Journal articles on the topic 'Ubiquitous and mobile computing'

To see the other types of publications on this topic, follow the link: Ubiquitous and mobile computing.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Ubiquitous and mobile computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Scholtz, Jean. "Ubiquitous computing goes mobile." ACM SIGMOBILE Mobile Computing and Communications Review 5, no. 3 (July 2001): 32–38. http://dx.doi.org/10.1145/584051.584054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Y. F. R., and C. Petrie. "Guest editor's introduction - Ubiquitous mobile computing." IEEE Internet Computing 7, no. 2 (March 2003): 16–17. http://dx.doi.org/10.1109/mic.2003.1189184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

SATOH, I. "Mobile Applications in Ubiquitous Computing Environments." IEICE Transactions on Communications E88-B, no. 3 (March 1, 2005): 1026–33. http://dx.doi.org/10.1093/ietcom/e88-b.3.1026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gelogo, Yvette E., and Haeng-Kon Kim. "Integration of Mobile Computing to Ubiquitous Healthcare." International Journal of Software Engineering and Its Applications 9, no. 9 (September 30, 2015): 295–302. http://dx.doi.org/10.14257/ijseia.2015.9.9.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Satyanarayanan, M. "A catalyst for mobile and ubiquitous computing." IEEE Pervasive Computing 1, no. 1 (January 2002): 2–5. http://dx.doi.org/10.1109/mprv.2002.993138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Mo, Yunhao Liu, and Xiang-Yang Li. "Mobile Sensing and Actuating with Ubiquitous Computing." International Journal of Distributed Sensor Networks 8, no. 7 (January 2012): 296396. http://dx.doi.org/10.1155/2012/296396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Liang, Olivier Julien, Elena-Simona Lohan, Gonzalo Seco-Granados, and Ruizhi Chen. "Mobile Geospatial Computing Systems for Ubiquitous Positioning." Mobile Information Systems 2018 (June 20, 2018): 1–2. http://dx.doi.org/10.1155/2018/9138095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kurkovsky, Stan, and Karthik Harihar. "Using ubiquitous computing in interactive mobile marketing." Personal and Ubiquitous Computing 10, no. 4 (September 29, 2005): 227–40. http://dx.doi.org/10.1007/s00779-005-0044-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sarode, Neeta P., and Dr J. W. Bakal. "Mobile Cloud Computing as Competence Intensifier." International Journal of Engineering and Computer Science 8, no. 06 (June 14, 2019): 24693–97. http://dx.doi.org/10.18535/ijecs/v8i06.4330.

Full text
Abstract:
Since the arrival of mobile devices, such as Personal Digital Assistants (PDA’s), smartphones, tablets etc., and their amalgamation with cloud computing is bringing up and transforming ubiquitous computing into actual existence. This concept of ubiquitous computing straightens out the way to unusual and experimental applications, in which the mobile devices are integrated and provide assistance to the users. This paper discusses about the concept of mobile cloud computing, identify advantages and disadvantages of collaborating mobile applications with cloud and identify benefits of leveraging mobile learning services on cloud. Mobile cloud computing induces innumerable benefits and overcomes the technical limitations of mobile learning.
APA, Harvard, Vancouver, ISO, and other styles
10

J, Samuel Manoharan. "REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS." IRO Journal on Sustainable Wireless Systems 01, no. 03 (September 13, 2019): 176–88. http://dx.doi.org/10.36548/jsws.2019.3.004.

Full text
Abstract:
The cloud that frame the future of the computing has become more popular nowadays due to its numerous attractive benefits such as self-servicing, resource-pooling, elasticity, improved-scalability, resilience , and operational and migration flexibility. This server-client model with the pay per usage facility is described by the NIST as the enabling, on-demand, convenient-network access, with shared pool of computing resources that are provided swiftly with the minimal efforts of management and interactions. The paper gives a brief review on the continuous cloud computing services, explaining its ubiquity, and then proceeds with the usefulness of the cloud services in the personal mobile network, that could enable an enhancement in the performance of the personal mobile network in the future.
APA, Harvard, Vancouver, ISO, and other styles
11

Hsu, Ching-Hsien, and Emmanuel Udoh. "Mobile and Wireless Computing towards Sustainable and Ubiquitous Clouds Services." International Journal of Grid and High Performance Computing 5, no. 3 (July 2013): 1–5. http://dx.doi.org/10.4018/jghpc.2013070101.

