Advancing the Next-Generation of Mobile Computing: Emerging Technologies
Release Date: February, 2012. Copyright © 2012. 344 pages.
You must have an IGI Global account before adding an e-book to your shopping cart.
In Stock. Have it as soon as Jun. 21 with express shipping*.
DOI: 10.4018/978-1-4666-0119-2, ISBN13: 9781466601192, ISBN10: 1466601191, EISBN13: 9781466601208
The growth of mobile technology has caused considerable changes in the way we interact with one another within both personal and business environments. Advancements in mobile computing and mobile multimedia resonate with engineers, strategists, developers, and managers while also determining the behavior and interaction of end users.
Advancing the Next-Generation of Mobile Computing: Emerging Technologies offers historical perspectives on mobile computing, as well as new frameworks and methodologies for mobile networks, intelligent mobile applications, and mobile computing applications. This collection of research aims to inform researchers, designers, and users of mobile technology and promote awareness of new trends and tools in this growing field of study.
Table of Contents and List of Contributors
Search this Book:
Ali H. Al-Bayatti (De Montfort University, UK), Hussein Zedan (De Montfort University, UK), Antoniuo Cau (De Montfort University, UK), François Siewe (De Montfort Universtiy, UK)
Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and fl...
Gongjun Yan (Indiana University Kokomo, USA), Stephan Olariu (Old Dominion University, USA), Shaharuddin Salleh (Universiti Teknologi Malaysia, Malaysisa)
The key attribute that distinguishes Vehicular Ad hoc Networks (VANET) from Mobile Ad hoc Networks (MANET) is scale. While MANET networks involve up to one hundred n...
Daniel Hughes (Xi’an Jiaotong-Liverpool University, USA), Klaas Thoelen (Katholieke Universiteit Leuven, Belgium), Wouter Horré (Katholieke Universiteit Leuven, Belgium), Nelson Matthys (Katholieke Universiteit Leuven, Belgium), Javier Del Cid (Katholieke Universiteit Leuven, Belgium), Sam Michiels (Katholieke Universiteit Leuven, Belgium), Christophe Huygens (Katholieke Universiteit Leuven, Belgium), Wouter Joosen (Katholieke Universiteit Leuven, Belgium), Jó Ueyama (University of São Paulo, Brazil)
Considerable research has been performed in applying run-time reconfigurable component models to the domain of wireless sensor networks. The ability to dynamically d...
Salah Saleh (University of Essex, UK), Martin Fleury (University of Essex, UK)
IEEE 802.16e (mobile WiMAX) uplink behavior is a relatively neglected area of investigation, but emerging interactive media services have highlighted the need for cl...
Yushi Shen (Microsoft, USA), Pamela C. Cosman (University of California, San Diego, USA), Laurence B. Milstein (University of California, San Diego, USA), Eduardo F. Martinez (Freescale Semiconductor Inc., USA)
In this paper, channel estimation algorithms are proposed and compared for uplink WiMAX systems, which are OFDMA based. These algorithms are investigated based on a...
Vlado Menkovski (Eindhoven University of Technology, The Netherlands), Georgios Exarchakos (Eindhoven University of Technology, The Netherlands), Antonio Liotta (Eindhoven University of Technology, The Netherlands), Antonio Cuadra Sánchez (Telefonica R&D, Spain)
Understanding how quality is perceived by viewers of multimedia streaming services is essential for efficient management of those services. Quality of Experience (Qo...
Arun Prakash (Motilal Nehru National Institute of Technology, India), Rajesh Verma (Motilal Nehru National Institute of Technology, India), Rajeev Tripathi (Motilal Nehru National Institute of Technology, India), Kshirasagar Naik (University of Waterloo, Canada)
Network mobility (NEMO) route optimization support is strongly demanded in next generation networks; without route optimization the mobile network (e.g., a vehicle)...
Ioannis T. Christou (Athens Information Technology, Greece), Sofoklis Efremidis (Athens Information Technology, Greece), Aikaterini Roukounaki (Athens Information Technology, Greece)
The market for applications developed for mobile devices is growing as the hardware capabilities increase while costs drop. At the same time, the inability to write...
Jerry Zeyu Gao (San Jose State University, USA), Angela Ji (Acresso Software, USA)
The fast deployment of wireless networks and mobile technologies and the significant increase in the number of mobile device users have created a very strong demand...
