首页 > 最新文献

2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications最新文献

英文 中文
Mobile Cloud Application Models Facilitated by the CPA CPA推动的移动云应用模型
M. O'Sullivan, D. Grigoras
This paper describes implementations of two mobile cloud applications, file synchronisation and intensive data processing, using the Context Aware Mobile Cloud Services middleware, and the Cloud Personal Assistant. Both are part of the same mobile cloud project, actively developed and currently at the second version. We describe recent changes to the middleware, along with our experimental results of the two application models. We discuss challenges faced during the development of the middleware and their implications. The paper includes performance analysis of the CPA support for the two applications in respect to existing solutions.
本文描述了使用上下文感知移动云服务中间件和云个人助理的两个移动云应用程序的实现,即文件同步和密集数据处理。两者都是同一个移动云项目的一部分,目前正在积极开发第二个版本。我们描述了中间件最近的变化,以及两个应用程序模型的实验结果。我们将讨论中间件开发过程中面临的挑战及其含义。本文包括针对现有解决方案对这两个应用程序的CPA支持的性能分析。
{"title":"Mobile Cloud Application Models Facilitated by the CPA","authors":"M. O'Sullivan, D. Grigoras","doi":"10.4108/sis.2.4.e6","DOIUrl":"https://doi.org/10.4108/sis.2.4.e6","url":null,"abstract":"This paper describes implementations of two mobile cloud applications, file synchronisation and intensive data processing, using the Context Aware Mobile Cloud Services middleware, and the Cloud Personal Assistant. Both are part of the same mobile cloud project, actively developed and currently at the second version. We describe recent changes to the middleware, along with our experimental results of the two application models. We discuss challenges faced during the development of the middleware and their implications. The paper includes performance analysis of the CPA support for the two applications in respect to existing solutions.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124678523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Handoff Between Proxies in the Proxy-Based Mobile Computing System 基于代理的移动计算系统中的代理切换
Azade Khalaj, H. Lutfiyya
Research activities in the mobile computing field aim to find solutions for achieving the smoother access to remote online resources, such as cloud services, from client application found on mobile devices. The limited capabilities of mobile devices and also the unreliable condition of wireless environment are sources of challenges in achieving the mentioned goal. We have proposed a proxy-based mobile computing system that offloads compute-intensive tasks from mobile devices to proxies. Additionally, to handle the variation in connection quality, the proxies are chosen and changed dynamically to provide a better service quality for the client application. The result of our experiments shows the effectiveness of our approach in choosing the appropriate proxy and switching to a new proxy when it is needed.
移动计算领域的研究活动旨在寻找解决方案,以实现从移动设备上的客户端应用程序更顺畅地访问远程在线资源(如云服务)。移动设备的有限能力和无线环境的不可靠条件是实现上述目标的挑战来源。我们提出了一种基于代理的移动计算系统,将计算密集型任务从移动设备转移到代理上。此外,为了处理连接质量的变化,需要动态地选择和更改代理,以便为客户机应用程序提供更好的服务质量。实验结果表明,我们的方法在选择合适的代理和在需要时切换到新的代理方面是有效的。
{"title":"Handoff Between Proxies in the Proxy-Based Mobile Computing System","authors":"Azade Khalaj, H. Lutfiyya","doi":"10.1109/Mobilware.2013.17","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.17","url":null,"abstract":"Research activities in the mobile computing field aim to find solutions for achieving the smoother access to remote online resources, such as cloud services, from client application found on mobile devices. The limited capabilities of mobile devices and also the unreliable condition of wireless environment are sources of challenges in achieving the mentioned goal. We have proposed a proxy-based mobile computing system that offloads compute-intensive tasks from mobile devices to proxies. Additionally, to handle the variation in connection quality, the proxies are chosen and changed dynamically to provide a better service quality for the client application. The result of our experiments shows the effectiveness of our approach in choosing the appropriate proxy and switching to a new proxy when it is needed.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"7 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Middleware Approach to Provide Security in IEEE 802.15.4 Wireless Sensor Networks 在IEEE 802.15.4无线传感器网络中提供安全的中间件方法
S. Marchesani, L. Pomante, M. Pugliese, F. Santucci
Last years have seen the growth of interest for middleware exploitation in distributed resource-constrained systems as Wireless Sensor Networks (WSNs) are. A WSN is a versatile smart sensing system to support pervasive monitoring in a variety of applications. In this context available middleware platforms usually provide the Application Layer with different basic services, as shared memory or addressing repository, but do not usually provide security services such as secure links management protocol or intrusion detection. Nevertheless, since WSN applications normally require the collection and the aggregation of reliable measurements and data from the sensing units, secure communications should be guaranteed even in the presence of resource constraints. In this paper we then present a novel middleware approach that is directly tailored to an IEEE 802.15.4-based WSN. The security-related components of the proposed middleware include a light yet powerful cryptographic scheme (TAKS) and an Intrusion Detection System (WIDS): the former module exploits the topological properties of a WSN, while the latter one is based on a Weak Process Model approach.
