The notion of ambient e-services is defined in this paper to identify a new scope of mobile e-services. The notable features of ambient e-services are the exhilarated linkage based on social context and significantly rapid growth of connections. We present an ambient e-service framework that characterizes ambient e-services with three dimensions (value stack, environment stack and technology stack). Several ambient e-service applications are also exemplified, which rest on the mobile peer-to-peer technology and ambient context aware sensors environments. Ambient e-services make a mobile user not only connect to dynamic ambient environments but also cooperate with other mobile users in the nearby surrounding environment, capitalizing dynamic environmental values as well as dynamic social values. We also present an Ambient e-Service Embracing Model (ASEM) framework that addresses the core elements required for fostering the growth of ambient e-services and steering the directions of future relevant research
{"title":"A Roadmap to Ambient e-Service","authors":"Yuanchu Hwang, Soe-Tsyr Yuan","doi":"10.1109/WMCS.2005.3","DOIUrl":"https://doi.org/10.1109/WMCS.2005.3","url":null,"abstract":"The notion of ambient e-services is defined in this paper to identify a new scope of mobile e-services. The notable features of ambient e-services are the exhilarated linkage based on social context and significantly rapid growth of connections. We present an ambient e-service framework that characterizes ambient e-services with three dimensions (value stack, environment stack and technology stack). Several ambient e-service applications are also exemplified, which rest on the mobile peer-to-peer technology and ambient context aware sensors environments. Ambient e-services make a mobile user not only connect to dynamic ambient environments but also cooperate with other mobile users in the nearby surrounding environment, capitalizing dynamic environmental values as well as dynamic social values. We also present an Ambient e-Service Embracing Model (ASEM) framework that addresses the core elements required for fostering the growth of ambient e-services and steering the directions of future relevant research","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130191035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile multi-agent systems (MAS) systems can be used with real success in a growing number of eCommerce applications nowadays. Security has been identified as numerous times by different researchers as a top criterion for the acceptance of mobile agent adoption. In this paper, we present an in-depth analysis of behavior patterns of a mobile MAS platform when using different cryptographic protocols to assure communication and migration integrity and confidentiality. Different use case sceneries of eCommerce applications as well as many other aspects have been studied, such as overhead, different communication patterns, different loads and bandwidth issues. This work is also extensible to other mobile and non-mobile MAS platforms. The results obtained can be used and should be taken into account by designers and implementers of secure mobile and also non-mobile agent platforms and agents
{"title":"Behavioral Pattern Analysis of Secure Migration and Communications in eCommerce using Cryptographic Protocols on a Mobile MAS Platform","authors":"S. Pozo, R. M. Gasca, R. Ceballos","doi":"10.1109/WMCS.2005.6","DOIUrl":"https://doi.org/10.1109/WMCS.2005.6","url":null,"abstract":"Mobile multi-agent systems (MAS) systems can be used with real success in a growing number of eCommerce applications nowadays. Security has been identified as numerous times by different researchers as a top criterion for the acceptance of mobile agent adoption. In this paper, we present an in-depth analysis of behavior patterns of a mobile MAS platform when using different cryptographic protocols to assure communication and migration integrity and confidentiality. Different use case sceneries of eCommerce applications as well as many other aspects have been studied, such as overhead, different communication patterns, different loads and bandwidth issues. This work is also extensible to other mobile and non-mobile MAS platforms. The results obtained can be used and should be taken into account by designers and implementers of secure mobile and also non-mobile agent platforms and agents","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130801134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Personalised, location-related and differentiated services in the mobile digital economy create a demand for suitable pricing models. In the case of disaggregated "microservices" (e.g., small digitalized information or service units), as well as for the acquisition of low-value physical goods, the deployment of micropayments seems appropriate. This paper analyzes the economic efficiency of marginal transaction amounts in M-Commerce by applying the theoretical approach of transaction cost economics. For this purpose, a separation of technical and cognitive transaction costs is applied. The influence of selected determinants such as specifity, uncertainty and bounded rationality on transaction costs in mobile commerce micropayments is analyzed. The theoretical results imply a more likely application of micropayments for physical goods such as beverages or parking tickets than for digital goods and services. In addition, indicators for a significant above-zero lower limit of transaction amounts in mobile commerce are presented