Full text
Abstract:
The ever-growing cloud computing and services provide dynamic intelligence and play an increasingly critical role in all aspects of our lives. By taking advantage of virtualized resources, cloud computing services presents an attractive means to address the challenges while realizing the potential of Mobile and Wireless Computing (MWC). The MWC paradigm can be generalized to include mobile devices, which not only incorporate sophisticated methods for users to interact with the online world through numerous applications in their devices, but are endowed with multiple sensors that enable them to contribute data as nodes in the IoT. In this context, mobile cloud services that enable widespread data collection through mobile devices and collaborative use of mobile devices to enhance existing and realize new applications are very much of interest. As such, the MWC has come to the picture seeking solutions for computing and IT infrastructures to be energy efficient and environmentally friendly. This special issue is in response to the increasing convergence between MWC and cloud services, while different approaches exist, challenges and opportunities are numerous in this context. The research papers selected for this special issue represent recent progresses in the field, including works on services computing and modeling, mobile cloud, U-Care cloud, vehicle networks, energy-aware architectures, and wireless sensor network technologies and applications. This special issue includes four extended version of the selected paper originally presented at the 17th Mobile Computing Workshop (MC 2012) and the 8th Workshop on Wireless, Ad Hoc and Sensor Networks (WASN 2012), held at Taipei, Taiwan; one extended version of the selected paper originally presented at the 4th IEEE International Conference on Cloud Computing Technology and Science (IEEE CloudCom 2012), held at Taipei, Taiwan; and one regular submission with 20% average acceptance rate for 2012 submissions in IJGHPC. The papers selected for this issue not only contribute valuable insights and results but also have particular relevance to the mobile, wireless and cloud computing community. All of them present high quality results for tackling problems arising from the ever-growing mobile and cloud services. We believe that this special issue provides novel ideas and state-of-the-art techniques in the field, and stimulates future research in the mobile and wireless services in clouds.
APA, Harvard, Vancouver, ISO, and other styles
12

Joshi, Anupam, Tim Finin, Lalana Kagal, Jim Parker, and Anand Patwardhan. "Security policies and trust in ubiquitous computing." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, no. 1881 (July 31, 2008): 3769–80. http://dx.doi.org/10.1098/rsta.2008.0142.

Full text
Abstract:
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
APA, Harvard, Vancouver, ISO, and other styles
13

Rath, Mamata. "A Methodical Analysis of Application of Emerging Ubiquitous Computing Technology With Fog Computing and IoT in Diversified Fields and Challenges of Cloud Computing." International Journal of Information Communication Technologies and Human Development 10, no. 2 (April 2018): 15–27. http://dx.doi.org/10.4018/ijicthd.2018040102.

Full text
Abstract:
In current technological scenario, most of the electronic equipment, computing machines and mobile devices are interconnected through wireless networks thus gradually enhancing the computing paradigm to an emerging and revolutionary technology of ubiquitous computing. The vision of this promising technology is a cyberspace and computing environment surrounded by processors, computing equipment and peripheral devices communicating with each other very actively with easy accessibility of anything almost in every time. Ubiquitous computing will encompass clients with an agreeable and helpful data condition that unions physical and computational foundations into incorporated natural surroundings. This living space will include an expansion of hundreds or thousands of computing gadgets and sensors that will give new usefulness, offer specific administrations, and lift efficiency and cooperation. The current research article projects on basic computing theme on application challenges using mobile computing, emergence of fog computing and how more technical challenges were solved using IoT and ubiquitous computing from social, health care and networking point of view.
APA, Harvard, Vancouver, ISO, and other styles
14

Huang, Su-Zhen, Min Wu, and Yong-Hua Xiong. "Mobile Transparent Computing to Enable Ubiquitous Operating Systems and Applications." Journal of Advanced Computational Intelligence and Intelligent Informatics 18, no. 1 (January 20, 2014): 32–39. http://dx.doi.org/10.20965/jaciii.2014.p0032.

