Scheduled System Maintenance
On Saturday, October 21, single article sales and account management will be unavailable until 6 PM ET.
Notice: There is currently an issue with the citation download feature. Learn more.

2015 IEEE International Conference on Mobile Services

June 27 2015-July 2 2015

Filter Results

Displaying Results 1 - 25 of 78
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1633 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2015, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (163 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Chairs

    Publication Year: 2015, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (279 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2015, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (220 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s):xviii - xx
    Request permission for commercial reuse | PDF file iconPDF (225 KB)
    Freely Available from IEEE
  • External Reviewers

    Publication Year: 2015, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (212 KB)
    Freely Available from IEEE
  • IEEE Computer Society Technical Committee on Services Computing

    Publication Year: 2015, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (287 KB)
    Freely Available from IEEE
  • Location and Context-Based Microservices for Mobile and Internet of Things Workloads

    Publication Year: 2015, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1310 KB) | HTML iconHTML

    Research institutes such as Gartner and Forrester claim that the future of mobile will focus around the user's context. Most of the future mobile applications will leverage user context to provide a richer user experience and deeper engagement, and consequently higher customer value. We present three cloud micro services that can substantially accelerate the development and evolvement of location ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WhereAmI: Energy Efficient Positioning using Partial Textual Signatures

    Publication Year: 2015, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    Positioning systems can use signatures hidden in a user's environment to identify a location. Images are often used to locate a place by identifying landmarks. In this work, we present the use of texts in an image to identify a user's location. The key intuition behind this work is that a collection of names of business appearing in an image forms a bag-of-words that provides a unique signature fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Mobile Services Based on SNS to Recommend Who, How, and When to Collaborate

    Publication Year: 2015, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    The rising popularity of smart phones and social networking services (SNS) is changing many aspects of people's collaboration. With the wide use of smart phones, collaborative work based on mobile web becomes loose and flexible. Collaborators have more chances to collaborate with other people anywhere at anytime. But most supporting tools for traditional computer supported cooperative work just su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End Users' Perception of Hybrid Mobile Apps in the Google Play Store

    Publication Year: 2015, Page(s):25 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1490 KB) | HTML iconHTML

    Today millions of mobile apps are downloaded and used all over the world. Mobile apps are distributed via different app stores, such as the Google Play Store, the Apple App Store, the Windows Phone Store. One of the most intriguing challenges in mobile apps development is its fragmentation with respect to mobile platforms (e.g., Android, Apple iOS, Windows Phone). Recently, companies like IBM and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VDHM: Viewport-DOM Based Heat Maps as a Tool for Visually Aggregating Web Users' Interaction Data from Mobile and Heterogeneous Devices

    Publication Year: 2015, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB) | HTML iconHTML

    Knowing how users interact with Web contents is essential in order to design more effective Web pages and sites. A way to get the data needed for studying Web activity is via analytics tools that, given the amount of information to be processed, generally support the interpretation of results via graphics representations of either raw or aggregated data. With aggregated data, it is quite common to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • POEM: On Establishing a Personal On-Demand Execution Environment for Mobile Cloud Applications

    Publication Year: 2015, Page(s):41 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    A distributed mobile cloud service model called "POEM" is presented to manage the mobile cloud resource and compose mobile cloud applications. POEM provides the following salient features: (a) it considers resource management not only between mobile devices and clouds, but also among mobile devices, (b) it utilizes the entire mobile cloud system as the mobile application running platform, and as a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delivering Mobile Cloud Services to the User: Description, Discovery, and Consumption

    Publication Year: 2015, Page(s):49 - 56
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (911 KB) | HTML iconHTML

    The mobile cloud computing paradigm can offer relevant and useful services to the users of smart mobile devices. Such public services already exist on the web and in cloud deployments, by implementing common web service standards. However, these services are described by mark-up languages, such as XML, that cannot be comprehended by non-specialists. Furthermore, the lack of common interfaces for r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight Mobile Web Service Provisioning for Sensor Mediation

    Publication Year: 2015, Page(s):57 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Emerging sensor-embedded smartphones motivated the mobile sensing researches. With the integrated embedded hardware and software sensor components, and mobile network technologies, smartphones are capable of providing various environmental context information via embedded mobile device-hosted Web services (MWS). MWS enhance the capability of various mobile sensing applications such as mobile crowd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link Peek: A Link Outage Resilient IP Packet Forwarding Mechanism for 6LoWPAN/RPL Based Low-Power and Lossy Networks (LLNs)

    Publication Year: 2015, Page(s):65 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    Packets traversing through a multi-hop Low-power and Lossy Network (LLN) experience various link outage conditions in transit that can lead to packet loss at an intermediate relay node. Motivated by the problem of providing high Packet Delivery Ratio (PDR) in the LLNs running RPL(Routing Protocol for Low-power and Lossy Networks) routing protocol, we implemented a lightweight add-on functionality ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Andro Lyze: A Distributed Framework for Efficient Android App Analysis

    Publication Year: 2015, Page(s):73 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1238 KB) | HTML iconHTML

    In recent years, the number of mobile applications has grown significantly. Not surprisingly, various security and privacy concerns associated with mobile applications have emerged. Several researchers are addressing these problems by analyzing the security properties of mobile application code. Most of the security checks rely on custom scripts and are quite heterogeneous with respect to dependen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Architecture for Mobile Contextual Integrated Field Work Applications

    Publication Year: 2015, Page(s):81 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1758 KB) | HTML iconHTML

    The current generation of corporate software tools & applications were not designed to support the unique needs of industrial field service work. Business software applications such as project management and time keeping, for example, are typically designed for traditional desktop computing office environments. As such, they assume low user mobility, high network availability and WIMP (Windows... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Share Sens: An Approach to Optimizing Energy Consumption of Continuous Mobile Sensing Workloads

    Publication Year: 2015, Page(s):89 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (561 KB) | HTML iconHTML

    Smartphones and a growing number of wearable devices are equipped with a variety of powerful sensors. This has led to increased interest in developing of applications across a wide variety of domains including health-care, entertainment, environmental monitoring and transportation, which use sensor feeds to offer services. However, most of these applications require continuous sensing, which place... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secu Wear: An Open Source, Multi-component Hardware/Software Platform for Exploring Wearable Security

    Publication Year: 2015, Page(s):97 - 104
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB) | HTML iconHTML

    Wearables are the next big development in the mobile internet of things. Operating in a body area network around a smartphone user they serve a variety of commercial, medical, and personal uses. Whether used for fitness tracking, mobile health monitoring, or as remote controllers, wearable devices can include sensors that collect a variety of data and actuators that provide hap tic feedback and un... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physically Unclonable Digital ID

    Publication Year: 2015, Page(s):105 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (789 KB) | HTML iconHTML

    The Center for Strategic and International Studies estimates the annual cost from cyber crime to be more than $400 billion. Most notable is the recent digital identity thefts that compromised millions of accounts. These attacks emphasize the security problems of using clonable static information. One possible solution is the use of a physical device known as a Physically Unclonable Function (PUF).... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.