Browse Results

Showing 29,401 through 29,425 of 82,756 results

Mobile Solutions and Their Usefulness in Everyday Life (EAI/Springer Innovations in Communication and Computing)

by Sara Paiva

This book provides an insight into recent technological trends and innovations in solutions and platforms to improve mobility of visually impaired people. The authors’ goal is to help to contribute to the social and societal inclusion of the visually impaired. The book’s topics include, but are not limited to, obstacle detection systems, indoor and outdoor navigation, transportation sustainability systems, and hardware/devices to aid visually impaired people. The book has a strong focus on practical applications tested in a real environment. Applications include city halls, municipalities, and companies that must keep up to date with recent trends in platforms, methodologies and technologies to promote urban mobility. Also discuss are broader realms including education, health, electronics, tourism, and transportation. Contributors include a variety of researchers and practitioners around the world.

Mobile Solutions: Einsatzpotenziale, Nutzungsprobleme und Lösungsansätze (Advanced Studies Mobile Research Center Bremen)

by Ingrid Rügge

Ingrid Rügge führt eine umfassende Recherche technischer Komponenten für Mobile Solutions sowie eine Bestandsaufnahme bereits vorhandener oder konzipierter so genannter Wearable-Computing-Lösungen durch. Die Autorin arbeitet deren jeweilige spezifische Eigenschaften heraus und zeigt Möglichkeiten und Grenzen auf. Sie stellt die technischen Fakten den qualitativ ermittelten Anforderungen und Erwartungen aus den potenziellen Einsatzbereichen gegenüber.

Mobile Social Signal Processing: First International Workshop, MSSP 2010, Lisbon, Portugal, September 7, 2010, Invited Papers (Lecture Notes in Computer Science #8045)

by Roderick Murray-Smith

This book contains papers invited after the First International Workshop on Mobile Social Signal Processing, MSSP 2010, held in Lisbon, Portugal, in September 2010. The 9 revised papers included in this volume represent the diversity of two fields of research, Mobile HCI and Social Signal Processing and areas of overlap. They cover a wide range of topics spanning from approaches for effective interaction with mobile and wearable devices to modelling, analysis and synthesis of nonverbal behaviour in human-human and human-machine interactions.

Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective

by Yufeng Wang Jianhua Ma

Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along with that comes the need for new paradigms, mechanism

Mobile Social Networking: An Innovative Approach (Computational Social Sciences)

by Alvin Chin Daqing Zhang

The use of contextually aware, pervasive, distributed computing, and sensor networks to bridge the gap between the physical and online worlds is the basis of mobile social networking. This book shows how applications can be built to provide mobile social networking, the research issues that need to be solved to enable this vision, and how mobile social networking can be used to provide computational intelligence that will improve daily life.With contributions from the fields of sociology, computer science, human-computer interaction and design, this book demonstrates how mobile social networks can be inferred from users' physical interactions both with the environment and with others, as well as how users behave around them and how their behavior differs on mobile vs. traditional online social networks.

Mobile & Social Game Design: Monetization Methods and Mechanics, Second Edition

by Tim Fields Brandon Cotton

Successfully Navigate the Evolving World of Mobile and Social Game Design and MonetizationCompletely updated, Mobile & Social Game Design: Monetization Methods and Mechanics, Second Edition explains how to use the interconnectedness of social networks to make "stickier," more compelling games on all types of devices. Through the book's many des

Mobile SmartLife via Sensing, Localization, and Cloud Ecosystems

by Kaikai Liu Xiaolin Li

Indoor location is one of the two most important contexts (time and location), becoming a key entry for mobile Internet. This book envisions potential indoor location applications, overviews the related state of the art technologies, and presents original patented techniques and open source prototype systems. The tutorial and sample code are provided as a good reference and starting point for readers who are interested in the technique detail.

Mobile SmartLife via Sensing, Localization, and Cloud Ecosystems

by Kaikai Liu Xiaolin Li

Indoor location is one of the two most important contexts (time and location), becoming a key entry for mobile Internet. This book envisions potential indoor location applications, overviews the related state of the art technologies, and presents original patented techniques and open source prototype systems. The tutorial and sample code are provided as a good reference and starting point for readers who are interested in the technique detail.

Mobile Services for Toy Computing (International Series on Computer Entertainment and Media Technology)

by Patrick C. K. Hung

The goal of this book is to crystallize the emerging mobile computing technologies and trends by focusing on the most promising solutions in services computing. The book will provide clear proof that mobile technologies are playing an increasingly important and critical role in supporting toy computing. The goal of this book is to bring together academics and practitioners to describe the use and synergy between the above-mentioned technologies. This book is intended for researchers and students working in computer science and engineering, as well as toy industry technology providers, having particular interests in mobile services.

