𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Mobile Computing, Applications, and Services: First International ICST Conference, MobiCASE 2009, San Diego, CA, USA, October 26-29, 2009, Revised Selected ... and Telecommunications Engineering)

✍ Scribed by Petros Zerfos, Rebecca Montanari, Thomas Phan


Publisher
Springer
Year
2010
Tongue
English
Leaves
417
Edition
1st Edition.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This proceedings volume includes the full research papers presented at the First International Conference on Mobile Computing, Applications, and Services (MobiCASE) held in San Diego, California, on October 26-29, 2009. MobiCASE highlights state-of-the-art academic and industry research work in domain topics above the OSI transport layer with an emphasis on complete end-to-end systems and their components. Its vision is largely influenced by what we see in the consumer space today: high-end mobile phones, high-bandwidth wireless networks, novel consumer and enterprise mobile applications, scalable software infrastructures, and of course an increasingly larger user base that is moving towards an almost all-mobile lifestyle.

✦ Table of Contents


Mobile Computing,
Applications, and Services......Page 1
Lecture Notes of the Institute
for Computer Sciences, Social-Informatics
and Telecommunications Engineering 35......Page 2
ISBN 3642126065......Page 4
Preface......Page 5
Organization......Page 7
Table of Contents......Page 9
Motivation......Page 13
Related Work......Page 14
Movement Analysis......Page 15
Audio Analysis......Page 17
Development Framework......Page 18
Prototype......Page 19
Hardware......Page 20
Software......Page 22
Experimental Results......Page 23
Conclusion and Future Work......Page 24
References......Page 26
Introduction......Page 27
Obesity Crisis......Page 29
Related Work......Page 30
Architecture......Page 31
Symbian Operating System......Page 32
Windows Mobile Operating System......Page 33
Android Operating System......Page 34
Conclusions......Page 35
References......Page 36
Introduction......Page 38
Related Work......Page 39
Understanding Context-Aware Authentication Scenario......Page 41
Architecture......Page 42
Design......Page 45
Scenario 1......Page 47
Access Rules and Policies......Page 48
Cloning or Theft of a User’s Device......Page 50
Other Attacks......Page 51
Future Work......Page 52
References......Page 53
Introduction......Page 54
Virtualization in the Mobile Space......Page 56
Experiment......Page 58
Mobile Virtualization and Migration – Some Research Questions......Page 61
Related Work......Page 64
References......Page 65
Introduction......Page 67
Related Work......Page 69
Preliminaries......Page 70
Estimation of Missing State Information and Expected Error......Page 72
A Case Study: Two-State DTMC......Page 76
Analytical Results......Page 77
Simulation Results......Page 78
Optimal Sensor Idle Intervals for Different Energy Budget......Page 80
References......Page 82
Introduction......Page 84
Application Requirements......Page 86
Preliminaries......Page 88
SEAIT Architecture......Page 89
Information Service......Page 90
Reporting Service......Page 92
Synchronization Service......Page 93
Semantics-Based Wakeups......Page 94
Associating Cars to a Train......Page 96
Consist Identification Application......Page 97
Evaluation......Page 98
References......Page 102
Introduction......Page 104
Related Work......Page 105
Real-Time Tracker......Page 107
Service Alerts......Page 108
Trip Planner......Page 109
History and Current Use......Page 110
Implementation......Page 111
Automatic Learning of User Travel Patterns......Page 113
Automatic Notification......Page 115
Transit Travel Behavior......Page 116
Conclusion......Page 117
References......Page 118
Introduction......Page 119
Mobile Advertising - Actors and Value Creation......Page 120
Mobile Advertising - Targeting and Personalisation......Page 121
Technological Setup and Provisioning of the Solution......Page 123
Service Description......Page 125
Research Design......Page 128
Pilot Results: User Experience......Page 129
Technological Possibilities and Challenges......Page 131
Conclusions: The Way Ahead......Page 134
References......Page 135
Introduction......Page 137
Existing Mashup Development Environments and Tools......Page 138
Introduction to Qt......Page 139
Qt and Web Development......Page 140
Sample Mashups......Page 141
QtFlickr: Animated Flickr Photo Viewer......Page 142
QtWeatherCameras: Live Road Weather......Page 146
QtMapNews: Geotagged RSS Feed Viewer......Page 147
QtScrapBook: Web Camera Scrapbook......Page 148
QtComics: Comic Strip Viewer......Page 149
General Experiences and Comments......Page 150
Comments Related to Mobile Mashups......Page 152
Comments Related to Qt......Page 153
References......Page 154
Introduction......Page 156
Overview......Page 157
Data Center Infrastructure......Page 158
Architecture......Page 159
Thermal State Detection......Page 162
Infrastructure Utilization......Page 163
Energy Consumption......Page 164
Root Cause Analysis......Page 165
References......Page 166
Introduction......Page 168
System Architecture......Page 169
Features......Page 171
Invitation and Registration......Page 172
Location Based Services......Page 174
Human Powered Questions and Answers......Page 179
Other Features......Page 180
Lessons Learned......Page 181
Conclusions and Future Work......Page 182
References......Page 183
Introduction......Page 184
Online Clustering Classifier......Page 185
Activity Feature Vector......Page 187
Distance Measurement......Page 188
Anomaly Detection Accuracy......Page 189
Cross-User Model Portability......Page 193
Related Work......Page 194
References......Page 195
Introduction......Page 197
Motivation......Page 199
Problem Formulation......Page 201