最近几年,人们对分布式资源受限系统(如无线传感器网络)中中间件开发的兴趣有所增长。WSN是一种多功能智能传感系统,支持各种应用中的普适监控。在此上下文中,可用的中间件平台通常为应用层提供不同的基本服务,如共享内存或寻址存储库,但通常不提供安全服务,如安全链接管理协议或入侵检测。然而,由于WSN应用通常需要收集和汇总来自传感单元的可靠测量和数据,因此即使存在资源限制,也应保证安全通信。在本文中,我们提出了一种新的中间件方法,该方法直接针对基于IEEE 802.15.4的WSN进行了定制。所提出的中间件的安全相关组件包括轻量级但功能强大的加密方案(TAKS)和入侵检测系统(WIDS):前者模块利用WSN的拓扑特性,而后者基于弱过程模型方法。
{"title":"A Middleware Approach to Provide Security in IEEE 802.15.4 Wireless Sensor Networks","authors":"S. Marchesani, L. Pomante, M. Pugliese, F. Santucci","doi":"10.1109/Mobilware.2013.21","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.21","url":null,"abstract":"Last years have seen the growth of interest for middleware exploitation in distributed resource-constrained systems as Wireless Sensor Networks (WSNs) are. A WSN is a versatile smart sensing system to support pervasive monitoring in a variety of applications. In this context available middleware platforms usually provide the Application Layer with different basic services, as shared memory or addressing repository, but do not usually provide security services such as secure links management protocol or intrusion detection. Nevertheless, since WSN applications normally require the collection and the aggregation of reliable measurements and data from the sensing units, secure communications should be guaranteed even in the presence of resource constraints. In this paper we then present a novel middleware approach that is directly tailored to an IEEE 802.15.4-based WSN. The security-related components of the proposed middleware include a light yet powerful cryptographic scheme (TAKS) and an Intrusion Detection System (WIDS): the former module exploits the topological properties of a WSN, while the latter one is based on a Weak Process Model approach.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Natural Handwriting Algorithm for Tablets 平板电脑的自然手写算法
Kim Arvin S. Silvoza, Ryan A. Blonna, Rowel Atienza
Note-taking applications today have features that imitate the behavior of real handwriting such as smooth strokes, responsive interface, and stroke thinning. However, the problem is that the writing tools of these applications do not fully simulate the feel of their real counterpart. Some of these applications have flaws like unnatural pen thinning effect, pixelation of strokes, and lack of highlighter blending. To solve these, an iPad application with a custom smooth writing algorithm was developed. It was compared to five commercially available note-taking programs in the App Store.
