{"title":"Mobile Cloud Application Models Facilitated by the CPA","authors":"M. O'Sullivan, D. Grigoras","doi":"10.4108/sis.2.4.e6","DOIUrl":"https://doi.org/10.4108/sis.2.4.e6","url":null,"abstract":"This paper describes implementations of two mobile cloud applications, file synchronisation and intensive data processing, using the Context Aware Mobile Cloud Services middleware, and the Cloud Personal Assistant. Both are part of the same mobile cloud project, actively developed and currently at the second version. We describe recent changes to the middleware, along with our experimental results of the two application models. We discuss challenges faced during the development of the middleware and their implications. The paper includes performance analysis of the CPA support for the two applications in respect to existing solutions.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124678523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handoff Between Proxies in the Proxy-Based Mobile Computing System","authors":"Azade Khalaj, H. Lutfiyya","doi":"10.1109/Mobilware.2013.17","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.17","url":null,"abstract":"Research activities in the mobile computing field aim to find solutions for achieving the smoother access to remote online resources, such as cloud services, from client application found on mobile devices. The limited capabilities of mobile devices and also the unreliable condition of wireless environment are sources of challenges in achieving the mentioned goal. We have proposed a proxy-based mobile computing system that offloads compute-intensive tasks from mobile devices to proxies. Additionally, to handle the variation in connection quality, the proxies are chosen and changed dynamically to provide a better service quality for the client application. The result of our experiments shows the effectiveness of our approach in choosing the appropriate proxy and switching to a new proxy when it is needed.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"7 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kim Arvin S. Silvoza, Ryan A. Blonna, Rowel Atienza
{"title":"A Natural Handwriting Algorithm for Tablets","authors":"Kim Arvin S. Silvoza, Ryan A. Blonna, Rowel Atienza","doi":"10.1109/Mobilware.2013.22","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.22","url":null,"abstract":"Note-taking applications today have features that imitate the behavior of real handwriting such as smooth strokes, responsive interface, and stroke thinning. However, the problem is that the writing tools of these applications do not fully simulate the feel of their real counterpart. Some of these applications have flaws like unnatural pen thinning effect, pixelation of strokes, and lack of highlighter blending. To solve these, an iPad application with a custom smooth writing algorithm was developed. It was compared to five commercially available note-taking programs in the App Store.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123485197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Marchesani, L. Pomante, M. Pugliese, F. Santucci
{"title":"A Middleware Approach to Provide Security in IEEE 802.15.4 Wireless Sensor Networks","authors":"S. Marchesani, L. Pomante, M. Pugliese, F. Santucci","doi":"10.1109/Mobilware.2013.21","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.21","url":null,"abstract":"Last years have seen the growth of interest for middleware exploitation in distributed resource-constrained systems as Wireless Sensor Networks (WSNs) are. A WSN is a versatile smart sensing system to support pervasive monitoring in a variety of applications. In this context available middleware platforms usually provide the Application Layer with different basic services, as shared memory or addressing repository, but do not usually provide security services such as secure links management protocol or intrusion detection. Nevertheless, since WSN applications normally require the collection and the aggregation of reliable measurements and data from the sensing units, secure communications should be guaranteed even in the presence of resource constraints. In this paper we then present a novel middleware approach that is directly tailored to an IEEE 802.15.4-based WSN. The security-related components of the proposed middleware include a light yet powerful cryptographic scheme (TAKS) and an Intrusion Detection System (WIDS): the former module exploits the topological properties of a WSN, while the latter one is based on a Weak Process Model approach.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Mean-Variance Estimator Technique in Monitoring Applications Using Mobile Agents over Wireless Sensor Networks","authors":"M. Pugliese, F. Santucci","doi":"10.1109/Mobilware.2013.26","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.26","url":null,"abstract":"We propose a reliable technique to detect behavior anomalies in monitoring critical infrastructures through resource constrained devices, for instance wireless sensor networks (WSNs). The study is specifically targeted to monitoring and alerting functionalities for homeland security, that typically enforce severe requirements to the detection process. Assuming the behavior of the characteristic operation indicators in a potentially large and complex infrastructure (such as buildings, bridges, nuclear power plants, aircrafts, etc.) to be bounded by design constraints, we can introduce a novel non-parametric detection technique that we denote as “MV-estimator-based” (where MV stands for sample mean and variance): the sample mean and the sample variance are computed from observations and behavior classification is performed by defining regions in the MV-estimator space instead of the observations space. It will be shown that the novel detection technique is able to provide better performance with respect to other approaches over resource constrained platforms such as WSN, and this will be substantiated by numerical results as well as by a detailed cost analysis. Moreover MVET operations into a clustered WSN are presented where MVET distributed functions are implemented by using mobile agents.