Dynamic Programming......Page 203
Optimal Localization Error......Page 205
Prediction Opportunity......Page 206
EnLoc: System Solution......Page 207
Evaluation......Page 210
Limitations and Future Work......Page 214
References......Page 215
Introduction......Page 217
Passive RFID Tags in Existing Architectures......Page 218
Applying Vector Clocks to Passive Elements......Page 219
Pervasive Game as an Application Example......Page 221
Experimental Results......Page 223
Related Work......Page 228
Analysis of the Limitations......Page 229
Conclusion and Research Perspectives......Page 231
References......Page 233
Introduction......Page 235
Competitive Group Exercise......Page 237
Light Weight Wireless Smartphone......Page 238
Music Recommendation......Page 241
Interval Training Game with Social Network......Page 245
The Effect of Interval Training Guidance Systems......Page 247
A Music Recommendation System Suitable for Interval Training Exercise......Page 249
References......Page 250
Introduction......Page 253
Cool Agent Personal Assistant......Page 255
Spam Filters......Page 256
Approach – Ranking Emails......Page 257
Context Representation......Page 258
Architecture......Page 259
Rule System......Page 260
Structure of the Email Rule System......Page 261
Baseline......Page 263
Effectiveness Testing......Page 264
Variation of Effectiveness with Customization......Page 266
PMA Action Sampling......Page 268
Conclusion......Page 269
References......Page 270
Introduction......Page 272
Background and Related Work......Page 274
BMO Meeting Scheduling Model......Page 275
BMO Architecture......Page 276
Secretary Agent Side......Page 277
Client Side......Page 278
Implementation......Page 279
Experiments and Data Analysis......Page 281
Conclusion and Next Steps......Page 283
References......Page 284
Introduction......Page 285
Problems with Mobile Development......Page 286
Requirements......Page 287
Requirements from Existing Applications......Page 288
Requirements Analysis......Page 291
Evaluation of Existing Runtime Environments......Page 292
SMS and Voice......Page 293
Flash Lite / Silverlight......Page 294
Evaluation of HTML5+GL......Page 295
Good Distribution......Page 296
Use of Limited Resources......Page 297
Server Interaction......Page 298
Application Trial......Page 299
Discussion......Page 300
Conclusion......Page 301
References......Page 302
Introduction......Page 304
Related Work......Page 305
Summary of Our Approach......Page 306
Labeling with Graph Cut Optimization......Page 307
Transition Smoothing in the Gradient Domain......Page 309
Discretization of the Poisson Equation......Page 310
Implementation 1: Sequential Image Blending......Page 311
Implementation 2: Global Image Blending......Page 312
Applications to Panorama Stitching for Outdoor Scenes......Page 313
Applications to Panorama Stitching for Low Light Scenes......Page 315
Conclusions and Discussion......Page 316
References......Page 317
Introduction......Page 318
Related Work......Page 319
Pocket Pal......Page 320
Other Potential Applications......Page 321
Lighting Condition......Page 322
Text Skew......Page 323
Misalignment......Page 324
System Architecture and Implementation......Page 326
Phone Client......Page 327
Back-End Server......Page 329
Performance Metrics......Page 330
Experimental Results and Analysis......Page 331
Text Detection from Complex Background......Page 335
References......Page 336
Introduction......Page 338
Case 1: No Tolerance Range......Page 339
Measuring QoINF Accuracy and Communication Overheads......Page 340
References......Page 341
Introduction......Page 342
Behavior-Based Intimate Social Network......Page 343
Implementation......Page 344
References......Page 345
Introduction......Page 346
Demonstration......Page 347
Conclusion......Page 348
References......Page 349
Related Work......Page 350
Usability Testing - Comparative Study between Application and Improved Prototype......Page 351
Perception of Security......Page 352
Privacy Guidelines......Page 353
References......Page 354
Introduction......Page 355
Related Work......Page 356
Software......Page 357
Data Collection and Analysis......Page 358
Naive Bayes Classification......Page 360
Elevator Activity Detection......Page 361
Indoor Localization......Page 363
Analysis......Page 364
References......Page 365
Introduction......Page 367
Related Work......Page 368
Delay between Random Source and Destination......Page 369
Delay from Multiple Sources to One Sink......Page 371
References......Page 375
Introduction......Page 378
Related Work......Page 379
System Outline and Security......Page 380
Protecting the Evidence Gathering Process......Page 381
Computing the Veracity of a Claim......Page 382
Applications......Page 383
References......Page 384
Introduction......Page 386
Item-Based Collaborative Filtering......Page 387
A Decentralized Recommender System for PDAs......Page 388
Context-Aware, Hybrid Item Recommendation......Page 391
Context Score Function......Page 392
Mobile Tourist Guide......Page 393
Related Work......Page 394
References......Page 395
Introduction......Page 396
Motivation......Page 397
Related Work......Page 398
Platform......Page 399
Contextual Information......Page 400
Phone as a Remote Control......Page 402
Results......Page 404
Limitations......Page 405
References......Page 406
Introduction......Page 407
Other Mobile Experiments in Museums......Page 408
Plug, the Secrets of the Museum......Page 409
The Museum Conventions Disrupted by Scrambled Visits: Pervasiveness Challenging Orientation......Page 410
From Univocal Text to Double Narrative......Page 411
Shared Mobility: Collective Writing......Page 412
Conclusion: Design Lessons in Pervasive Applications......Page 413
Creating Double Layers of Text......Page 414
References......Page 415
Author Index......Page 416


