Search results for "mobile computing"

showing 10 items of 128 documents

Towards a Reference Architecture for Model-Driven Business Apps

2016

Model-driven development techniques have been proposed for cross-platform app development. Typically, an individual domain-specific language (DSL) is used. The MD² framework consists of a DSL for business apps and generators, which transform a domain model to native platform code. Prior research on it focused on language and general generator design, this paper accentuates the code generation stage. A reference architecture for the generated apps is proposed to accelerate the development of new generators for which architectural decisions had been made on ad-hoc basis up to now. Moreover, generators are going to expose similar structures that facilitate maintenance. Our proposal takes MD²'s…

Flexibility (engineering)Enterprise architecture frameworkbusiness.industryComputer scienceMobile computing020207 software engineering02 engineering and technologySoftwareApplications architectureBusiness architecture0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingCode generationReference architectureSoftware engineeringbusiness2016 49th Hawaii International Conference on System Sciences (HICSS)
researchProduct

Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study

2016

In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…

General Computer Scienceinformation securityComputer scienceMobile computingresource allocationMobile Web02 engineering and technologyComputer securitycomputer.software_genreSecurity information and event managementPublic land mobile network0203 mechanical engineeringSecurity association0202 electrical engineering electronic engineering information engineeringMobile paymentGeneral Materials ScienceResource managementCloud computing securityIMT AdvancedGeneral EngineeringPhysical layer020302 automobile design & engineering020206 networking & telecommunicationsInformation securityComputer security modelultra-dense networksSecurity serviceNetwork Access ControlNetwork security policyResource allocationlcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971computer5GEfficient energy useIEEE Access
researchProduct

QoS Mechanisms for IEEE 802.11 Wireless LANs

2004

Currently the Internet provides users with access to information across the world using IP technology. Until now most access points to the Internet have been fixed stations at given locations, but with increasing sales of mobile devices, mobility has become a major trend. Therefore, the Internet is becoming more and more heterogeneous due to the recent explosion of wireless networks. The IEEE 802.11 wireless LAN (WLAN) is the most widely used WLAN standard nowadays. Currently the IEEE 802.11 standard specifies an over-the-air interface between wireless devices. However, QoS services over this technology are still being defined aiming to provide support to multiple applications. Thus, a larg…

IEEE 802.11uWi-Fi arrayComputer scienceInter-Access Point ProtocolMobile computinglaw.inventionIEEE 802.11lawWireless lanInternet ProtocolWirelessFixed wirelessIEEE 802.11sbusiness.industryWireless networkQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Multimedia ExtensionsTelecommunications networkWLAN Authentication and Privacy InfrastructureWireless site surveyThe InternetIEEE 802.11e-2005businessTelecommunicationsMobile deviceNeuRFonComputer network
researchProduct

Data management and concurrency control in broadcast based asymmetric environments

2006

Masteroppgave i informasjons- og kommunikasjonsteknologi 2006 - Høgskolen i Agder, Grimstad Tens of millions of users have personal handheld devices with several network interfaces built-in, and the number of users and of network interfaces included are only increasing. This growth suggests a need for new methods to disseminate data to multiple clients, and cyclic broadcast is one approach. We do a survey on the various data management protocols that describe how to broadcast the data, and the concurrency control protocols that make sure all access to the database is consistent. The various data management and concurrency control techniques deals with the restrictions in asymmetric broadcas…

IKT590Data DisseminationConcurrency ControlVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Kommunikasjon og distribuerte systemer: 423VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Databaser og multimediasystemer: 428Data BroadcastData ManagementMobile Computing
researchProduct

To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications

2007

User's privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model which tackles the problem from the perspective of trade-off between privacy and trust, where the user takes the decision with minimal privacy loss. To support the user decision, we introduce the Mobile Access Control List (Macl), a privacy management mechanism which takes into account the user attitude towards mobile sharing, his communication history and social network relationships.