Full text
Abstract:
Mobile devices have emerged as an indispensable part of our daily life, one that has resulted in an increased demand for mobile devices to be able to access the Internet and obtain a variety of network services. However, mobile devices are often constrained by limited storage, huge power consumption, and low processing capability. This paper presents a new computing mode, mobile transparent computing (MTC), which combines ubiquitous mobile networks with transparent computing, to address the above challenges and possibly to enable a new world of ubiquitous operating systems (OSes) and applications with the following characteristics: (1) Mobile devices with no OSes pre-installed are able to load and boot multiple OSes on demand through a transparent network; (2) All resources, including the operating system (OS), applications, and user data, are stored on a transparent server (TS) rather than a mobile terminal, and can be streamed to be executed on mobile devices in small execution blocks; (3) All the personalized services (applications and data) can be synchronized to any other devices with the same user credential. Specifically, we propose a Pre OS technique, which can achieve feature (1) in the MTC model by initializing the mobile device and driving a network interface card (NIC) prior to OS loading, thereby transferring the needed OS streaming block to the mobile device. Experimental results conducted on the tablet demo-board with the model OK6410 based on the ARM11 architecture demonstrate that the Pre OS is able to support remote boot and streaming execution for both Android and Linux OS with satisfactory performance.
APA, Harvard, Vancouver, ISO, and other styles
15

Seo, DongBum, You-Boo Jeon, Song-Hee Lee, and Keun-Ho Lee. "Cloud computing for ubiquitous computing on M2M and IoT environment mobile application." Cluster Computing 19, no. 2 (May 11, 2016): 1001–13. http://dx.doi.org/10.1007/s10586-016-0573-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Rath, Mamata, and Rachita Misra. "An Exhaustive Study and Analysis of Assorted Application and Challenges in Fog Computing and Emerging Ubiquitous Computing Technology." International Journal of Applied Evolutionary Computation 9, no. 2 (April 2018): 17–32. http://dx.doi.org/10.4018/ijaec.2018040102.

Full text
Abstract:
The growing demand of new technology is impulsively observing the introduction of an innovative and computing paradigm that guarantees to profoundly affect the way we associate with PCs, electronic gadgets, mobile devices, cyber spaces, and associate peripherals. This new emerging technology, called ubiquitous computing, imagines a world where inserted processors, PCs, sensors, and advanced correspondences are reasonable products that are accessible all around any time. Ubiquitous computing will encompass clients with an agreeable and helpful data condition that unions physical and computational foundations into incorporated natural surroundings. This living space will include an expansion of hundreds or thousands of computing gadgets and sensors that will give new usefulness, offer specific administrations, and lift efficiency and cooperation. The current research article projects on basic computing theme on application challenges using mobile computing, emergence of fog computing and how more technical challenges were solved using IoT and ubiquitous computing from social, health care and networking point of view.
APA, Harvard, Vancouver, ISO, and other styles
17