πŸ“œ SIMILAR VOLUMES


Mobile Computing, Applications, and Serv
✍ Kyle Dorman, Marjan Yahyanejad, Ani Nahapetian, Myung-kyung Suh, Majid Sarrafzad πŸ“‚ Library πŸ“… 2010 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This proceedings volume includes the full research papers presented at the First Int- national Conference on Mobile Computing, Applications, and Services (MobiCASE) held in San Diego, California, during October 26-29, 2009. It was sponsored by ICST and held in conjunction with the First Workshop

Mobile Computing, Applications, and Serv
✍ Victor K. Y. Wu, Roy H. Campbell (auth.), Martin Gris, Guang Yang (eds.) πŸ“‚ Library πŸ“… 2012 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Mobile Computing, Applications, and Services (MobiCASE 2010) held in Santa Clara, CA, USA, during October 25-28, 2010. The 15 revised full papers presented were carefully selected f

Mobile Computing, Applications, and Serv
✍ Pang Wu, Huan-Kai Peng, Jiang Zhu, Ying Zhang (auth.), Joy Ying Zhang, Jarek Wil πŸ“‚ Library πŸ“… 2012 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Mobile Computing, Applications, and Services (MobiCASE 2011) held in Los Angeles, CA, USA, during October 24-27, 2010. The 18 revised full papers presented together with 12 revised p

Auctions, Market Mechanisms and Their Ap
✍ Sanmay Das, Michael Ostrovsky, David Pennock, Boleslaw Szymanski πŸ“‚ Library πŸ“… 2009 🌐 English

This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference on Auctions, Market Mechanisms and Their Applications, AMMA 2009, held in Boston, MA, USA, in May 2009. The 16 revised papers presented were carefully reviewed and selected from 38 s

Mobile Lightweight Wireless Systems: Fir
✍ Fabrizio Granelli, Charalabos Skianis, Periklis Chatzimisios, Yang Xiao, Simone πŸ“‚ Library πŸ“… 2009 🌐 English

This book constitutes the proceedings of the First International ICST Conference, MOBILIGHT 2009 held in Athens, Greece in May 2009. The 40 full papers presented focus on topics such as WPAN, WLAN, WMAN/cellular as well as architectures and design methodologies to support seamless access to the com

Smart Multimedia: Second International C
✍ Troy McDaniel, Stefano Berretti, Igor D. D. Curcio, Anup Basu πŸ“‚ Library πŸ“… 2020 πŸ› Springer International Publishing;Springer 🌐 English

<p><p>This book constitutes the proceedings of the Second International Conference on Smart Multimedia, ICSM 2019, which was held in San Diego, CA, USA, in December 2019.</p><p></p><p>The 45 papers presented were selected from about 100 submissions and are grouped in sections on 3D mesh and depth im