{"title":"The Efficiency of Decreasing Payment Amounts in Mobile Commerce and Ubiquitous Computing","authors":"D. Gille","doi":"10.1109/WMCS.2005.26","DOIUrl":"https://doi.org/10.1109/WMCS.2005.26","url":null,"abstract":"Personalised, location-related and differentiated services in the mobile digital economy create a demand for suitable pricing models. In the case of disaggregated \"microservices\" (e.g., small digitalized information or service units), as well as for the acquisition of low-value physical goods, the deployment of micropayments seems appropriate. This paper analyzes the economic efficiency of marginal transaction amounts in M-Commerce by applying the theoretical approach of transaction cost economics. For this purpose, a separation of technical and cognitive transaction costs is applied. The influence of selected determinants such as specifity, uncertainty and bounded rationality on transaction costs in mobile commerce micropayments is analyzed. The theoretical results imply a more likely application of micropayments for physical goods such as beverages or parking tickets than for digital goods and services. In addition, indicators for a significant above-zero lower limit of transaction amounts in mobile commerce are presented","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134486276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In addition to mobility, the ability of context awareness and especially location awareness has greatly enhanced the opportunities of mobile businesses. Many different kinds of context-aware services ranging from "finding nearby restaurants" to "sending ambulances to people in emergency" have already taken their places in the business. Besides availability and quality of the service, the user acceptance and therefore the economic success of mobile business applications fundamentally depend on a robust and easy-to-use security architecture meeting the users' needs for privacy, anonymity, confidential communication and secure payment schemes. Based on a generic framework that is able to execute arbitrary context-aware services, we analyse the security challenges in mobile business with special focus on location as a context property and provide directions towards possible solutions
{"title":"Security Challenges of Location-Aware Mobile Business","authors":"E. I. Tatli, D. Stegemann, S. Lucks","doi":"10.1109/WMCS.2005.23","DOIUrl":"https://doi.org/10.1109/WMCS.2005.23","url":null,"abstract":"In addition to mobility, the ability of context awareness and especially location awareness has greatly enhanced the opportunities of mobile businesses. Many different kinds of context-aware services ranging from \"finding nearby restaurants\" to \"sending ambulances to people in emergency\" have already taken their places in the business. Besides availability and quality of the service, the user acceptance and therefore the economic success of mobile business applications fundamentally depend on a robust and easy-to-use security architecture meeting the users' needs for privacy, anonymity, confidential communication and secure payment schemes. Based on a generic framework that is able to execute arbitrary context-aware services, we analyse the security challenges in mobile business with special focus on location as a context property and provide directions towards possible solutions","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"713 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116124989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In mobile ubiquitous computing environments, users will be able to interact with different devices, providing them with many services. The technological heterogeneity of these environments is expected to increase overall system complexity. Flexibility and adaptability thus become key requirements. The goal of the IST-Simplicity project is to design, develop and evaluate an architectural framework supporting easy customization of terminals, services and networks in a consistent manner. In this paper, we present results from focus groups that have provided valuable user feedback on the concepts, user scenarios and business models developed during the project
{"title":"User Expectations for Simple Mobile Ubiquitous Computing Environments","authors":"M. C. Brugnoli, J. Hamard, E. Rukzio","doi":"10.1109/WMCS.2005.27","DOIUrl":"https://doi.org/10.1109/WMCS.2005.27","url":null,"abstract":"In mobile ubiquitous computing environments, users will be able to interact with different devices, providing them with many services. The technological heterogeneity of these environments is expected to increase overall system complexity. Flexibility and adaptability thus become key requirements. The goal of the IST-Simplicity project is to design, develop and evaluate an architectural framework supporting easy customization of terminals, services and networks in a consistent manner. In this paper, we present results from focus groups that have provided valuable user feedback on the concepts, user scenarios and business models developed during the project","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115103629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Luley, A. Aimer, C. Seifert, G. Fritz, L. Paletta