Kim, Seonho, Miyoun Yoon, and Yongtae Shin. "Server Selection Algorithm of Mobile Host for Ubiquitous Computing." KIPS Transactions:PartA 11A, no. 6 (October 1, 2004): 413–18. http://dx.doi.org/10.3745/kipsta.2004.11a.6.413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Barbosa, Jorge, Rodrigo Hahn, Débora N. F. Barbosa, and Cláudio F. R. Geyer. "Mobile and ubiquitous computing in an innovative undergraduate course." ACM SIGCSE Bulletin 39, no. 1 (March 7, 2007): 379–83. http://dx.doi.org/10.1145/1227504.1227444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Goyal, S. "WMCSA 2004: 10 Years of Mobile and Ubiquitous Computing." IEEE Pervasive Computing 4, no. 2 (April 2005): 88–90. http://dx.doi.org/10.1109/mprv.2005.45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Abowd, G. D., G. R. Hayes, G. Iachello, J. A. Kientz, S. N. Patel, M. M. Stevens, and K. N. Truong. "Prototypes and Paratypes: Designing Mobile and Ubiquitous Computing Applications." IEEE Pervasive Computing 4, no. 4 (October 2005): 67–73. http://dx.doi.org/10.1109/mprv.2005.83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zhang, Daqiang, Zhijun Yang, Hongyu Huang, and Qin Zou. "Decentralized Checking Context Inconsistency in Ubiquitous Mobile Computing Environments." Physics Procedia 25 (2012): 700–707. http://dx.doi.org/10.1016/j.phpro.2012.03.146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Pierre, Samuel. "Mobile computing and ubiquitous networking: concepts, technologies and challenges." Telematics and Informatics 18, no. 2-3 (May 2001): 109–31. http://dx.doi.org/10.1016/s0736-5853(00)00024-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Borcea, Cristian, Shiwen Mao, and Jian Tang. "Editorial: Mobile and Ubiquitous Systems: Computing, Networking and Services." Mobile Networks and Applications 25, no. 2 (September 7, 2019): 457–58. http://dx.doi.org/10.1007/s11036-019-01371-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rath, Mamata. "Technical and Operational Utility of Ubiquitous Devices with Challenging Issues in Emerging Ubiquitous Computing." International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 9, no. 1 (January 2018): 16–35. http://dx.doi.org/10.4018/ijmdwtfe.2018010102.

Full text
Abstract:
Ubiquitous computing is an advanced technology in the age of wireless networks that supports infiltration, activation and interconnectability of all the electronic and sensor-based objects related to everyday issues, and in this manner endeavours to empower a ubiquitous stream of information and data by coordinating learning and training. Ubiquitous computing is the method of enhancing computer-based computations by making use of many computers available throughout the physical environment, but making them effectively invisible to the user. The advanced technology of science and networks is instinctively welcoming the introduction of this revolutionary computing concept that guarantees to profoundly affect the way the authors associate with computing machineries, electronic gadgets, mobile devices, cyber spaces, and related peripherals. This new emerging technology of ubiquitous computing imagines a world where inserted processors, PCs, sensors, and advanced correspondences are reasonable products that are accessible at any time. Ubiquitous computing will encompass clients with an agreeable and helpful data condition that unites physical and computational foundations into incorporated natural surroundings. This living space will include an expansion of hundreds or thousands of computing gadgets and sensors that will give new usefulness, offer specific administrations, and lift efficiency and cooperation. The current research article projects technical and operational utility of ubiquitous devices with challenging issues in emerging ubiquitous computing.
APA, Harvard, Vancouver, ISO, and other styles
25

Soleimani, S., E. Keshtehgar, and M. R. Malek. "UBISOUND: DESIGN A USER GENERATED MODEL IN UBIQUITOUS GEOSPATIAL INFORMATION ENVIRONMENT FOR SOUND MAPPING." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-2/W3 (October 22, 2014): 243–47. http://dx.doi.org/10.5194/isprsarchives-xl-2-w3-243-2014.

Full text
Abstract:
In this paper, we study how mobile computing and wireless technologies can be explored to provide effective ubiquitous GIS services. Instead of reinventing the wheels, we make use of smartphones, off-the-shelf components, and existing technologies in ubiquitous computing (i.e. wireless and mobile positioning technologies, and data acquisition techniques and processing via sensors) to develop a middleware, and tools for the development of systems and applications to provide effective ubiquitous GIS services. Two main tasks to be studied are: 1) Developing a framework, called UbiSound, to provide the infrastructure and architectural support for realizing ubiquitous GIS services; and 2) Designing and developing ubiquitous GIS applications by utilizing the UbiSound framework to let users experience and benefit from the context aware services. We use scenario to illustrate how mobile/wireless and sensor technologies can enable ubiquitous GIS services in UbiSound. Some of the examples included in UbiSound are: Noise mapping, soundscape mapping and wellbeing data acquisition and analysis.
APA, Harvard, Vancouver, ISO, and other styles
26

Vahdat-Nejad, Hamed, Shaghayegh Ostadi Eilaki, and Shaghayegh Izadpanah. "Towards a Better Understanding of Ubiquitous Cloud Computing." International Journal of Cloud Applications and Computing 8, no. 1 (January 2018): 1–20. http://dx.doi.org/10.4018/ijcac.2018010101.