Mobile Service Innovation and Business Models

by Harry Bouwman Henny De Vos Timber Haaker

Modern economies depend on innovation in services for their future growth. Service innovation increasingly depends on information technology and digitization of information processes. Designing new services is a complex matter, since collaboration with other companies and organizations is necessary. Service innovation is directly related to business models that support these services, i.e. services can only be successful in the long run with a viable business model that creates value for its customers and providers. This book presents a theoretically grounded yet practical approach to designing viable business models for electronic services, including mobile ones, i.e. the STOF model and – based on it – the STOF method. The STOF model provides a ‘holistic’ view on business models with four interrelated perspectives, i.e., Service, Technology, Organization and Finance. It elaborates on critical design issues that ultimately shape the business model and drive its viability.

Mobile Service Computing (Advanced Topics in Science and Technology in China #58)

by Shuiguang Deng Hongyue Wu Jianwei Yin

This book introduces readers to the background and principles of mobile service computing. It discusses various aspects of service computing in mobile environments, including key methods and techniques for service selection, recommendation, composition, offloading, execution, deployment, and provision.

Mobile Sensors and Context-Aware Computing

by Manish J. Gajjar

Mobile Sensors and Context-Aware Computing is a useful guide that explains how hardware, software, sensors, and operating systems converge to create a new generation of context-aware mobile applications. This cohesive guide to the mobile computing landscape demonstrates innovative mobile and sensor solutions for platforms that deliver enhanced, personalized user experiences, with examples including the fast-growing domains of mobile health and vehicular networking. Users will learn how the convergence of mobile and sensors facilitates cyber-physical systems and the Internet of Things, and how applications which directly interact with the physical world are becoming more and more compatible. The authors cover both the platform components and key issues of security, privacy, power management, and wireless interaction with other systems.Shows how sensor validation, calibration, and integration impact application design and power managementExplains specific implementations for pervasive and context-aware computing, such as navigation and timingDemonstrates how mobile applications can satisfy usability concerns, such as know me, free me, link me, and express meCovers a broad range of application areas, including ad-hoc networking, gaming, and photography

Mobile Security and Privacy: Advances, Challenges and Future Research Directions

by Man Ho Au Raymond Choo

Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.Presents the most current and leading edge research on mobile security and privacy, featuring a panel of top experts in the fieldProvides a strategic and international overview of the security issues surrounding mobile technologiesCovers key technical topics and provides readers with a complete understanding of the most current research findings along with future research directions and challengesEnables practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding the implementation of mobile technology security and privacy initiatives

Mobile Security: How To Secure, Privatize And Recover Your Devices

by Joseph Anderson Tim Speed Jaya Nampalli Mari Heiser Darla Nykamp

In DetailThe threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don't manage your phone or mobile device correctly.Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security is growing on a daily basis and this guide may just be the help you need.Mobile Security: How to secure, privatize and recover your devices will teach you how to recognize, protect against, and recover from hacking attempts and outline the clear and present threats to your online identity posed by the use of a mobile device.In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.ApproachLearn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Who this book is forMobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

Mobile Security: Schwachstellen verstehen und Angriffsszenarien nachvollziehen

by Dirk Westhoff

Das Buch bietet eine fundierte Einführung in die Chronologie bekannter Angriffe und Verwundbarkeiten auf mobile Systeme und dessen konzeptionelle Einordnung der letzten zwei Dekaden. So erhält der Leser einen einmaligen Überblick über die Vielfältigkeit nachweisbar ausgenutzter Angriffsvektoren auf verschiedenste Komponenten mobiler drahtloser Geräte sowie den teilweise inhärent sicherheitskritischen Aktivitäten moderner mobiler OS. Eine für Laien wie Sicherheitsarchitekten gleichermaßen fesselnde Lektüre, die das Vertrauen in sichere mobile Systeme stark einschränken dürfte.

Mobile, Secure, and Programmable Networking: First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papers (Lecture Notes in Computer Science #9395)

by Selma Boumerdassi Samia Bouzefrane Éric Renault

This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Mobile, Secure, and Programmable Networking, MSPN 2015, held in Paris, France, in June 2015. The 14 papers presented in this volume were carefully reviewed and selected from 36 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile, Secure, and Programmable Networking: Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papers (Lecture Notes in Computer Science #10026)

by Selma Boumerdassi Éric Renault Samia Bouzefrane

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in June 2016. The 17 papers presented in this volume were carefully reviewed and selected from 37 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile, Secure, and Programmable Networking: 9th International Conference, MSPN 2023, Paris, France, October 26–27, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14482)

by Samia Bouzefrane Soumya Banerjee Fabrice Mourlin Selma Boumerdassi Éric Renault

This book constitutes the refereed post-proceedings of the 9th International Conference on Mobile, Secure, and Programmable Networking, MSPN 2023, held in Paris, France, during October 26–27, 2023.The 15 full papers included in this book were carefully reviewed and selected from 31 submissions. They were organized in topical sections as follows vertical tools on machine leaning and artificial intelligence, network programming and Cloud computing, Industrial Internet of things, Digital Twins and Security.