We describe a system which proposes a solution for multi-sensor object awareness and positioning to enable stable location awareness for a mobile service in urban areas. The system offers technology of outdoors vision based object recognition that will extend state-of-the-art location and context aware services towards object based awareness in urban environments. In the proposed application scenario, tourist pedestrians are equipped with a GPRS or UMTS capable camera-phone. They are interested whether their field of view contains tourist sights that would point to more detailed information. Multimedia type data about related history might be explored by a mobile user who is intending to learn within the urban environment. Ambient learning is in this way achieved by pointing the device towards the urban sight, capturing an image, and consequently getting information about the object on site and within the focus of attention, i.e., the user's current field of view. The described mobile system offers multiple opportunities for application in both mobile business and commerce, and is currently developed towards an industrial prototype
{"title":"A Multi-Sensor System for Mobile Services with Vision Enhanced Object and Location Awareness","authors":"P. Luley, A. Aimer, C. Seifert, G. Fritz, L. Paletta","doi":"10.1109/WMCS.2005.1","DOIUrl":"https://doi.org/10.1109/WMCS.2005.1","url":null,"abstract":"We describe a system which proposes a solution for multi-sensor object awareness and positioning to enable stable location awareness for a mobile service in urban areas. The system offers technology of outdoors vision based object recognition that will extend state-of-the-art location and context aware services towards object based awareness in urban environments. In the proposed application scenario, tourist pedestrians are equipped with a GPRS or UMTS capable camera-phone. They are interested whether their field of view contains tourist sights that would point to more detailed information. Multimedia type data about related history might be explored by a mobile user who is intending to learn within the urban environment. Ambient learning is in this way achieved by pointing the device towards the urban sight, capturing an image, and consequently getting information about the object on site and within the focus of attention, i.e., the user's current field of view. The described mobile system offers multiple opportunities for application in both mobile business and commerce, and is currently developed towards an industrial prototype","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130849846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Designing mobile services and the business models behind them is a complex undertaking. A business model can be seen as a blueprint of four interrelated components: service offering, technical architecture, and organizational and financial arrangements. How these different components are related to one another, is hardly been object of research. In this paper the connections between these components are explored by analyzing the critical design issues, e.g. targeting, branding and customer retention in the service domain, security, quality of service and system integration in the technology domain, network governance in the organization domain, and revenue sharing in the finance domain. These critical design issues are linked to each other and to expected customer value and expected network value in a conceptual model
{"title":"Developing Mobile Services: Balancing Customer and Network Value","authors":"H. Bouwman, T. Haaker, E. Faber","doi":"10.1109/WMCS.2005.10","DOIUrl":"https://doi.org/10.1109/WMCS.2005.10","url":null,"abstract":"Designing mobile services and the business models behind them is a complex undertaking. A business model can be seen as a blueprint of four interrelated components: service offering, technical architecture, and organizational and financial arrangements. How these different components are related to one another, is hardly been object of research. In this paper the connections between these components are explored by analyzing the critical design issues, e.g. targeting, branding and customer retention in the service domain, security, quality of service and system integration in the technology domain, network governance in the organization domain, and revenue sharing in the finance domain. These critical design issues are linked to each other and to expected customer value and expected network value in a conceptual model","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"22 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120856645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless LANs not only provide an affective means of communication, but also allow to extract information about the location of mobile stations. Numerous wireless LAN location systems have been proposed in the past, yet it is difficult to compare the performance of different systems, since the conditions under which these systems are evaluated differ considerably. Hence, the accuracy information presented in literature varies widely, even for conceptually identical systems. This paper proposes to evaluate the performance of location systems in standardised test environments. To this end, existing location systems are discussed to assess their information requirements and their reported accuracies. Subsequently, the requirements for benchmarks in the context of Wireless LAN location systems are established. To conclude, a publicly available benchmark is presented against which different Wireless LAN location systems can be compared