Full text
Abstract:
Ubiquitous Cloud Computing has been recently proposed as a new hybrid computing model. This paradigm has two aspects: (a) Making use of cloud services to realize context-awareness (especially for mobile phones) and (b) Introducing a new and hybrid computing model. Likewise, this paper mainly involves two subjects: To deeply investigate previous cloud services that have been utilized to design context-aware systems, and to propose an open architecture for the “Ubiquitous Cloud Computing” paradigm. The aim of this article is to technically discuss mutual trends of ubiquitous and cloud computing, to foster the dissemination of state-of-the-art research in this area, and to present future research directions.
APA, Harvard, Vancouver, ISO, and other styles
27

Olaleye, Sunday Adewale, Solomon Sunday Oyelere, Ismaila Temitayo Sanusi, and Joseph Friday Agbo. "Experience of Ubiquitous Computing Technology Driven Mobile Commerce in Africa: Impact of Usability, Privacy, Trust, and Reputation Concern." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 3 (July 20, 2018): 4. http://dx.doi.org/10.3991/ijim.v12i3.7905.

Full text
Abstract:
<p>The concept of ubiquitous computing allows the seamless: anywhere, anytime, anyone interaction of computing devices and technology. Ubiquitous commerce simply known as u-commerce is an evolution of commerce based on recent innovations and advancement in computing technology. The aim of this study is to understand the impact of ubiquitous computing technologies on users, with a special focus on ubiquitous commerce. The study used the quantitative method and targeted the mobile device users for online shopping in Nigeria with convenience sampling technique. The data collected was analyzed using SmartPLS 2.0 with partial least square structural equation modelling. The study results confirmed the significant role of trust as a mediator between the reputation and u-commerce user’s experience, and usability and privacy directly predict the ubiquitous commerce user’s experience. The study advances with managerial implications and finally pinpoint the limitations and propose future studies.</p>
APA, Harvard, Vancouver, ISO, and other styles
28

Andrejevic, Mark. "Ubiquitous Computing and the Digital Enclosure Movement." Media International Australia 125, no. 1 (November 2007): 106–17. http://dx.doi.org/10.1177/1329878x0712500112.

Full text
Abstract:
Popular portrayals of ubiquitous computing tend to downplay the surveillance implications of emerging forms of mobile, networked interactivity. This essay seeks to supplement such accounts with a critical analysis of the emergence of digital enclosures that limit access to interactive networks and services to those who ‘freely’ submit to increasingly comprehensive forms of monitoring. If land enclosure helped produce the spatial conditions for the exploitation of wage labor, digital enclosures enable the exploitation of information generated by users as they go about their daily lives. Describing interactive networks, in both virtual and physical spaces, as forms of spatial enclosure helps to supplement privacy-based critiques of surveillance with questions about the ownership and control of data collected within the enclosure.
APA, Harvard, Vancouver, ISO, and other styles
29

Andrejevic, Mark. "Ubiquitous Computing and the Digital Enclosure Movement." Media International Australia 125, no. 1 (November 2007): 106–17. http://dx.doi.org/10.1177/1329878x0812500112.

Full text
Abstract:
Popular portrayals of ubiquitous computing tend to downplay the surveillance implications of emerging forms of mobile, networked interactivity. This essay seeks to supplement such accounts with a critical analysis of the emergence of digital enclosures that limit access to interactive networks and services to those who ‘freely’ submit to increasingly comprehensive forms of monitoring. If land enclosure helped produce the spatial conditions for the exploitation of wage labor, digital enclosures enable the exploitation of information generated by users as they go about their daily lives. Describing interactive networks, in both virtual and physical spaces, as forms of spatial enclosure helps to supplement privacy-based critiques of surveillance with questions about the ownership and control of data collected within the enclosure.
APA, Harvard, Vancouver, ISO, and other styles
30

Hu, Wen-Chen, Yanjun Zuo, Lei Chen, and Hung-Jen Yang. "Contemporary Issues in Handheld Computing Research." International Journal of Handheld Computing Research 1, no. 1 (January 2010): 1–23. http://dx.doi.org/10.4018/jhcr.2010090901.

