Filters








1,221 Hits in 8.9 sec

Terminal mode

Raja Bose, Jörg Brakensiek, Keun-Young Park
2010 Proceedings of the 2nd International Conference on Automotive User Interfaces and Interactive Vehicular Applications - AutomotiveUI '10  
Mobile devices such as smart phones have enabled consumers to gain access to a growing number of interactive and useful applications, anytime anywhere.  ...  on the In-Vehicle Infotainment (IVI) system or due to the challenges of interacting with a tiny mobile device screen attached to a car dock.  ...  The trust level indicates whether a specific application has been certified by the mobile device manufacturer or by a trusted third party authority or by the application itself or by the user.  ... 
doi:10.1145/1969773.1969801 dblp:conf/automotiveUI/BoseBP10 fatcat:l64fyu4275hfveqp3byke7jcai

A Multi-Armed Bandit-based Approach to Mobile Network Provider Selection [article]

Thomas Sandholm, Sayandev Mukherjee
2021 arXiv   pre-print
For a simulated scenario corresponding to a practical use case, our agent shows a 20-41% QoE improvement over random provider selection under various demand, price and mobility conditions.  ...  agents on user devices making purchase decisions by trading off price, performance, and budget constraints.  ...  be suitable for deployment as a user agent on a mobile device.  ... 
arXiv:2012.04755v2 fatcat:pmoz6lrp3naabnkc5k73j52vx4

Safety and Privacy Considerations for Mobile Application Design in Digital Healthcare

Mojca Volk, Janez Sterle, Urban Sedlar
2015 International Journal of Distributed Sensor Networks  
We provide insights into design choices, including different possible scenarios for classification of a mobile app as a medical device and the pertaining legal risks the app developer is faced with as  ...  This paper presents a case study on security and privacy implications on the design of a mobile application in digital health, the DeStress Assistant (DeSA) app, which utilizes sensing technologies and  ...  In addition to the EU legislation and guidelines, individual national specifics enforced by the Member States must be taken into consideration and carefully analysed as they can in some cases complicate  ... 
doi:10.1155/2015/549420 fatcat:jktbwtttnvft3ourpnwetboc4e

Self-Serviced IoT: Practical and Private IoT Computation Offloading with Full User Control [article]

Dohyun Kim, Prasoon Patidar, Han Zhang, Abhijith Anilkumar, Yuvraj Agarwal
2022 arXiv   pre-print
This paper proposes Self-Serviced IoT (SSIoT), a clean-slate approach of using a hybrid hub-cloud setup to enable privacy-aware computation offload for IoT applications.  ...  We build an end-to-end prototype of SSIoT and evaluate it using several micro-benchmarks and example applications representing real-world IoT use cases.  ...  setting for IoT use cases.  ... 
arXiv:2205.04405v1 fatcat:7v6t2wuaffhs5jizz2dpdv2nkm

Deliverable D3.7 Consolidated Projects Summary Report

Alasdair Reid, Matias Barberis Rami
2021 Zenodo  
The NGI Trust project aims to support the development of a human- centric Internet, by developing a stronger European ecosystem of researchers, innovators and technology developers in the field of privacy  ...  and trust enhancing technologies.  ...  The baseline system is to be engineered and designed abiding to the principles of privacy by design. During the TRUSTRULES project, research was performed aiming to evaluate the possible  ... 
doi:10.5281/zenodo.5767430 fatcat:w2lxzgxktretjcv7h4xotz7xaq

Mobile cloud computing: A survey

Niroshinie Fernando, Seng W. Loke, Wenny Rahayu
2013 Future generations computer systems  
Mobile cloud computing can address these problems by executing mobile applications on resource providers external to the mobile device.  ...  We conclude the paper with a critical analysis of challenges that have not yet been fully met, and highlight directions for future work.  ...  However, in cases where the mobile device user is within range of a surrogate device for a few minutes, using VM migration may prove to be too heavyweight, as is pointed out in [39] which uses mobile  ... 
doi:10.1016/j.future.2012.05.023 fatcat:jdg2by4kxreopnq2wofworauza

5GZORRO_D.2.1. Use Cases and Requirements Definition

Adriana Fernandez August Betzler
2021 Zenodo  
This R&D action has the overall objective to design, develop and validate in representative use cases a 5G architecture capable to incorporate zero-touch automation solutions for the orchestration of high  ...  Each use case is contextualised through a review of the specific state of the art aimed at identifying the expected novelty that will be introduced in the 5GZORRO project.  ...  Use cases Use case analysis overview This section details the description of the use cases, providing a specific review of the state of the art for each of them, the novelty that they introduce by interfacing  ... 
doi:10.5281/zenodo.5211350 fatcat:khbocyw5uzektiukzzcwj7dsyy

Owner-Centric Sharing of Physical Resources, Data, and Data-Driven Insights in Digital Ecosystems

Kwok Cheung, Michael Huth, Laurence Kirk, Leif-Nissen Lundbæk, Rodolphe Marques, Jan Petsche
2019 Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19  
At the same time, they recognize the need for, and opportunity to, share access to such data and digitized physical assets.  ...  We are living in an age in which digitization will connect more and more physical assets with IT systems and where IoT endpoints will generate a wealth of valuable data.  ...  For example, a car owner could delegate -through an app on a smartphone -to a designated delivery service access to the trunk in specific contexts such as time intervals.  ... 
doi:10.1145/3322431.3326326 dblp:conf/sacmat/CheungHKLMP19 fatcat:3nm6ako23zdu7gq7xi2nb3pxk4

FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention

Brian Amento, Bharath Balasubramanian, Robert J. Hall, Kaustubh Joshi, Gueyoung Jung, K. Hal Purdy
2016 2016 IEEE/ACM Symposium on Edge Computing (SEC)  
We describe our approach, FocusStack, that uses location based situational awareness, implemented over a multi-tier geographic addressing network, to solve the problems of inefficient awareness messaging  ...  and mixed initiative control that IoT device clouds raise for traditional cloud management tools.  ...  Motivating Examples We begin by listing a few use cases for FocusStack that illustrate the benefits of situational awareness.  ... 
doi:10.1109/sec.2016.22 dblp:conf/edge/AmentoBHJJP16 fatcat:ijdrnpovlfdrtnvy2p63qkb7ha

Towards scalable user-deployed ultra-dense networks: Blockchain-enabled small cells as a service [article]

Emanuele Di Pascale, Hamed Ahmadi, Linda Doyle, Irene Macaluso
2020 arXiv   pre-print
We also propose the use of blockchain-enabled smart contracts as a simple and cost-efficient alternative to traditional SLAs for small-scale SCPs.  ...  To this purpose, we review the current and emerging spectrum and technology opportunities that SCPs can use for neutral host deployments.  ...  This could be done by: i) including spectrum access options and constraints in the smart contract that encodes the SLA between an MNO and an SCP; ii) by creating a smart contract-based lightweight leasing  ... 
arXiv:2005.00140v1 fatcat:5thg2zidbzamhl5hkdutorpkme

MobileNAT

Milind Buddhikot, Adiseshu Hari, Kundan Singh, Scott Miller
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
the two addresses. (3) A new signaling element called Mobility Manager (MM) that uses Middlebox Communication (MIDCOM) framework to signal the changes in packet processing rules to the Network Address  ...  Our proposal does not require any modifications to the access networks and can seamlessly co-exist with the existing Mobile IP mechanisms and therefore, can be used to provide seamless mobility across  ...  Real-specific IP (RSIP): Although, RSIP is not for mobility, it allows a node to query the NAT device for its external IP and port.  ... 
doi:10.1145/941326.941338 dblp:conf/wmash/BuddhikotHSM03 fatcat:zm6cjfbevff5di4r7t3hkxcryy

MobileNAT

Milind Buddhikot, Adiseshu Hari, Kundan Singh, Scott Miller
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
the two addresses. (3) A new signaling element called Mobility Manager (MM) that uses Middlebox Communication (MIDCOM) framework to signal the changes in packet processing rules to the Network Address  ...  Our proposal does not require any modifications to the access networks and can seamlessly co-exist with the existing Mobile IP mechanisms and therefore, can be used to provide seamless mobility across  ...  Real-specific IP (RSIP): Although, RSIP is not for mobility, it allows a node to query the NAT device for its external IP and port.  ... 
doi:10.1145/941336.941338 fatcat:m27vklnvvjfmrkb6gpotdqec6y

MobileNAT: A New Technique for Mobility Across Heterogeneous Address Spaces

Milind Buddhikot, Adiseshu Hari, Kundan Singh, Scott Miller
2005 Journal on spesial topics in mobile networks and applications  
the two addresses. (3) A new signaling element called Mobility Manager (MM) that uses Middlebox Communication (MIDCOM) framework to signal the changes in packet processing rules to the Network Address  ...  Our proposal does not require any modifications to the access networks and can seamlessly co-exist with the existing Mobile IP mechanisms and therefore, can be used to provide seamless mobility across  ...  Real-specific IP (RSIP): Although, RSIP is not for mobility, it allows a node to query the NAT device for its external IP and port.  ... 
doi:10.1007/s11036-005-6423-3 fatcat:mopurbyxfjh2pfurbd7ms7pmsq

Decentralized data processing: personal data stores and the GDPR

Heleen Janssen, Jennifer Cobbe, Chris Norval, Jatinder Singh
2020 International Data Protecion Law  
In some cases, the PDS will be a physical device located in a users' home or on their mobile device; this would likely be in line with the exemption.  ...  on a specific user's PDS whenever the app developer acts in a non-compliant manner. 23 Technical constraints on apps PDSs propose to implement a variety of technical constraints on apps, as follows  ... 
doi:10.1093/idpl/ipaa016 fatcat:coo5cxstgrbahn23cha64ptwge

Beyond Promissory Estoppel: Contract Law and the "Invisible Handshake"

Daniel A. Farber, John H. Matheson
1985 The University of Chicago Law Review  
While nonunion firms do make commitments that are morally, and even legally, binding for a year ahead on wage rates (and, for some salaried employees, on total earnings), they generally opt for implicit  ...  Employers do, in fact, rely heavily on the "invisible handshake" as a substitute for the invisible hand that cannot operate effectively in the career labor market.  ...  Use of the unilateral contract device to enforce one-sided modifications of ongoing relationships has found increasing favor. 74 70 Id. at 106.  ... 
doi:10.2307/1599520 fatcat:bukwrod2grcqhgoiaqmwppvwmm
« Previous Showing results 1 — 15 out of 1,221 results