On effective offloading services for resource-constrained mobile devices running heavier mobile Internet applications

2008 ◽  
Vol 46 (1) ◽  
pp. 56-63 ◽  
Author(s):  
Kun Yang ◽  
Shumao Ou ◽  
Hsiao-Hwa Chen
2021 ◽  
Vol 7 (2) ◽  
pp. 133-137
Author(s):  
K. I. Ozerov

The article deals with the specifics of committing fraudulent actions in the field of mobile Internet applications. The question of the security of official (App Store, Google Play) and unofficial platforms for downloading user programs for various purposes is raised. Examples of fraud are given and their negative consequences are demonstrated. The essence of fleeceware-applications is revealed and the pros and cons of the IOS and Android operating systems, which are the technical base in the mobile devices of the largest companies, are noted. There is an age category that is more exposed or may be exposed to illegal actions on the part of fraudsters in the field of IT technologies. In turn, the emphasis is placed on some gaps in those. systems and legislation in which the fraudster avoids criminal prosecution. The high latency of such crimes is confirmed due to the small damage to the victims of the assault, if we consider each victim separately, as well as due to the complexity of the crime itself. Measures are taken to prevent fraudulent actions related to online applications on mobile devices against yourself.


IEEE Access ◽  
2016 ◽  
Vol 4 ◽  
pp. 3273-3287 ◽  
Author(s):  
Zhe Yang ◽  
Bing Wu ◽  
Kan Zheng ◽  
Xianbin Wang ◽  
Lei Lei

Author(s):  
Qinyong Wang ◽  
Hongzhi Yin ◽  
Tong Chen ◽  
Zi Huang ◽  
Hao Wang ◽  
...  

Author(s):  
Charles E. Perkins

The Internet is growing ever more mobile – meaning, that an ever greater proportion of Internet devices are mobile devices. This trend necessitates new designs and will produce new and even unpredictable conceptions about the very nature of the Internet and, more fundamentally, the nature of social interaction. The engineering response to growing mobility and complexity is difficult to predict. This chapter summarizes the past and the present ways of dealing with mobility, and uses that as context for trying to understand what needs to be done for the future. Central to the conception of future mobility is the notion of “always available” and highly interactive applications. Part of providing acceptable service in that conception of the mobile Internet will require better ways to manage handovers as the device moves around the Internet, and ways to better either hide or make available a person's identity depending on who is asking.


Author(s):  
Gurkan Tuna ◽  
Korhan Cengiz

Telematics technologies and vehicular communications enable various intelligent transportation system applications with different data flow requirements that must be considered by the communications infrastructure provider in terms of transmission reliability, latency, jitter, and security. To meet those requirements, the dynamic nature of traffic and spatiotemporal features of roads must be considered. In parallel with the full coverage in urban areas and increase in the data rates, mobile networks have been started to be widely used by intelligent transportation system applications, especially for gathering data from various sensors. In this chapter, firstly, the current situation of telematics applications for intelligent transportation system is focused on and then mobile internet and mobile internet based applications are reviewed. Second, how much benefit vehicle telematics and mobile internet applications can obtain from the evolution of mobile networks is analysed. Finally, future research directions in this domain are pointed out.


2009 ◽  
pp. 2660-2673
Author(s):  
Kaj Grahn ◽  
Göran Pulkkis ◽  
Jonny Karlsson ◽  
Dai Tran

Mobile Internet users expect the same network service quality as over a wire. Technologies, protocols, and standards supporting wired and wireless Internet are converging. Mobile devices are resource constrained due to size, power, and memory. The portability making these devices attractive also causes data exposure and network penetration risks. Mobile devices can connect to many different wireless network types, such as cellular networks, personal area networks, wireless local area networks (WLANs), metropolitan area networks (MANs), and wide area networks (satellite-based WANs). Wireless network application examples are e-mailing, Web browsing, m-commerce, electronic payments, synchronization with a desktop computer, network monitoring/management, and reception of video/audio streams.


Sensors ◽  
2018 ◽  
Vol 18 (4) ◽  
pp. 1229 ◽  
Author(s):  
Ziyang He ◽  
Xiaoqing Zhang ◽  
Yangjie Cao ◽  
Zhi Liu ◽  
Bo Zhang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document