今天的笔记应用程序具有模仿真实笔迹行为的功能,如平滑笔画、响应界面和笔画细化。然而,问题是这些应用程序的编写工具并不能完全模拟它们真正对应的感觉。其中一些应用程序有缺陷,如不自然的钢笔变薄效果,笔画像素化,缺乏高光笔混合。为了解决这些问题,开发了一个带有自定义平滑书写算法的iPad应用程序。研究人员将它与App Store中五款市面上的笔记软件进行了比较。
{"title":"A Natural Handwriting Algorithm for Tablets","authors":"Kim Arvin S. Silvoza, Ryan A. Blonna, Rowel Atienza","doi":"10.1109/Mobilware.2013.22","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.22","url":null,"abstract":"Note-taking applications today have features that imitate the behavior of real handwriting such as smooth strokes, responsive interface, and stroke thinning. However, the problem is that the writing tools of these applications do not fully simulate the feel of their real counterpart. Some of these applications have flaws like unnatural pen thinning effect, pixelation of strokes, and lack of highlighter blending. To solve these, an iPad application with a custom smooth writing algorithm was developed. It was compared to five commercially available note-taking programs in the App Store.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123485197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Mean-Variance Estimator Technique in Monitoring Applications Using Mobile Agents over Wireless Sensor Networks 均值方差估计技术在无线传感器网络移动代理监控中的应用
M. Pugliese, F. Santucci
We propose a reliable technique to detect behavior anomalies in monitoring critical infrastructures through resource constrained devices, for instance wireless sensor networks (WSNs). The study is specifically targeted to monitoring and alerting functionalities for homeland security, that typically enforce severe requirements to the detection process. Assuming the behavior of the characteristic operation indicators in a potentially large and complex infrastructure (such as buildings, bridges, nuclear power plants, aircrafts, etc.) to be bounded by design constraints, we can introduce a novel non-parametric detection technique that we denote as “MV-estimator-based” (where MV stands for sample mean and variance): the sample mean and the sample variance are computed from observations and behavior classification is performed by defining regions in the MV-estimator space instead of the observations space. It will be shown that the novel detection technique is able to provide better performance with respect to other approaches over resource constrained platforms such as WSN, and this will be substantiated by numerical results as well as by a detailed cost analysis. Moreover MVET operations into a clustered WSN are presented where MVET distributed functions are implemented by using mobile agents.
我们提出了一种可靠的技术来检测通过资源受限设备监测关键基础设施的行为异常,例如无线传感器网络(wsn)。该研究特别针对国土安全的监测和警报功能,这些功能通常对检测过程有严格的要求。假设在潜在的大型复杂基础设施(如建筑物、桥梁、核电站、飞机等)中,特征运行指标的行为受设计约束,我们可以引入一种新的非参数检测技术,我们将其称为“基于MV估计器”(其中MV代表样本均值和方差):从观测值中计算样本均值和样本方差,并通过在mv估计空间中定义区域而不是在观测空间中定义区域来进行行为分类。它将表明,相对于资源受限平台(如WSN)上的其他方法,这种新的检测技术能够提供更好的性能,这将通过数值结果以及详细的成本分析得到证实。此外,还提出了MVET在集群WSN中的操作,其中MVET的分布式功能通过移动代理实现。
{"title":"The Mean-Variance Estimator Technique in Monitoring Applications Using Mobile Agents over Wireless Sensor Networks","authors":"M. Pugliese, F. Santucci","doi":"10.1109/Mobilware.2013.26","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.26","url":null,"abstract":"We propose a reliable technique to detect behavior anomalies in monitoring critical infrastructures through resource constrained devices, for instance wireless sensor networks (WSNs). The study is specifically targeted to monitoring and alerting functionalities for homeland security, that typically enforce severe requirements to the detection process. Assuming the behavior of the characteristic operation indicators in a potentially large and complex infrastructure (such as buildings, bridges, nuclear power plants, aircrafts, etc.) to be bounded by design constraints, we can introduce a novel non-parametric detection technique that we denote as “MV-estimator-based” (where MV stands for sample mean and variance): the sample mean and the sample variance are computed from observations and behavior classification is performed by defining regions in the MV-estimator space instead of the observations space. It will be shown that the novel detection technique is able to provide better performance with respect to other approaches over resource constrained platforms such as WSN, and this will be substantiated by numerical results as well as by a detailed cost analysis. Moreover MVET operations into a clustered WSN are presented where MVET distributed functions are implemented by using mobile agents.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130697779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy Optimization Mechanism in Wireless Sensor Networks 无线传感器网络中的能量优化机制
H. Aoudia, Y. Touati, A. A. Chérif
Nowadays, wireless sensor networks (WSN) present a lot of interest in several research areas due to their wide range of applications. One of the most critical problems is how to ensure a better and efficient communication taking into account some constraints such as network lifetime and energy consumption. In this context and as an alternative, several papers focusing on the conception and development of robust routing protocols have been undertaken these last decades. In this paper, we propose a robust hierarchical routing protocol using a dynamic clustering mechanism (HRP-DCM) which consists to build clusters wherein coordinators nodes with extra privileges called Cluster-Head (CH) are able to create and manipulate messages using TDMA schedule and aggregate data according to CDMA method. The effectiveness of the proposed approach is illustrated in simulations.
