Scheduled System Maintenance
On Saturday, October 21, single article sales and account management will be unavailable until 6 PM ET.
Notice: There is currently an issue with the citation download feature. Learn more.

2014 IEEE International Conference on Mobile Services

June 27 2014-July 2 2014

Filter Results

Displaying Results 1 - 25 of 33
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Message from the General Chairs and Program Chairs

    Publication Year: 2014, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (133 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2014, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2014, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • IEEE Computer Society Technical Committee on Services Computing

    Publication Year: 2014, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (252 KB)
    Freely Available from IEEE
  • Services Society

    Publication Year: 2014, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • A System for Near Real-Time 3D Reconstruction from Multi-view Using 4G Enabled Mobile

    Publication Year: 2014, Page(s):1 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB) | HTML iconHTML

    Rapid or real time dense 3D reconstruction of indoor or outdoor model using mobile phone camera has become an active research topic because of the importance of 3D models in different application like remote monitoring system and visualization. In this paper we propose an application as well a system architecture which captures images using a hand held mobile Smart phone and generate an accurate a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unicast Bandwidth Efficiency Routing Algorithm for Mobile Devices

    Publication Year: 2014, Page(s):8 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (982 KB) | HTML iconHTML

    Bandwidth is one of the characteristics that is used to measure network performance. In this paper, we present a Unicast Bandwidth Efficiency Routing Algorithm (UBERA) for mobile devices that are streaming video contents from a video server. The algorithm can adapt to different number of mobile devices with different level of mobility and different location. Routing decisions are based on the avai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Mobile Data Streaming with Trajectory Preserving Partitioning

    Publication Year: 2014, Page(s):16 - 23
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    With the rise of sensor technology, ubiquitous mobile devices generate high-rate spatio-temporal data streams and send to backend servers in real time. While the mobile data streams are critical sources of mobility analytics supporting advanced mobile services, they also raise new challenges of scalable data processing for trajectory-featured data streams. In this paper, we develop a scalable fram... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Bayesian Compressed Sensing Approach to Robust Object Localization in Wireless Sensor Networks

    Publication Year: 2014, Page(s):24 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The recent growing interest for location-based services (LBSs) has created a demand on more accurate and robust object localization approaches. In this paper, the Bayesian compressed sensing (BCS) is employed to localize a single or multiple objects in a wireless sensor network (WSN). This is motivated by the advantages of BCS such as closer to l0-norm, and better performance of reconst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Interest-Aware Caching Scheme for Mobile Devices

    Publication Year: 2014, Page(s):31 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB) | HTML iconHTML

    Mobile services are gaining importance in handling data on mobile devices. With heaps of information flowing in the network, a service for caching preferential posts will be helpful. Understanding the profile of an individual in a social network will help determine the relationship value with respect to other individuals in the network. Similarly a post in a social network can have contexts associ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Enhancing the Security of OAuth Implementations in Smart Phones

    Publication Year: 2014, Page(s):39 - 46
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    With the roaring growth and wide adoption of smart mobile devices, users are continuously integrating with culture of the mobile applications (apps). These apps are not only gaining access to information on the smartphone but they are also able gain users' authorization to access remote servers on their behalf. The Open standard for Authorization (OAuth) is widely used in mobile apps for gaining a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hosting and Discovery of Distributed Mobile Services in an XMPP Cloud

    Publication Year: 2014, Page(s):47 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (533 KB) | HTML iconHTML

    While originating as an instant messaging infrastructure, the eXtensible Messaging and Presence Protocol (XMPP) has its applications as a lightweight middleware for real-time event distribution, e.g. for mobile computing or the Internet of Things. Services based on XMPP are traditionally realized as server components with simple local registration for discovery, which is not appropriate for distri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Planning for Developing Mobile IoT Applications Using Cloud Systems

    Publication Year: 2014, Page(s):55 - 62
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB) | HTML iconHTML

    IoT (Internet of Things) is increasingly becoming more popular mainly due to the fact that almost all the smart devices nowadays are network enabled to facilitate many current and emerging applications. However, some important issues still need to be addressed before fully realizing the potential of IoT applications. One of the most important issues is to have effective approaches to planning vari... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Where Did My Battery Go? Quantifying the Energy Consumption of Cloud Gaming

    Publication Year: 2014, Page(s):63 - 67
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    With the growing maturity of the cloud computing paradigm, clouds are increasingly used for the delivery of complex multimedia services, rather than just simple infrastructure offers. A popular example of such services is cloud gaming, where video games are executed in the cloud and delivered to a (mobile) client via the Internet. While cloud gaming shifts the computationally complex and energetic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Switching Push and Pull: An Energy Efficient Notification Approach

    Publication Year: 2014, Page(s):68 - 75
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    An increasing number of modern smartphone applications are dependent on information updates from the cloud. To realize such information updates mainly two communication approaches are common, namely push- and pull. Due to different communication patterns both approaches differ in their energy consumption and notification latency. The energy constrained nature of mobile devices entails a sensible s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing the Efficiency and Responsiveness of Mobile Applications with Preemptable Code Offloading

    Publication Year: 2014, Page(s):76 - 83
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (689 KB) | HTML iconHTML

    Mobile applications are getting more and more sophisticated and demanding. Although the processing, memory, and storage resources of mobile devices are constantly increasing to enable such resource-demanding mobile applications, battery capacity is still the main limiting factor. To solve this problem, mobile code offloading approaches can be used to offload parts of a mobile application to remote... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PatBugs: A Pattern-Based Bug Detector for Cross-platform Mobile Applications

    Publication Year: 2014, Page(s):84 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (525 KB) | HTML iconHTML

    Mobile app developers suffer a lot from the fragmentation of mobile platforms (e.g., needs to rewrite an app for a new platform). To alleviate this problem, cross-platform development techniques provide a cost-effective way (i.e., write-once-deploymany) to develop mobile applications. Such cross-platform techniques usually provide a set of relevant APIs to operate a native component (e.g., the acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinating Crowd-Sourced Services

    Publication Year: 2014, Page(s):92 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    The growing ubiquity of smartphones and similar personal connected computational devices, each with a number of sensors, has created an opportunity for useful services based on crowd-sourced data. A busy professional could find a restaurant to go to for a quick lunch based on information available from smartphones of people already there having lunch, waiting to be seated, or even heading there, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management of Mobile Data in a Crop Field

    Publication Year: 2014, Page(s):100 - 107
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (625 KB) | HTML iconHTML

    The diversity of the mobile landscape is shaping the business outlook of several enterprises including the agricultural sector. Today, there are several opportunities that can be harnessed in terms of productivity, mechanization, revenue, and so on when mobile technology is combined with agriculture technology. Especially, with mobile apps, agriculturists such as crop farmers can have access to ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reference Architecture for Improving Security and Privacy in Internet of Things Applications

    Publication Year: 2014, Page(s):108 - 115
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (781 KB) | HTML iconHTML

    As the promise of the Internet of Things (IoT) materializes in our everyday lives, we are often challenged with a number of concerns regarding the efficacy of the current data privacy solutions that support the pervasive components at play in IoT. The privacy and security concerns surrounding IoT often manifests themselves as a treat to end-user adoption and negatively impacts trust among end-user... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusion Prevention in Asterisk-Based Telephony System

    Publication Year: 2014, Page(s):116 - 123
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB) | HTML iconHTML

    Most enterprises today have their own Private Branch Exchange (PBX) systems that enable them to communicate on-premise and with the external or public switch telephone network. Companies that rely on heavy phone calls (especially, debt collectors) find the approach cost effective especially when automation techniques are introduced for auto dialing as a measure to reduce the number of employees wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.