{"title":"Benchmarking Wireless LAN Location Systems Wireless LAN Location Systems","authors":"M. Wallbaum, S. Diepolder","doi":"10.1109/WMCS.2005.7","DOIUrl":"https://doi.org/10.1109/WMCS.2005.7","url":null,"abstract":"Wireless LANs not only provide an affective means of communication, but also allow to extract information about the location of mobile stations. Numerous wireless LAN location systems have been proposed in the past, yet it is difficult to compare the performance of different systems, since the conditions under which these systems are evaluated differ considerably. Hence, the accuracy information presented in literature varies widely, even for conceptually identical systems. This paper proposes to evaluate the performance of location systems in standardised test environments. To this end, existing location systems are discussed to assess their information requirements and their reported accuracies. Subsequently, the requirements for benchmarks in the context of Wireless LAN location systems are established. To conclude, a publicly available benchmark is presented against which different Wireless LAN location systems can be compared","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125999007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rebecca Bulander, M. Decker, Gunther Schiefer, B. Kölmel
Mobile terminals, such as cellular phones and PDAs, have an enormous advertising potential: they are extremely popular and most people carry such devices with them all day, enabling personalized advertising. However, there is a serious danger that the Spam wave, known from e-mail communication, will spillover to mobile devices. In addition, it is important to take protection of private data seriously, because mobile terminals are also used for personal communication. In this article, we discuss the special features and challenges of mobile advertising and introduce the MoMa-system for mobile advertising. MoMa supports personalized advertising using context information while guaranteeing data protection. We also name criteria for the comparison of mobile advertising systems and apply them to compare MoMa to other approaches
{"title":"Comparison of Different Approaches for Mobile Advertising","authors":"Rebecca Bulander, M. Decker, Gunther Schiefer, B. Kölmel","doi":"10.1109/WMCS.2005.8","DOIUrl":"https://doi.org/10.1109/WMCS.2005.8","url":null,"abstract":"Mobile terminals, such as cellular phones and PDAs, have an enormous advertising potential: they are extremely popular and most people carry such devices with them all day, enabling personalized advertising. However, there is a serious danger that the Spam wave, known from e-mail communication, will spillover to mobile devices. In addition, it is important to take protection of private data seriously, because mobile terminals are also used for personal communication. In this article, we discuss the special features and challenges of mobile advertising and introduce the MoMa-system for mobile advertising. MoMa supports personalized advertising using context information while guaranteeing data protection. We also name criteria for the comparison of mobile advertising systems and apply them to compare MoMa to other approaches","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122659790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Buchholz, I. Hochstatter, Claudia Linnhoff-Popien
Large scale mobile commerce applications need to be replicated and distributed to offer an appropriate quality of service to a large audience. In this context, a very important question is when and where replicas should be placed. In this article we present a new distribution strategy for applications in content delivery networks (CDNs). It is intended to be used especially for context-aware services (CAS). The main idea is to monetarily value the benefits that an additional replica gains at a certain location and to compare this value with the costs a replica causes. In this way, the replica's contribution to the overall profit is determined. A replica's profit is dependent on the number of requests it receives per time interval. Replicas are only placed at locations where the request rate is high enough to let the profit become positive. In order to react only to persistent and significant changes of the request rate, techniques from statistical process control are used. The new strategy is evaluated by simulation. The results suggest that it consumes significantly less storage and bandwidth than currently applied alternatives, while offering a comparable performance improvement for the clients
{"title":"A profit maximizing distribution strategy for context-aware services","authors":"Thomas Buchholz, I. Hochstatter, Claudia Linnhoff-Popien","doi":"10.1109/WMCS.2005.2","DOIUrl":"https://doi.org/10.1109/WMCS.2005.2","url":null,"abstract":"Large scale mobile commerce applications need to be replicated and distributed to offer an appropriate quality of service to a large audience. In this context, a very important question is when and where replicas should be placed. In this article we present a new distribution strategy for applications in content delivery networks (CDNs). It is intended to be used especially for context-aware services (CAS). The main idea is to monetarily value the benefits that an additional replica gains at a certain location and to compare this value with the costs a replica causes. In this way, the replica's contribution to the overall profit is determined. A replica's profit is dependent on the number of requests it receives per time interval. Replicas are only placed at locations where the request rate is high enough to let the profit become positive. In order to react only to persistent and significant changes of the request rate, techniques from statistical process control are used. The new strategy is evaluated by simulation. The results suggest that it consumes significantly less storage and bandwidth than currently applied alternatives, while offering a comparable performance improvement for the clients","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}