Context Modelling Approaches for Mobile Systems

Author(s):  
Danilo Avola

The actual mobile technology and the increasing need to obtain rich multimedia content about each and every aspect of the human life are changing the approach of the users to the World Wide Web. Indeed, the pervasive use of mobile devices and the heterogeneity of the provided services and information make the accessibility and usability of the Web resources a hard assignment. In particular two main tasks have been identified as focal issues, the first one regards the choose of a suitable model to express the complex activities of the Web (context modeling approaches), and the second one regards the translation of the different schemas, representing these Web activities, in a more suitable, manageable and standardizing schema. In this chapter we will present the problems related to the modeling of context data, and we will describe the actual and future approaches of Context Modeling according to the mobile devices world.

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Qingqing Xie ◽  
Fan Dong ◽  
Xia Feng

The blockchain technology achieves security by sacrificing prohibitive storage and computation resources. However, in mobile systems, the mobile devices usually offer weak computation and storage resources. It prohibits the wide application of the blockchain technology. Edge computing appears with strong resources and inherent decentralization, which can provide a natural solution to overcoming the resource-insufficiency problem. However, applying edge computing directly can only relieve some storage and computation pressure. There are some other open problems, such as improving confirmation latency, throughput, and regulation. To this end, we propose an edge-computing-based lightweight blockchain framework (ECLB) for mobile systems. This paper introduces a novel set of ledger structures and designs a transaction consensus protocol to achieve superior performance. Moreover, considering the permissioned blockchain setting, we specifically utilize some cryptographic methods to design a pluggable transaction regulation module. Finally, our security analysis and performance evaluation show that ECLB can retain the security of Bitcoin-like blockchain and better performance of ledger storage cost in mobile devices, block mining computation cost, throughput, transaction confirmation latency, and transaction regulation cost.


Author(s):  
Prajit Kumar Das ◽  
Dibyajyoti Ghosh ◽  
Pramod Jagtap ◽  
Anupam Joshi ◽  
Tim Finin

Contemporary smartphones are capable of generating and transmitting large amounts of data about their users. Recent advances in collaborative context modeling combined with a lack of adequate permission model for handling dynamic context sharing on mobile platforms have led to the emergence of a new class of mobile applications that can access and share embedded sensor and context data. Most of the time such data is used for providing tailored services to the user but it can lead to serious breaches of privacy. We use Semantic Web technologies to create a rich notion of context. We also discuss challenges for context aware mobile platforms and present approaches to manage data flow on these devices using semantically rich fine-grained context-based policies that allow users to define their privacy and security need using tools we provide.


Author(s):  
Katie Crowley ◽  
Ian Pitt

This chapter discusses the use of commercial Brain Computer Interfaces to monitor the emotions and interactions of a subject as they use a system. Tracking how a user interacts with a system, and the emotion-based responses that are invoked as they interact with the system, yield very valuable datasets for the development of intelligent, adaptive systems. The proliferation of mobile devices as an emerging platform offers scope for the development of the relationship between Brain Computer Interfaces and mobile technology, towards ubiquitous, minimally invasive, mobile systems.


Author(s):  
Ewa Janczukowicz ◽  
Ahmed Bouabdallah ◽  
Arnaud Braud ◽  
Stéphane Tuffin ◽  
Jean-Marie Bonnin

Firefox OS is an operating system for mobile devices. It is developed by Mozilla and is based on web technologies. Developed applications are therefore not tied to a given type of hardware. Mozilla works on standardisation of Web APIs, so that the device hardware could be accessed more easily. It also introduced its sign-in system for the Web and furthermore, it wants to redefine the way payments work for mobile applications. Firefox OS is not directly competing with Android and iOS, although it has some common target markets with Android. It could be an opportunity to weaken the iOS and Android duopoly. For now it targets users that don't have smartphones yet and is mostly used on low-end devices. The biggest challenge of Firefox OS is to assure a stable position in the mobile OS ecosystem and to get a large volume of users. Mozilla has an ambition to improve the web and make the web the platform. However developing the Firefox OS and ensuring its important place on the market is difficult because of technological and business limits that will be discussed in this chapter.


Author(s):  
Amit Kumar Sinha

E-commerce and internet businesses are driving the rapid growth of the domestic IT-ITeS industry, attracting unprecedented global interest and funding. Indian e-commerce and internet companies are growing rapidly with about 460 million internet users and a tele-density of around 85.2%. Increasing penetration of the internet, adoption of smartphones and minimal effort low-cost mobile devices, changing demographics, mobile-empowered youth, and the emergence of tier 2 and tier 3 cities as major shopping hubs have been driving the growth of the industry, with new retail forces shifting its dynamics. Furthermore, the continued growth of large pure-play organisations that are powerhouses has moved retailers' focus to the web channel. These companies are not only becoming gateways to product research, but have also introduced consumers to new ways of viewing the retail process.


2011 ◽  
pp. 706-723
Author(s):  
Myung-Woo Park ◽  
Yeon-Seok Kim ◽  
Kyong-Ho Lee

Mobile devices enabled with Web services are being considered as equal participants of the Web services environment. The frequent mobility of devices and the intermittent disconnection of wireless network require migrating or replicating Web services onto adjacent devices appropriately. This article proposes an efficient method for migrating and replicating Web services among mobile devices through code splitting. Specifically, the proposed method splits the source code of a Web service into subcodes based on users’ preferences for its constituent operations. The subcode with a higher preference is migrated earlier than others. The proposed method also replicates a Web service to other devices to enhance its performance by considering context information such as network traffic or the parameter size of its operations. To evaluate the performance of the proposed method, the effect of the code splitting on migration was analyzed. Furthermore, to show the feasibility of the proposed migration method, three application scenarios were devised and implemented.


2010 ◽  
Vol 1 (4) ◽  
pp. 1-24 ◽  
Author(s):  
Josephina Antoniou ◽  
Christophoros Christophorou ◽  
Augusto Neto ◽  
Susana Sargento ◽  
Filipe Pinto ◽  
...  

The increase of networking complexity requires the design of new performance optimization schemes for delivering different types of sessions to users under different conditions. In this regard, special attention is given to multi-homed environments, where mobile devices cross areas with overlapping access technologies (Wi-Fi, 3G, WiMax). In such a scenario, efficient multiparty delivery depends upon the grouping operation, which must be done based on several parameters. In this paper, the authors propose context-aware sub-grouping of content-based service groups so that the same service session can be delivered using different codings of the same content, adapting to current network, users, session, and environment context. The context-aware information is used to improve the sub-grouping process. This paper aims to describe these sub-grouping techniques, and in particular how they improve network performance and user experience in the future Internet by focusing on the improved network-level and session-level mechanisms.


Author(s):  
John Garofalakis ◽  
Theodoula Giannakoudi ◽  
Yannis Panagis ◽  
Evangelos Sakkopoulos ◽  
Athanasios Tsakalidis

In this chapter, an information acquisition system is proposed which aims to provide log analysis, dealing with ubiquitous access media, by use of semantic knowledge. The lately emerging figure of the semantic Web, the ontologies, may be used to exalt the Web trails to a semantic level so as to reveal their deeper usage information. The proposed architecture, which is presented in detail, intends to overcome mobile devices’ trail duplicates problems and detect semantic operations similarity of server Web services, which are often composed to provide a function. The references that supplement the chapter provide publications that discuss mainly log file mining and analysis and semantic similarity. Useful technology-used URL resources are also provided.


Sign in / Sign up

Export Citation Format

Share Document