目前,无线传感器网络(WSN)由于其广泛的应用范围而引起了许多研究领域的关注。其中最关键的问题之一是如何在考虑网络寿命和能耗等限制条件的情况下确保更好、更高效的通信。在这种背景下,作为一种替代方案,在过去的几十年里,已经有几篇论文专注于鲁棒路由协议的概念和发展。本文提出了一种基于动态集群机制(HRP-DCM)的鲁棒分层路由协议,该协议包括构建集群,其中具有集群头(CH)特权的协调节点能够使用TDMA调度创建和操作消息,并根据CDMA方法聚合数据。仿真结果表明了该方法的有效性。
{"title":"Energy Optimization Mechanism in Wireless Sensor Networks","authors":"H. Aoudia, Y. Touati, A. A. Chérif","doi":"10.1109/Mobilware.2013.28","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.28","url":null,"abstract":"Nowadays, wireless sensor networks (WSN) present a lot of interest in several research areas due to their wide range of applications. One of the most critical problems is how to ensure a better and efficient communication taking into account some constraints such as network lifetime and energy consumption. In this context and as an alternative, several papers focusing on the conception and development of robust routing protocols have been undertaken these last decades. In this paper, we propose a robust hierarchical routing protocol using a dynamic clustering mechanism (HRP-DCM) which consists to build clusters wherein coordinators nodes with extra privileges called Cluster-Head (CH) are able to create and manipulate messages using TDMA schedule and aggregate data according to CDMA method. The effectiveness of the proposed approach is illustrated in simulations.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social-Aware Differentiated Visibility of Home-to-Home Shared Resources in Spontaneous Networks 自发网络中家对家共享资源的社会意识差异化可见性
P. Bellavista, Carlo Giannelli, Stefano Poli
The widespread adoption of online social networking to upload and share user-generated personal content rises novel issues related to the management of content ownership and privacy. To retain content ownership, we have previously designed and implemented an original solution for social-driven content sharing in home-to-home federated and spontaneous networks. This paper relevantly enhances our solution by proposing novel mechanisms to tune the visibility of shared resources based on the dynamic evaluation of social relationship tightness, inferred through social data gathered from widespread online social networks. On the one hand, the proposal autonomously evaluates the tightness of social relationships based on the primary guideline that the more users interact the tighter their relationships are. Moreover, it determines a default decision tree suitable for many application scenarios and enables its dynamic personalization based on user's feedback. On the other hand, it defines and supports a grammar to define visibility filters: runtime visibility of shared resources is automatically tuned based on both relationship tightness and defined filters. The presented prototype demonstrates how to effectively design/implement the proposal and the feasibility of our approach in terms of performance.