Information privacySocial networkPrivacy by Designbusiness.industryPrivacy softwareComputer scienceInternet privacySocial softwareMobile computingConceptual model (computer science)computer.software_genreWorld Wide WebbusinesscomputerAccess control list
researchProduct

Exploration of Location-Based Services Adoption

2011

The purpose of this chapter is to explore aspects of user perceptions of their use of location-based services. As mobile technologies become more ubiquitous in the general population, it is reasonable to assume that individuals will consume services and software to enhance their aspirations and entertainment desires. This study begins by constructing a location-based service prototype simulation. It then conducts an experiment and analysis based on the Unified Theory of Acceptance and Use of Technology (UTAUT) model. A survey was developed to extract usage information from participants, followed by an analysis of the results using PLS. The analysis shows significant indicators that suggest …

Knowledge managementComputer Networks and CommunicationsComputer scienceStrategy and Managementmedia_common.quotation_subjectPopulationMobile computingPLSUnified theory of acceptance and use of technologyManagement Information SystemsEntertainmentWorld Wide WebEarly adopterSoftwarePerceptionLocation-Based ServicesMobile technologyMarketingSurveyeducationmedia_commonMarketingService (business)ta113education.field_of_studybusiness.industryBusiness and Management/dk/atira/pure/core/subjects/businessPrototypeComputer Science ApplicationsLocation-based serviceMobile telephonyUTAUTbusinessInternational journal of e-services and mobile applications
researchProduct

Introduction to Information and Communication Technologies for Development (ICTD) Minitrack: Contributing to Human Development and Social Justice

2015

This minitrack explores opportunities to use Information and communication technologies to promote human development and social justice. In the early days this field began with radio and television as tools to help improve the lives of marginalized communities, but this has now become a global movement of people using computers, the internet, and mobile devices to help human development. Information technologies have become more accessible, more used, and more relevant than ever in the lives of people around the world. A growing body of scholars and researchers work to understand, design, evaluate and critique ICTD interventions, which can bring numerous benefits as well as unanticipated ne…

Knowledge managementbusiness.industryMobile computingBroadband communicationSocial justiceHuman development (humanity)Social sciencesInformation and Communications TechnologyInformation systemDesarrollo humanoBusinessInformation and communication technologies for developmentMobile telephonyCiencias socialesJusticia social
researchProduct

Mobile Communities in Developing Countries

2010

The number of mobile devices has exceeded four billions and is still growing. Especially in developing countries mobile devices are often the only access to Internet and digital services. In the most developed countries laptops, Wi-Fi and faster and faster wireless telecom networks have for long time made mobile access to various digital services possible while on the move. Still, large and instant mobile communities can only rely on more portable devices, such as mobile phones. In this paper we will analyze various mobile communities and the support they are offered by the social media sites. We will discuss the phenomena encountered in developing countries, like how the mobile technology …

Management information systemsbusiness.industryComputer scienceInternet privacyMobile computingMobile technologySocial mediaThe InternetMobile business developmentMobile telephonybusinessMobile device2010 Eleventh International Conference on Mobile Data Management
researchProduct

Transaction management for m-commerce at a mobile terminal

2006

Although there has been a lot of discussion of "transactions" in mobile e-commerce (m-commerce), very little attention has been paid for distributed transactional properties of the computations facilitating m-commerce. In this paper, we first present a requirement analysis and then present a wireless terminal-based transaction manager (TM) architecture. This architecture is based on the assumption that there is an application that supports certain business transaction(s) and that it uses the TM to store transactional state information and retrieve it after a communication link, application, or terminal crash. We present the design of such a TM, including the application interface, modules a…

MarketingDatabaseComputer Networks and CommunicationsComputer scienceTransaction processingbusiness.industryCompensating transactionDistributed computingMobile commerceMobile computingcomputer.software_genreExtreme Transaction ProcessingComputer Science ApplicationsTerminal (electronics)SerializabilityServerManagement of Technology and InnovationDistributed transactionTransaction processing systemOnline transaction processingbusinessDatabase transactioncomputerComputer networkElectronic Commerce Research and Applications
researchProduct

Mobile Application Diffusion and Success: An Interpretative Approach to Influential Factors

2018

The rapid evolution of mobile computing technology has been attributed to the increasing capitalizing by companies on this innovative business medium. The result of conformity between technology advancement and market demand increment for mobility has led to the development of different categories of mobile businesses in recent years. This research reviews the previous related literature to the subject and by deploying meta-synthesis as a systematic quantitative method; a generic model covering important factors contributing to mobile application diffusion is presented. The proposed comprehensive model consists of users' specifications, technical aspects and contextual factors in the first …

MarketingKnowledge managementComputer Networks and CommunicationsComputer sciencebusiness.industryStrategy and Managementmedia_common.quotation_subject05 social sciencesMobile computingConformityComputer Science ApplicationsManagement Information Systems0502 economics and business050211 marketingDiffusion (business)business050203 business & managementmedia_common
researchProduct