- Intelligent Mobile Advertising
- IP-Based Mobile Networks
- Mobile Clients
- Mobile Computing Applications
- Mobility Management Schemes
- Multimedia Streaming
- Routing Protocols
- Security Management for Mobile Ad Hoc Networks
- WiMAX Systems
- Wireless Sensor Networks
This book compiles a series of interesting and timely papers in the areas (1) ad hoc networks, (2) multimedia and streaming, (3) mobile Technologies, and (4) privacy.
In the first section, the first paper (Security Management for Mobile Ad Hoc Network of Networks (MANoN)
) uses interval temporal logic to improve security management with a focus on ad hoc networks. Vehicular ad hoc networks (A Probabilistic Routing Protocol in VANET
) are a special case since the topology of the network changes all the time; routing is thus a challenge. Secure communication between clients in ad hoc networks (An Inter-Domain Agent Based Secure Authorization and Communication for Mobile Clients in Wireless AdHoc Networks
) requires authentication of nodes and keeping the overhead of communication and computation low. When multiple nodes communicate congestion on the shared communication channel may occur. Concurrent transmission on the MAC layer (Improving Throughput of Starved TCP Flow by Sidestepping Bottleneck Nodes Using Concurrent Transmission
) can improve this. Dynamically deploying and reconfiguring software components is useful in ad hoc networks in the face of node mobility, dynamic environmental conditions and changing application requirements. LooCI (Building Wireless Sensor Network Applications with LooCI
) is model that is optimized for such constrained environments such as ad hoc networks or sensor networks.
The second section covers a wide range of topics in the area of multimedia and streaming. WiMAx video delivery (Options for WiMAX Uplink Media Streaming
) may be improved by using H.264/AVC to avoid oscillations in buffer load. Moreover, channel estimation algorithms (On Uplink Channel Estimation in WiMAX Systems
) are compared for uplink WiMAX systems and improvements are being proposed. Communication channel properties certainly influence how the quality of streaming content is perceived, but in addition to objective figures, a subjective rating of the quality of experience (Quality of Experience Models for Multimedia Streaming
) helps to improve prediction models and optimize the usage of communication infrastructure. With small devices becoming ubiquitous, the transition from IPv4 to IPv6 accelerates and several problems need to be addressed (Utilization of an Improvement Manuel Configuration for Multimedia in 6 to 4 Tunneling
). Low quality video can be improved by denoising; information from the spatial domain can help to improve this task (A Proposed Intelligent Denoising Technique for Spatial Video Denoising For Real-Time Applications
). When recording a talk, the location of the speaker can be determined by the two microphones (Automatic Speaker Localization and Tracking Using a Fusion of the Filtered Correlation with the Energy Differential
); this information can be used to decide who the active speaker is and audio-visual recording can then be optimized for the location.
Section 3 covers mobile technologies. The first chapter in this section focuses on route optimization (Extended Mobile IPv6 Route Optimization for Mobile Networks in Local and Global Mobility Domain
) since tunnelling the communication from the home network to the mobile device in another network increases delays. A comprehensive literature survey (Network Layer Mobility Management Schemes for IP-Based Mobile Networks: A Survey
) is useful for other researchers to build on. On the application level, mobile devices are increasingly diverse in the features they support. Thus a tool box (A CASE Tool for Java Mobile Computing Applications
) to create portable apps can help to fight the cost of increased diversity.
The last section addresses privacy such as speaker identification (Pertinent Prosodic Features for Speaker Identification by Voice
) or location privacy. Location privacy can be improved by using a trusted middleware (Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–based Services
) that organizes space in an adaptive grid and hides the user’s true location. Mobile advertising needs to use specific mechanisms to target the receivers of advertisements (Building an Intelligent Mobile Advertising System
) and this has an impact on an individual’s privacy.
Johannes Kepler University Linz, Austria
Secure Business Austria-Security Research, Austria
- Schahram Dustdar, Vienna University of Technology, Austria
- Ali Hurson, The Pennsylvania State University, USA
- Gabriele Kotsis, Johannes Kepler University Linz, Austria
- Stephan Olariu, Old Dominion University, USA
- David Taniar, Monash University, Australia