广泛采用在线社交网络上传和分享用户生成的个人内容,引发了与内容所有权和隐私管理相关的新问题。为了保留内容所有权,我们之前设计并实现了一个原创的解决方案,用于在家庭到家庭的联合和自发网络中进行社交驱动的内容共享。本文通过提出基于社交关系紧密度动态评估的共享资源可见性的新机制(通过从广泛的在线社交网络收集的社交数据推断),对我们的解决方案进行了相应的改进。一方面,该提案基于用户互动越多,他们的关系越紧密这一基本准则,自主评估社会关系的紧密度。此外,它还确定了适合多种应用场景的默认决策树,并根据用户的反馈实现其动态个性化。另一方面,它定义并支持一种语法来定义可见性过滤器:共享资源的运行时可见性基于关系紧密性和定义的过滤器自动调优。所提出的原型演示了如何有效地设计/实施建议,以及我们的方法在性能方面的可行性。
{"title":"Social-Aware Differentiated Visibility of Home-to-Home Shared Resources in Spontaneous Networks","authors":"P. Bellavista, Carlo Giannelli, Stefano Poli","doi":"10.1109/Mobilware.2013.18","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.18","url":null,"abstract":"The widespread adoption of online social networking to upload and share user-generated personal content rises novel issues related to the management of content ownership and privacy. To retain content ownership, we have previously designed and implemented an original solution for social-driven content sharing in home-to-home federated and spontaneous networks. This paper relevantly enhances our solution by proposing novel mechanisms to tune the visibility of shared resources based on the dynamic evaluation of social relationship tightness, inferred through social data gathered from widespread online social networks. On the one hand, the proposal autonomously evaluates the tightness of social relationships based on the primary guideline that the more users interact the tighter their relationships are. Moreover, it determines a default decision tree suitable for many application scenarios and enables its dynamic personalization based on user's feedback. On the other hand, it defines and supports a grammar to define visibility filters: runtime visibility of shared resources is automatically tuned based on both relationship tightness and defined filters. The presented prototype demonstrates how to effectively design/implement the proposal and the feasibility of our approach in terms of performance.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114611602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobility Pattern Prediction to Support Opportunistic Networking in Smart Cities 移动模式预测以支持智慧城市中的机会联网
A. Morelli, C. Stefanelli, M. Tortonesi, Niranjan Suri
The ever increasing number of mobile devices in Smart Cities and their heavy use, not only for personal communication but also as a distributed network of sensors, generate a data deluge that stresses the traditional wireless communication infrastructure. The opportunistic networking paradigm seems particularly well suited to the Smart City scenario because it exploits resources that temporarily fall into the connection range of mobile devices as communication proxies, thereby providing cheaper and more energy efficient alternatives to the use of the cellular city network and actively contributing to its offloading. However, its efficacy highly depends on the effectiveness of discovering and using those resources. To improve the effectiveness of opportunistic networking in Smart Cities, we propose a solution which exploits a prediction model tailored for the urban environment that, by detecting complex recurring patterns in nodes' contacts, can forecast the future availability of strategic communication resources. Experimental results obtained in a simulated environment show that our solution can improve the dissemination process and ease the access to the wired network infrastructure.
智能城市中不断增加的移动设备及其大量使用,不仅用于个人通信,而且作为分布式传感器网络,产生了大量数据,对传统的无线通信基础设施造成了压力。机会主义网络模式似乎特别适合智慧城市场景,因为它利用暂时属于移动设备连接范围的资源作为通信代理,从而为蜂窝城市网络的使用提供更便宜、更节能的替代方案,并积极促进其卸载。然而,其有效性在很大程度上取决于发现和利用这些资源的有效性。为了提高智慧城市中机会网络的有效性,我们提出了一种解决方案,该解决方案利用为城市环境量身定制的预测模型,通过检测节点接触中的复杂重复模式,可以预测战略通信资源的未来可用性。在仿真环境下的实验结果表明,该方案可以改善传播过程,简化有线网络基础设施的接入。
{"title":"Mobility Pattern Prediction to Support Opportunistic Networking in Smart Cities","authors":"A. Morelli, C. Stefanelli, M. Tortonesi, Niranjan Suri","doi":"10.1109/Mobilware.2013.23","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.23","url":null,"abstract":"The ever increasing number of mobile devices in Smart Cities and their heavy use, not only for personal communication but also as a distributed network of sensors, generate a data deluge that stresses the traditional wireless communication infrastructure. The opportunistic networking paradigm seems particularly well suited to the Smart City scenario because it exploits resources that temporarily fall into the connection range of mobile devices as communication proxies, thereby providing cheaper and more energy efficient alternatives to the use of the cellular city network and actively contributing to its offloading. However, its efficacy highly depends on the effectiveness of discovering and using those resources. To improve the effectiveness of opportunistic networking in Smart Cities, we propose a solution which exploits a prediction model tailored for the urban environment that, by detecting complex recurring patterns in nodes' contacts, can forecast the future availability of strategic communication resources. Experimental results obtained in a simulated environment show that our solution can improve the dissemination process and ease the access to the wired network infrastructure.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Mobile-Based System for Content Delivery over SMS 基于移动的SMS内容传递系统
Mauro Teófilo, Daniel Risi, V. F. D. L. Junior, Thomaz Philippe Cavalcante Silva, Luiz Carlos A. M. Cavalcanti
The proliferation of mobile applications for smartphones has been based on the presence of a data connection between those devices and the Internet. Therefore, users of entry-level mobile phones as well as users who cannot afford a data plan are excluded from the current dynamics of mobile applications consumption. A possible approach to include those users is the usage of SMS as the communication channel. Although SMS is widely supported by carriers and extremely popular among users, it is not trivial to replace the data connection capabilities with SMS. This work addresses this issue with an integrated solution composed by a client platform and a server-side system.This solution enables GUI-based mobile applications to be transferred over a short number of concatenated SMSs. It also presents components for the creation, deployment and distribution of mobile applications. In order to attest the relevance of such solution, an experiment was conducted and its results indicate a substantial level of acceptance by target group.
