87 research outputs found
Mobile Data Management
The management of data in the mobile computing environment offers new challenging problems. Existing software needs to be upgraded to accommodate this environment. To do so, the critical parameters need to be understood and defined. We have surveyed some problems and existing solution
GSM mobility management using an intelligent network platform
PhDAbstract not availabl
A Survey on Security for Mobile Devices
Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has signicantly increased due to the dierent form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi-Fi. In the same trend, the number and typologies of vulnerabilities exploiting these services and communication channels have increased as well. Therefore, smartphones may now represent an ideal target for malware writers. As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers. Due to the fact that this research eld is immature and still unexplored in depth, with this paper we aim to provide a structured and comprehensive overview of the research on security solutions for mobile devices. This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011. We focus on high-level attacks, such those to user applications, through SMS/MMS, denial-of-service, overcharging and privacy. We group existing approaches aimed at protecting mobile devices against these classes of attacks into dierent categories, based upon the detection principles, architectures, collected data and operating systems, especially focusing on IDS-based models and tools. With this categorization we aim to provide an easy and concise view of the underlying model adopted by each approach
Techniques of distributed caching and terminal tracking for mobile computing.
by Chiu-Fai Fong.Thesis (M.Phil.)--Chinese University of Hong Kong, 1997.Includes bibliographical references (leaves 76-81).Abstract --- p.iAcknowledgments --- p.iiiChapter 1 --- Introduction --- p.1Chapter 1.1 --- Distributed Data Caching --- p.2Chapter 1.2 --- Mobile Terminal Tracking --- p.5Chapter 1.3 --- Thesis Overview --- p.10Chapter 2 --- Personal Communication Network --- p.11Chapter 2.1 --- Network Architecture --- p.11Chapter 2.2 --- Resource Limitations --- p.13Chapter 2.3 --- Mobility --- p.14Chapter 3 --- Distributed Data Caching --- p.17Chapter 3.1 --- System Model --- p.18Chapter 3.1.1 --- The Wireless Network Environment --- p.18Chapter 3.1.2 --- Caching Protocol --- p.19Chapter 3.2 --- Caching at Mobile Computers --- p.22Chapter 3.3 --- Broadcasting at the Server --- p.24Chapter 3.3.1 --- Passive Strategy --- p.27Chapter 3.3.2 --- Active Strategy --- p.27Chapter 3.4 --- Performance Analysis --- p.29Chapter 3.4.1 --- Bandwidth Requirements --- p.29Chapter 3.4.2 --- Lower Bound on the Optimal Bandwidth Consumption --- p.30Chapter 3.4.3 --- The Read Response Time --- p.32Chapter 3.5 --- Experiments --- p.35Chapter 3.6 --- Mobility Concerns --- p.42Chapter 4 --- Mobile Terminal Tracking --- p.44Chapter 4.1 --- Movement Model --- p.45Chapter 4.2 --- Optimal Paging --- p.48Chapter 4.3 --- Transient Analysis --- p.52Chapter 4.3.1 --- The Time-Based Protocol --- p.55Chapter 4.3.2 --- Distance-Based Protocol --- p.59Chapter 4.4 --- The Reverse-Guessing Protocol --- p.64Chapter 4.5 --- Experiments --- p.66Chapter 5 --- Conclusions & Future Work --- p.71Chapter 5.1 --- Distributed Data Caching --- p.72Chapter 5.2 --- Mobile Terminal Tracking --- p.73Bibliography --- p.76A Proof of NP-hardness of the Broadcast Set Assignment Problem --- p.8
- ā¦