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario

2006

In order to resist an unauthorized use of the resources accessible through mobile terminals, masquerader detection means can be employed. In this paper, the problem of mobile-masquerader detection is approached as a classification problem, and the detection is performed by an ensemble of one-class classifiers. Each classifier compares a measure describing user behavior or environment with the profile accumulating the information about past behavior and environment. The accuracy of classification is empirically estimated by experimenting with a dataset describing the behavior and environment of two groups of mobile users, where the users within groups are affiliated with each other. It is as…

Computer scienceMobile computingAnomaly detectionIntrusion detection systemData miningFalse rejectioncomputer.software_genrecomputerClassifier (UML)Similitude
researchProduct

Developing hand-worn input and haptic support for real-world target finding

2019

Locating places in cities is typically facilitated by handheld mobile devices, which draw the visual attention of the user on the screen of the device instead of the surroundings. In this research, we aim at strengthening the connection between people and their surroundings through enabling mid-air gestural interaction with real-world landmarks and delivering information through audio to retain users' visual attention on the scene. Recent research on gesture-based and haptic techniques for such purposes has mainly considered handheld devices that eventually direct users' attention back to the devices. We contribute a hand-worn, mid-air gestural interaction design with directional vibrotacti…

Computer scienceNovel interaction paradigmMobile computingAugmented reality02 engineering and technologyInteraction designManagement Science and Operations ResearchGestural inputHuman–computer interactionNovel interaction paradigms020204 information systems0202 electrical engineering electronic engineering information engineeringAuditory feedback; Augmented reality; Gestural input; Haptic devices; Novel interaction paradigms; Pointing; Ubiquitous and mobile computing design and evaluationHaptic devicesHaptic technologySettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuditory feedbackHaptic deviceSettore INF/01 - InformaticaUbiquitous and mobile computing design and evaluation020206 networking & telecommunicationsInteraction techniquePointingComputer Science ApplicationsHardware and ArchitectureAugmented realityMobile deviceAuditory feedbackGesturePersonal and Ubiquitous Computing
researchProduct

Bayesian metanetworks for modelling user preferences in mobile environment

2003

The problem of profiling and filtering is important particularly for mobile information systems where wireless network traffic and mobile terminal’s size are limited comparing to the Internet access from the PC. Dealing with uncertainty in this area is crucial and many researchers apply various probabilistic models. The main challenge of this paper is the multilevel probabilistic model (the Bayesian Metanetwork), which is an extension of traditional Bayesian networks. The extra level(s) in the Metanetwork is used to select the appropriate substructure from the basic network level based on contextual features from user’s profile (e.g. user’s location). Two models of the Metanetwork are consi…

Computer scienceWireless networkbusiness.industryBayesian probabilityProbabilistic logicMobile computingBayesian networkFeature selectionStatistical modelcomputer.software_genreTelecommunications networkThe InternetData miningbusinesscomputer
researchProduct

PV-Alert: A fog-based architecture for safeguarding vulnerable road users

2017

International audience; High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emer…

Computer science[SPI] Engineering Sciences [physics]Reliability (computer networking)mobile computingLatency (audio)traffic engineering computingCloud computing02 engineering and technologyFog ComputingComputer securitycomputer.software_genreroad vehicles[SPI]Engineering Sciences [physics]Low Latency0502 economics and businessPedestrian Safety0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureArchitecturewireless LANEdge computing050210 logistics & transportationbusiness.industry05 social sciencesLocation awarenessroad traffic020206 networking & telecommunicationsVehiclesEdge computingsmart phonesVulnerable Road UsersRoadsroad accidentsCrowd sensingAccidentsScalabilitymobile radioSafetybusinessroad safetycomputer
researchProduct

A continuous-space analytical approach for relay node placement in hybrid cellular and ad hoc networks

2009

A hybrid network is composed of a cellular component and an ad hoc component connected by a relay node, for the purpose of coverage extension and/or capacity improvement. In this paper, we analyze the capacity of such a hybrid network by employing a continuous-space analytical methodology based on circular geometry for uniformly distributed nodes. To achieve maximal overall capacity, the relay node needs to be placed in an optimum location between the base station and the mobile station located at the boundary of the hybrid network. Numerical results show that for obtaining the optimum overall capacity for the hybrid network, the placement of the relay node should be in a range which is nei…

Computer sciencebusiness.industryWireless ad hoc networkNode (networking)Mobile computinglaw.inventionBase stationChannel capacityRelaylawMobile stationComputer Science::Networking and Internet ArchitecturebusinessRelay channelComputer Science::Information TheoryComputer network2009 6th International Symposium on Wireless Communication Systems
researchProduct

iOS Applications Testing

2015

<p class="R-AbstractKeywords"><span lang="EN-US">Mobile applications conquer the world, but iOS devices hold the major share of tablets market among the corporate workers. This study aims to identify the aspects (i.e. features and/ or limitations) that influence the testing of the native iOS applications. The aspects related to general mobile applications testing are identified through the systematic literature review of academic sources. iOS applications testing aspects are identified through the review of non-academic (multivocal) literature sources. The identified aspects are merged and discussed in detail using the reviewed sources and based on the author’s professional expe…

Computer sciencemedia_common.quotation_subjectMobile computingData scienceSoftware qualityiOS application; mobile application; testing; quality; verification and validation; systematic literature review;World Wide WebSystematic reviewiOS applications; mobile computing; software testing; software qualityOrder (exchange)Software testingQuality (business)Software verification and validationmedia_common
researchProduct

Mobile Computing Environment

2002

Context-aware pervasive systemsUbiquitous computingbusiness.industryComputer scienceMobile stationMobile computingMobile searchMobile technologyMobile WebElectrical and Electronic EngineeringbusinessComputer networkAutonomic computingTelecommunications and Radio Engineering
researchProduct

A conceptual framework for ubiquitous mobile environments.

2008

The aim of this paper is to reflect upon and develop a conceptual framework that addresses the relationship between real and virtual life, with a particular focus on mobile gaming as one potential methodology for learning. The comprehension of the virtual-real life relationship is relevant not only to mobile gaming, but also to the ongoing discussions about and development of ubiquitous computing.

Context-aware pervasive systemsUbiquitous robotUbiquitous computingConceptual frameworkComputer scienceHuman–computer interactionMobile computingMobile searchMobile WebMobile technologyPORTABLE-POLYTRONIC 2008 - 2nd IEEE International Interdisciplinary Conference on Portable Information Devices and the 2008 7th IEEE Conference on Polymers and Adhesives in Microelectronics and Photonics
researchProduct