智能手机移动应用程序的激增是基于这些设备与互联网之间存在数据连接。因此,入门级手机用户以及无法负担数据计划的用户被排除在当前移动应用程序消费的动态之外。包含这些用户的一种可能的方法是使用SMS作为通信渠道。虽然SMS得到了运营商的广泛支持,在用户中也非常受欢迎,但是用SMS代替数据连接功能并不是一件容易的事情。这项工作通过一个由客户端平台和服务器端系统组成的集成解决方案解决了这个问题。该解决方案使基于gui的移动应用程序能够通过少量连接的sms传输。它还提供了用于创建、部署和分发移动应用程序的组件。为了证明这种解决方案的相关性,进行了一项实验,其结果表明目标群体的接受程度很高。
{"title":"A Mobile-Based System for Content Delivery over SMS","authors":"Mauro Teófilo, Daniel Risi, V. F. D. L. Junior, Thomaz Philippe Cavalcante Silva, Luiz Carlos A. M. Cavalcanti","doi":"10.1109/Mobilware.2013.8","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.8","url":null,"abstract":"The proliferation of mobile applications for smartphones has been based on the presence of a data connection between those devices and the Internet. Therefore, users of entry-level mobile phones as well as users who cannot afford a data plan are excluded from the current dynamics of mobile applications consumption. A possible approach to include those users is the usage of SMS as the communication channel. Although SMS is widely supported by carriers and extremely popular among users, it is not trivial to replace the data connection capabilities with SMS. This work addresses this issue with an integrated solution composed by a client platform and a server-side system.This solution enables GUI-based mobile applications to be transferred over a short number of concatenated SMSs. It also presents components for the creation, deployment and distribution of mobile applications. In order to attest the relevance of such solution, an experiment was conducted and its results indicate a substantial level of acceptance by target group.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Virtual Machine for the Insense Language Insense语言的虚拟机
Callum Cameron, P. Harvey, J. Sventek
The Insense VM is a specialised Java virtual machine for running Insense programs on wireless sensor nodes. The VM runs on top of InceOS, a purpose-built operating system. A split VM architecture is used, in which Insense programs are compiled to Java classes, then linked and compacted on a more powerful machine into a form suitable for execution by the VM. Measurements demonstrate that the virtual machine achieves good performance and memory usage for realistic Insense programs.
Insense VM是一个专门用于在无线传感器节点上运行Insense程序的Java虚拟机。虚拟机运行在专用操作系统InceOS之上。使用了拆分VM架构,其中Insense程序被编译为Java类,然后在更强大的机器上链接和压缩为适合VM执行的形式。测试表明,虚拟机在实际的Insense程序中实现了良好的性能和内存使用。
{"title":"A Virtual Machine for the Insense Language","authors":"Callum Cameron, P. Harvey, J. Sventek","doi":"10.1109/Mobilware.2013.10","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.10","url":null,"abstract":"The Insense VM is a specialised Java virtual machine for running Insense programs on wireless sensor nodes. The VM runs on top of InceOS, a purpose-built operating system. A split VM architecture is used, in which Insense programs are compiled to Java classes, then linked and compacted on a more powerful machine into a form suitable for execution by the VM. Measurements demonstrate that the virtual machine achieves good performance and memory usage for realistic Insense programs.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121201175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1