The growth of mobile technology has caused considerable changes in the way we interact with one another within both personal and business environments. Advancements in mobile computing and mobile multimedia resonate with engineers, strategists, developers, and managers while also determining the behavior and interaction of end users.
Advancing the Next-Generation of Mobile Computing: Emerging Technologies offers historical perspectives on mobile computing, as well as new frameworks and methodologies for mobile networks, intelligent mobile applications, and mobile computing applications. This collection of research aims to inform researchers, designers, and users of mobile technology and promote awareness of new trends and tools in this growing field of study.
The many academic areas covered in this publication include, but are not limited to:
- Intelligent Mobile Advertising
- IP-Based Mobile Networks
- Mobile Clients
- Mobile Computing Applications
- Mobility Management Schemes
- Multimedia Streaming
- Routing Protocols
- Security Management for Mobile Ad Hoc Networks
- WiMAX Systems
- Wireless Sensor Networks
Table of Contents and List of Contributors
PrefaceThis book compiles a series of interesting and timely papers in the areas (1) ad hoc networks, (2) multimedia and streaming, (3) mobile Technologies, and (4) privacy.
In the first section, the first paper (Security Management for Mobile Ad Hoc Network of Networks (MANoN)) uses interval temporal logic to improve security management with a focus on ad hoc networks. Vehicular ad hoc networks (A Probabilistic Routing Protocol in VANET) are a special case since the topology of the network changes all the time; routing is thus a challenge. Secure communication between clients in ad hoc networks (An Inter-Domain Agent Based Secure Authorization and Communication for Mobile Clients in Wireless AdHoc Networks) requires authentication of nodes and keeping the overhead of communication and computation low. When multiple nodes communicate congestion on the shared communication channel may occur. Concurrent transmission on the MAC layer (Improving Throughput of Starved TCP Flow by Sidestepping Bottleneck Nodes Using Concurrent Transmission) can improve this. Dynamically deploying and reconfiguring software components is useful in ad hoc networks in the face of node mobility, dynamic environmental conditions and changing application requirements. LooCI (Building Wireless Sensor Network Applications with LooCI) is model that is optimized for such constrained environments such as ad hoc networks or sensor networks.
The second section covers a wide range of topics in the area of multimedia and streaming. WiMAx video delivery (Options for WiMAX Uplink Media Streaming) may be improved by using H.264/AVC to avoid oscillations in buffer load. Moreover, channel estimation algorithms (On Uplink Channel Estimation in WiMAX Systems) are compared for uplink WiMAX systems and improvements are being proposed. Communication channel properties certainly influence how the quality of streaming content is perceived, but in addition to objective figures, a subjective rating of the quality of experience (Quality of Experience Models for Multimedia Streaming) helps to improve prediction models and optimize the usage of communication infrastructure. With small devices becoming ubiquitous, the transition from IPv4 to IPv6 accelerates and several problems need to be addressed (Utilization of an Improvement Manuel Configuration for Multimedia in 6 to 4 Tunneling). Low quality video can be improved by denoising; information from the spatial domain can help to improve this task (A Proposed Intelligent Denoising Technique for Spatial Video Denoising For Real-Time Applications). When recording a talk, the location of the speaker can be determined by the two microphones (Automatic Speaker Localization and Tracking Using a Fusion of the Filtered Correlation with the Energy Differential); this information can be used to decide who the active speaker is and audio-visual recording can then be optimized for the location.
Section 3 covers mobile technologies. The first chapter in this section focuses on route optimization (Extended Mobile IPv6 Route Optimization for Mobile Networks in Local and Global Mobility Domain) since tunnelling the communication from the home network to the mobile device in another network increases delays. A comprehensive literature survey (Network Layer Mobility Management Schemes for IP-Based Mobile Networks: A Survey) is useful for other researchers to build on. On the application level, mobile devices are increasingly diverse in the features they support. Thus a tool box (A CASE Tool for Java Mobile Computing Applications) to create portable apps can help to fight the cost of increased diversity.
The last section addresses privacy such as speaker identification (Pertinent Prosodic Features for Speaker Identification by Voice) or location privacy. Location privacy can be improved by using a trusted middleware (Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–based Services) that organizes space in an adaptive grid and hides the user’s true location. Mobile advertising needs to use specific mechanisms to target the receivers of advertisements (Building an Intelligent Mobile Advertising System) and this has an impact on an individual’s privacy.
Johannes Kepler University Linz, Austria
Secure Business Austria-Security Research, Austria
Author(s)/Editor(s) BiographyIsmail Khalil (http://www.iiwas.org/ismail/) is a senior researcher and lecturer at the institute of telecooperation, Johanes Kepler University Linz, Austria, since October 2002. He is the president of the international organization of Information Integration and Web-based Applications & Services (@WAS). He holds a PhD in computer engineering and received his habilitation degree in applied computer science on his work on agents’ interaction in ubiquitous environments in May 2008. He currently teaches, consults, and conducts research in Mobile Multimedia, Cloud Computing, Agent Technologies, and the Semantic Web and is also interested in the broader business, social, and policy implications associated with the emerging information technologies. Before joining Johannes Kepler University of Linz, he was a research fellow at the Intelligent Systems Group at Utrecht University, Netherlands from 2001-2002 and the project manager of AgenCom project at the Software Competence Center Hagenberg - Austria from 2000-2001. Dr. Khalil has authored around 100 scientific publications, books, and book chapters. He is the editor of the Handbook of Research on Mobile Multimedia series, the book Mobile Multimedia: Communication Engineering Perspective, the book Multimedia Transcoding in Mobile and Wireless Networks, the book Innovations in Mobile Multimedia Communications and Applications: New Technologies and the book Advancing the Next-Generation of Mobile Computing: Emerging Technologies. He serves as the Editor-in-Chief of the International Journal on Web Information Systems (IJWIS), International Journal on Pervasive Computing and Communication (IJPCC) both published by Emerald Group publishing, UK, Journal of Mobile Multimedia (JMM) published by Rinton Press, USA, International Journal of Mobile Computing and Multimedia Communication (IJMCMC) published by IGI Global, USA, Advances in Next Generation Mobile Multimedia book series published by IGI Global, USA, and Atlantis Ambient and Pervasive Intelligence book series published by Atlantis and Springer. He is on the editorial board of several international journals. His work has been published and presented at various conferences and workshops.Edgar R. Weippl (http://www.sba-research.org/team/management/edgar-weippl/) is Research Director of Secure Business Austria and Priv.-Doz. at the Vienna University of Technology. His research focuses on applied concepts of IT-security and e-learning. Edgar organizes the ARES conference and is on the
editorial board of Computers & Security. After graduating with a Ph.D. from the Vienna University of Technology, Edgar worked for two years in a research startup. He then spent one year teaching as an assistant professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant for an HMO in New York, NY and Albany, NY, and in Frankfurt, Germany. In 2004 he joined the Vienna University of Technology and founded together with A Min Tjoa and Markus Klemen the research center SBA Research - Secure Business Austria.
- Schahram Dustdar, Vienna University of Technology, Austria
- Ali Hurson, The Pennsylvania State University, USA
- Gabriele Kotsis, Johannes Kepler University Linz, Austria
- Stephan Olariu, Old Dominion University, USA
- David Taniar, Monash University, Australia