Full text
Abstract:
Mobile phones have become ubiquitous in today’s society. However, mobile users are no longer satisfied with simple phones but instead expect ever more powerful functions to be available from their mobile devices. Advanced phones known as smartphones allow mobile users to perform a wide variety of advanced handheld functions such as browsing the mobile Internet or finding a nearby theater showing a specific movie. The design and development of these new, improved handheld functions require the help of handheld computing research. This article introduces handheld computing research using three themes: (i) mobile handheld devices, (ii) mobile computing, and (iii) current issues in handheld computing research. Information about other handheld topics of interest to researchers is given in the last section.
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Yuan-Fang, Jeff Z. Pan, Shonali Krishnaswamy, Manfred Hauswirth, and Hai H. Nguyen. "The Ubiquitous Semantic Web." International Journal on Semantic Web and Information Systems 10, no. 4 (October 2014): 1–16. http://dx.doi.org/10.4018/ijswis.2014100101.

Full text
Abstract:
The Semantic Web represents an evolution of the World Wide Web towards one of entities and their relationships, rather than pages and links. Such a progression makes it possible to represent, integrate, query and reason about structured online data. Recent years have witnessed tremendous growth of mobile computing, represented by the widespread adoption of smart phones and tablets. The versatility of such smart devices and the capabilities of semantic technologies form a great foundation for a ubiquitous Semantic Web that will contribute to further realising the true potential of both disciplines. In this paper, the authors argue for values provided by the ubiquitous Semantic Web using a mobile service discovery scenario. They also provide a brief overview of state-of-the-art research in this emerging area. Finally, the authors conclude with a summary of challenges and important research problems.
APA, Harvard, Vancouver, ISO, and other styles
32

Rodrigues, Joel J. P. C., Ivo M. C. Lopes, Bruno M. C. Silva, and Isabel de La Torre. "A new mobile ubiquitous computing application to control obesity: SapoFit." Informatics for Health and Social Care 38, no. 1 (June 2012): 37–53. http://dx.doi.org/10.3109/17538157.2012.674586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

CHEN, Zhi, and Ru-chuan WANG. "Mobile Agent-based distributed interactive method in ubiquitous computing environment." Journal of Computer Applications 29, no. 7 (July 30, 2009): 1855–57. http://dx.doi.org/10.3724/sp.j.1087.2009.01855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ogiela, Marek R., Ilsun You, Makoto Takizawa, and Fang-Yie Leu. "Special Issue on “Advances in mobile, ubiquitous and cognitive computing”." Mathematical and Computer Modelling 58, no. 5-6 (September 2013): 1138–39. http://dx.doi.org/10.1016/j.mcm.2013.06.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Lee, Seongkee, Sanghoon Lee, Taein Kang, Miyoung Kwon, Nohbok Lee, and Hoonkyu Kim. "Resiliency of mobile OS security for secure personal ubiquitous computing." Personal and Ubiquitous Computing 22, no. 1 (December 9, 2017): 23–34. http://dx.doi.org/10.1007/s00779-017-1098-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Choi, Min, Jonghyuk Park, and Young-Sik Jeong. "Mobile cloud computing framework for a pervasive and ubiquitous environment." Journal of Supercomputing 64, no. 2 (September 23, 2011): 331–56. http://dx.doi.org/10.1007/s11227-011-0681-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Tang, Feilong, Ilsun You, Can Tang, and Minyi Guo. "An efficient classification approach for large-scale mobile ubiquitous computing." Information Sciences 232 (May 2013): 419–36. http://dx.doi.org/10.1016/j.ins.2012.09.050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