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130697779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Optimization Mechanism in Wireless Sensor Networks","authors":"H. Aoudia, Y. Touati, A. A. Chérif","doi":"10.1109/Mobilware.2013.28","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.28","url":null,"abstract":"Nowadays, wireless sensor networks (WSN) present a lot of interest in several research areas due to their wide range of applications. One of the most critical problems is how to ensure a better and efficient communication taking into account some constraints such as network lifetime and energy consumption. In this context and as an alternative, several papers focusing on the conception and development of robust routing protocols have been undertaken these last decades. In this paper, we propose a robust hierarchical routing protocol using a dynamic clustering mechanism (HRP-DCM) which consists to build clusters wherein coordinators nodes with extra privileges called Cluster-Head (CH) are able to create and manipulate messages using TDMA schedule and aggregate data according to CDMA method. The effectiveness of the proposed approach is illustrated in simulations.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social-Aware Differentiated Visibility of Home-to-Home Shared Resources in Spontaneous Networks","authors":"P. Bellavista, Carlo Giannelli, Stefano Poli","doi":"10.1109/Mobilware.2013.18","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.18","url":null,"abstract":"The widespread adoption of online social networking to upload and share user-generated personal content rises novel issues related to the management of content ownership and privacy. To retain content ownership, we have previously designed and implemented an original solution for social-driven content sharing in home-to-home federated and spontaneous networks. This paper relevantly enhances our solution by proposing novel mechanisms to tune the visibility of shared resources based on the dynamic evaluation of social relationship tightness, inferred through social data gathered from widespread online social networks. On the one hand, the proposal autonomously evaluates the tightness of social relationships based on the primary guideline that the more users interact the tighter their relationships are. Moreover, it determines a default decision tree suitable for many application scenarios and enables its dynamic personalization based on user's feedback. On the other hand, it defines and supports a grammar to define visibility filters: runtime visibility of shared resources is automatically tuned based on both relationship tightness and defined filters. The presented prototype demonstrates how to effectively design/implement the proposal and the feasibility of our approach in terms of performance.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114611602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Morelli, C. Stefanelli, M. Tortonesi, Niranjan Suri
{"title":"Mobility Pattern Prediction to Support Opportunistic Networking in Smart Cities","authors":"A. Morelli, C. Stefanelli, M. Tortonesi, Niranjan Suri","doi":"10.1109/Mobilware.2013.23","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.23","url":null,"abstract":"The ever increasing number of mobile devices in Smart Cities and their heavy use, not only for personal communication but also as a distributed network of sensors, generate a data deluge that stresses the traditional wireless communication infrastructure. The opportunistic networking paradigm seems particularly well suited to the Smart City scenario because it exploits resources that temporarily fall into the connection range of mobile devices as communication proxies, thereby providing cheaper and more energy efficient alternatives to the use of the cellular city network and actively contributing to its offloading. However, its efficacy highly depends on the effectiveness of discovering and using those resources. To improve the effectiveness of opportunistic networking in Smart Cities, we propose a solution which exploits a prediction model tailored for the urban environment that, by detecting complex recurring patterns in nodes' contacts, can forecast the future availability of strategic communication resources. Experimental results obtained in a simulated environment show that our solution can improve the dissemination process and ease the access to the wired network infrastructure.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mauro Teófilo, Daniel Risi, V. F. D. L. Junior, Thomaz Philippe Cavalcante Silva, Luiz Carlos A. M. Cavalcanti
{"title":"A Mobile-Based System for Content Delivery over SMS","authors":"Mauro Teófilo, Daniel Risi, V. F. D. L. Junior, Thomaz Philippe Cavalcante Silva, Luiz Carlos A. M. Cavalcanti","doi":"10.1109/Mobilware.2013.8","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.8","url":null,"abstract":"The proliferation of mobile applications for smartphones has been based on the presence of a data connection between those devices and the Internet. Therefore, users of entry-level mobile phones as well as users who cannot afford a data plan are excluded from the current dynamics of mobile applications consumption. A possible approach to include those users is the usage of SMS as the communication channel. Although SMS is widely supported by carriers and extremely popular among users, it is not trivial to replace the data connection capabilities with SMS. This work addresses this issue with an integrated solution composed by a client platform and a server-side system.This solution enables GUI-based mobile applications to be transferred over a short number of concatenated SMSs. It also presents components for the creation, deployment and distribution of mobile applications. In order to attest the relevance of such solution, an experiment was conducted and its results indicate a substantial level of acceptance by target group.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Virtual Machine for the Insense Language","authors":"Callum Cameron, P. Harvey, J. Sventek","doi":"10.1109/Mobilware.2013.10","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.10","url":null,"abstract":"The Insense VM is a specialised Java virtual machine for running Insense programs on wireless sensor nodes. The VM runs on top of InceOS, a purpose-built operating system. A split VM architecture is used, in which Insense programs are compiled to Java classes, then linked and compacted on a more powerful machine into a form suitable for execution by the VM. Measurements demonstrate that the virtual machine achieves good performance and memory usage for realistic Insense programs.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121201175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}