624,234 research outputs found

    Seamless mobility with personal servers

    Get PDF
    We describe the concept and the taxonomy of personal servers, and their implications in seamless mobility. Personal servers could offer electronic services independently of network availability or quality, provide a greater flexibility in the choice of user access device, and support the key concept of continuous user experience. We describe the organization of mobile and remote personal servers, define three relevant communication modes, and discuss means for users to exploit seamless services on the personal server

    Global Trends in Mobile Technology and Their Impact on Your Library

    Full text link
    Contrary to the impression of many Americans, some less technologically developed countries are more actively using mobile technology than we are. As mobile technology is exploding in both our personal and professional lives, this is impacting our libraries and our users as they reach out to us with their mobile devices. This article will examine some of these trends and discuss ways that libraries can begin to institute mobile services even if they do not have a lot of funds or technical expertise. Results of a survey of how ACL libraries are using mobile services in their libraries are discussed

    Money Walks: A Human-Centric Study on the Economics of Personal Mobile Data

    Full text link
    In the context of a myriad of mobile apps which collect personally identifiable information (PII) and a prospective market place of personal data, we investigate a user-centric monetary valuation of mobile PII. During a 6-week long user study in a living lab deployment with 60 participants, we collected their daily valuations of 4 categories of mobile PII (communication, e.g. phonecalls made/received, applications, e.g. time spent on different apps, location and media, photos taken) at three levels of complexity (individual data points, aggregated statistics and processed, i.e. meaningful interpretations of the data). In order to obtain honest valuations, we employ a reverse second price auction mechanism. Our findings show that the most sensitive and valued category of personal information is location. We report statistically significant associations between actual mobile usage, personal dispositions, and bidding behavior. Finally, we outline key implications for the design of mobile services and future markets of personal data.Comment: 15 pages, 2 figures. To appear in ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp 2014

    Harnessing mobile technology for classroom learning

    No full text
    Educational institutions are reluctant adopt mobile computing and Wireless technologies. This is because this technology remains relatively expensive compared to traditional computing technologies, mobile devices are inherently personal and can be difficult to use as a teaching tool to groups of learners, and Short Message Services and Multimedia Message Services (SMS/MMS) are expensive and limited in functional scope despite their popularity amongst young people. In this paper, we describe a component of a prototype learning environment named Quest where we propose anew way of harnessing mobile technology for learning that negates these drawbacks. In Quest we have demonstrated that the information gathering capabilities of mobile phones can be harnessed to aid learners research

    Securing personal distributed environments

    Get PDF
    The Personal Distributed Environment (PDE) is a new concept being developed by Mobile VCE allowing future mobile users flexible access to their information and services. Unlike traditional mobile communications, the PDE user no longer needs to establish his or her personal communication link solely through one subscribing network but rather a diversity of disparate devices and access technologies whenever and wherever he or she requires. Depending on the services’ availability and coverage in the location, the PDE communication configuration could be, for instance, via a mobile radio system and a wireless ad hoc network or a digital broadcast system and a fixed telephone network. This new form of communication configuration inherently imposes newer and higher security challenges relating to identity and authorising issues especially when the number of involved entities, accessible network nodes and service providers, builds up. These also include the issue of how the subscribed service and the user’s personal information can be securely and seamlessly handed over via multiple networks, all of which can be changing dynamically. Without such security, users and operators will not be prepared to trust their information to other networks

    Advanced Positioning and Location based services in 4G Mobile-IP Radio Access Networks

    Get PDF
    2004 IEEE 15TH IEEE International Symposium on personal, indoor and mobile radio communications (PIMRC 2004), Barcelona, Spain, 5-8 september 2004.This paper proposes an evolved architecture from 3G networks to provide basic and advanced positioning methods for location based services in mobile IPv6-based radio access networks. We start analyzing current status of location-based services (i.e. LBS or LCS) and architectures in 3G networks as well as state-of-the-art research on LBS and mobile Internet. Next we set the requirements the solution should fulfill. We continue proposing the evolved architecture for support of basic and advanced positioning methods, using MIPv6 and HMIPv6 as mobility scenario for the mobile IPv6 based RAN, describing element's functions and changes from current approaches as well as description of the dynamic behavior. We complete the proposal with a bandwidth analysis of the signaling, identifying issues when planning implementation of LCS services in the network

    Keyword based categorisation of diary entries to support personal Internet content pre-caching on mobile devices

    Get PDF
    This paper presents a study into the effectiveness of our algorithm for automatic categorisation of real users' diary entries, as a first step towards personal Internet content pre-caching on mobile devices. The study reports an experiment comparing trial subjects allocations of 99 diary entries to those predicted by a keyword-based algorithm. While leaving considerable grounds for improvement, results are positive and show pave the way for supporting mobile services based on categorising users' diary entries

    Enabling pervasive computing with smart phones

    Get PDF
    The authors discuss their experience with a number of mobile telephony projects carried out in the context of the European Union Information Society Technologies research program, which aims to develop mobile information services. They identify areas where use of smart phones can enable pervasive computing and offer practical advice in terms of lessons learned. To this end, they first look at the mobile telephone as * the end point of a mobile information service,* the control device for ubiquitous systems management and configuration,* the networking hub for personal and body area networks, and* identification tokens.They conclude with a discussion of business and practical issues that play a significant role in deploying research systems in realistic situations
    • 

    corecore