You, Ilsun, Marek R. Ogiela, Yuh-Shyan Chen, and Qingfeng Huang. "Mobile and internet services in ubiquitous and pervasive computing environments." Information Sciences 230 (May 2013): 1–2. http://dx.doi.org/10.1016/j.ins.2013.01.026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Jararweh, Yaser, Mohammad Alsmirat, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Ala’ Darabseh, Brij Gupta, and Ahmad Doulat. "Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing." Computer Journal 60, no. 10 (February 24, 2017): 1443–57. http://dx.doi.org/10.1093/comjnl/bxx019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kakousis, Konstantinos, Nearchos Paspallis, and George Angelos Papadopoulos. "A survey of software adaptation in mobile and ubiquitous computing." Enterprise Information Systems 4, no. 4 (November 2010): 355–89. http://dx.doi.org/10.1080/17517575.2010.509814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Boudabous, Soufiane, Okba Kazar, Mohamed Ridda Laouar, and Sean B. Eom. "A Multi-Agent System for Ubiquitous Learning for Hospital Education." International Journal of Information Systems in the Service Sector 13, no. 3 (July 2021): 1–17. http://dx.doi.org/10.4018/ijisss.2021070101.

Full text
Abstract:
Healthcare information systems (HIS) have become an important area of research due to ever-increasing healthcare costs to the national economy. Many recent technological developments such as mobile technology and cloud computing have profoundly affected the current state of HIS and further facilitated the developments of ubiquitous computing and ubiquitous learning systems (ULS). The authors propose a multi-agent system for ubiquitous learning (MASUL) to facilitate various learning tasks. They use JADE (Java agent development framework) for developing the multi-agent system. MASUL provides a series of functionalities that can be used by the patients and clinicians. The system simplifies the mechanisms to access learning information via mobile devices, and it also facilitates the learning-teaching process centered on the physical surroundings of the user.
APA, Harvard, Vancouver, ISO, and other styles
42

Ali Brohi, Imtiaz, Najma Imtiaz Ali, Asadullah Shah, Madihah Bt. S. Abd. Aziz, and Mohd Izzuddin Bin Mohd. Tamrin. "Near Field Communication Enabled Mobile Payments: Preliminary Study." International Journal of Engineering & Technology 7, no. 2.34 (June 8, 2018): 60. http://dx.doi.org/10.14419/ijet.v7i2.34.13913.

Full text
Abstract:
The ubiquitous computing has made consumers life easy, it has given the new way to interact with family and friends and perform many activities which were impossible in previous time. One of the profound achievement of ubiquitous computing is Mobile Payment and an advanced mode of the mobile payment is the near field communication mobile payment. In this study the authors have proposed theoretical near field communication mobile payment model that is based on extended unified technology acceptance and use of technology (UTAUT2) .In this paper, the author have performed the pilot study to validate the variables and to verify their reliability among the proposed items. The results has proven that there is a reliability among the items in variables, as the Cronbach’s alpha value for the variables is above or equal to 0.7.
APA, Harvard, Vancouver, ISO, and other styles
43

Kumar, Sunil, Kashyap Kambhatla, Fei Hu, Mark Lifson, and Yang Xiao. "Ubiquitous Computing for Remote Cardiac Patient Monitoring: A Survey." International Journal of Telemedicine and Applications 2008 (2008): 1–19. http://dx.doi.org/10.1155/2008/459185.

Full text
Abstract:
New wireless technologies, such as wireless LAN and sensor networks, for telecardiology purposes give new possibilities for monitoring vital parameters with wearable biomedical sensors, and give patients the freedom to be mobile and still be under continuous monitoring and thereby better quality of patient care. This paper will detail the architecture and quality-of-service (QoS) characteristics in integrated wireless telecardiology platforms. It will also discuss the current promising hardware/software platforms for wireless cardiac monitoring. The design methodology and challenges are provided for realistic implementation.
APA, Harvard, Vancouver, ISO, and other styles
44

Hawkes, Mark, and Claver Hategekimana. "Impacts of Mobile Computing on Student Learning in the University: A Comparison of Course Assessment Data." Journal of Educational Technology Systems 38, no. 1 (September 2009): 63–74. http://dx.doi.org/10.2190/et.38.1.g.