Mobile, Secure, and Programmable Networking: Third International Conference, MSPN 2017, Paris, France, June 29-30, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10566)

by Samia Bouzefrane Soumya Banerjee Françoise Sailhan Selma Boumerdassi Eric Renault

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in June 2017. The 17 papers presented in this volume were carefully reviewed and selected from 35 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing, network programming, software defined networks (SDN) and their security.

Mobile, Secure, and Programmable Networking: 6th International Conference, MSPN 2020, Paris, France, October 28–29, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12605)

by Samia Bouzefrane Maryline Laurent Selma Boumerdassi Eric Renault

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in October 2020.The 16 full papers presented in this volume were carefully reviewed and selected from 31 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile, Secure, and Programmable Networking: 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11005)

by Éric Renault Selma Boumerdassi Samia Bouzefrane

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Mobile, Secure, and Programmable Networking, held in Paris, France, in June 2018. The 27 papers presented in this volume were carefully reviewed and selected from 52 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile, Secure, and Programmable Networking: 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23–24, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11557)

by Éric Renault Selma Boumerdassi Cherkaoui Leghris Samia Bouzefrane

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile, Secure and Programmable Networking, held in Mohammedia, Morocco, in April 2019. The 23 papers presented in this volume were carefully reviewed and selected from 48 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile Search Behaviors: An In-depth Analysis Based on Contexts, APPs, and Devices (Synthesis Lectures on Information Concepts, Retrieval, and Services)

by Dan Wu Shaobo H. Liang

With the rapid development of mobile Internet and smart personal devices in recent years, mobile search has gradually emerged as a key method with which users seek online information. In addition, cross-device search also has been regarded recently as an important research topic. As more mobile applications (APPs) integrate search functions, a user's mobile search behavior on different APPs becomes more significant. This book provides a systematic review of current mobile search analysis and studies user mobile search behavior from several perspectives, including mobile search context, APP usage, and different devices. Two different user experiments to collect user behavior data were conducted. Then, through the data from user mobile phone usage logs in natural settings, we analyze the mobile search strategies employed and offer a context-based mobile search task collection, which then can be used to evaluate the mobile search engine. In addition, we combine mobile search with APP usage to give more in-depth analysis, such as APP transition in mobile search and follow-up actions triggered by mobile search. The study, combining the mobile search with APP usage, can contribute to the interaction design of APPs, such as the search recommendation and APP recommendation. Addressing the phenomenon of users owning more smart devices today than ever before, we focus on user cross device search behavior. We model the information preparation behavior and information resumption behavior in cross-device search and evaluate the search performance in cross-device search. Research on mobile search behaviors across different devices can help to understand online user information behavior comprehensively and help users resume their search tasks on different devices.

Mobile Schutzassistenz: Grundlagen, Entwurfsmethodik, Gestaltanforderungen (Advanced Studies Mobile Research Center Bremen)

by Christof Breckenfelder

Persönliche Schutzausrüstung und mit ihr die Schutzbekleidung sind im Wandel begriffen. Miniaturisierte, Textil-integrierte Computer eröffnen neue Möglichkeiten der Funktionsgestaltung. Mit kontextsensitiven und aktorischen Funktionen ausgestattet und zu Sensornetzwerken verknüpft, übernimmt die intelligente Schutzbekleidung – ähnlich einem Fahrerassistenzsystem in einem Automobil – die Beobachtung und Signalisierung von Gefährdungen in einem Arbeitsumfeld. Christof Breckenfelder entwickelt einen methodischen Ansatz für den Entwurf dieser mobilen Schutzassistenzsysteme. Die Vorteile der soziologisch-technischen Implikationen von Bekleidung werden am Beispiel eines intelligenten Feuerwehrschutzhandschuhs herausgearbeitet und validiert.

Mobile Robots: The Evolutionary Approach (Studies in Computational Intelligence #50)

by Leandro Dos Santos Coelho

Researchers have obtained robots that display an amazing slew of behaviors and perform a multitude of tasks, including perception of environment, negotiating rough terrain, and pushing boxes. This volume offers a wide spectrum of sample works developed in leading research throughout the world about evolutionary mobile robotics and demonstrates the success of the technique in evolving efficient and capable mobile robots.

Refine Search

Showing 29,401 through 29,425 of 82,756 results