Full text
Abstract:
This study focuses on the impact of wireless, mobile computing tools on student assessment outcomes. In a campus-wide wireless, mobile computing environment at an upper Midwest university, an empirical analysis is applied to understand the relationship between student performance and Tablet PC use. An experimental/control group comparison of mobile computing enabled learning outcomes in selected courses showed that the integration of wireless technology and highly functional computing tools did not have a negative effect on student assessment results. Out of the four courses evaluated, none of the revealed test scores were statistically different between non-using and mobile computer using groups, indicating no negative impacts of the introduction of ubiquitous technology into the classroom. A freshman-level college math course showed statistically significantly positive differences in course assessment scores when mobile computing was implemented over the same timeline. Results are discussed.
APA, Harvard, Vancouver, ISO, and other styles
45

Patalbansi, Vikram, and Dr G. Prasanna Laxmi. "Mobile Cloud Computing Cryptographic Scheme." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 19, 2021): 1148–57. http://dx.doi.org/10.51201/jusst/21/05394.

Full text
Abstract:
The ubiquitous network like Mobile Cloud Computing (MCC) provides a high quality of wireless services depending upon the wireless communication system network security level. And so many researches are carried out by the researcher on security algorithms for wireless communication system constructed in different network reliability. In our proposed thesis paper, on a theoretical basis, we developed the theory of MCC Security Layer Protocol security system in which we used the cryptographic hash function SHA-256 to generate a private key for entities, RC5 encryption, and decryption algorithm, Temporal Key Integrity Protocol (TKIP) generating a dynamic sequential key and CRC-32 checksum to detecting the error in our packets. The MSLP uses the stored symmetric secret key calculated on the basis of the Diffie-Hellman Key sharing scheme to generate keystream for cryptography functions. The secret key stored in the device’s filesystem our database prior to the deployment on Mobile Cloud Computing and remains the same throughout the session of communication. These systems use the dynamic initialization vector to avoid reply attacks and message integrity code calculated on source and destination devices addresses and actual frame contents. In the proposed thesis paper we analyze the security measures at the MSLP level and before transmitting information over the mobile networks, the information is encrypted in the form of frames and at the physical layer, this frame converted into its equivalent radio signals.
APA, Harvard, Vancouver, ISO, and other styles
46

Bertolli, Carlo, Daniele Buono, Gabriele Mencagli, and Marco Vanneschi. "An Approach to Mobile Grid Platforms for the Development and Support of Complex Ubiquitous Applications." International Journal of Advanced Pervasive and Ubiquitous Computing 2, no. 4 (October 2010): 24–38. http://dx.doi.org/10.4018/ijapuc.2010100102.

Full text
Abstract:
Several complex and time-critical applications require the existence of novel distributed, heterogeneous and dynamic platforms composed of a variety of fixed and mobile processing nodes and networks. Such platforms, that can be called Pervasive Mobile Grids, aim to merge the features of Pervasive Computing and Highperformance Grid Computing onto a new emerging paradigm. In this Chapter we study a methodology for the design and the development of high-performance, adaptive and context-aware applications. We describe a programming model approach, and we compare it with other existing research works in the field of Pervasive Mobile Computing, discussing the rationales of the requirements and the features of a novel programming model for the target platforms and applications. In order to exemplify the proposed methodology we introduce our programming framework ASSISTANT, and we provide some interesting future directions in this research field.
APA, Harvard, Vancouver, ISO, and other styles
47

Beggas, M. "Towards a Model of Context-Aware Infrastructure in Mobile Ubiquitous Computing." Journal of Fundamental and Applied Sciences 3, no. 1 (September 3, 2015): 47. http://dx.doi.org/10.4314/jfas.v3i1.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Al-Dubai, Ahmed, Xue Liu, and Yulei Wu. "Editorial to special issue: Recent advances in mobile and ubiquitous computing." Future Generation Computer Systems 28, no. 6 (June 2012): 900–901. http://dx.doi.org/10.1016/j.future.2012.02.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

You, Ilsun, and Witold Pedrycz. "Editorial: Advanced intelligent and security services in mobile and ubiquitous computing." Journal of Intelligent Manufacturing 23, no. 4 (May 18, 2010): 1257–58. http://dx.doi.org/10.1007/s10845-010-0408-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

KIM, J. g., G. S. KIM, and Y. I. EOM. "Design of the Mobile Agent Anonymity Framework in Ubiquitous Computing Environments." IEICE Transactions on Information and Systems E89-D, no. 12 (December 1, 2006): 2990–93. http://dx.doi.org/10.1093/ietisy/e89-d.12.2990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography