1,747 Hits in 7.4 sec

E-Learning and Context Aware e-Support Software for Maintenance

N Papathanasiou, C Emmanouilidis, P Pistofidis, D Karampatzakis
2012 Journal of Physics, Conference Series  
In this setting, one of the objectives is to integrate e-Learning in the form of web-based training modules and e-Support, by providing ubiquitous help through mobile devices to technical staff.  ...  by a mobile device (tablet), exploiting its graphic, storage and networking capabilities.  ...  Acknowledgements The authors wish to acknowledge the enthusiasm and contribution by the WelCOM (GSRT grant 09SYN-71-856) project partner's staff, namely KLEEMANN Lifts, National Research Foundation, Prisma  ... 
doi:10.1088/1742-6596/364/1/012110 fatcat:pfqc62qburffdm2zwl62ihmvgi

On the Privacy and Security of the Ultrasound Ecosystem

Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna
2017 Proceedings on Privacy Enhancing Technologies  
A new technology based on ultrasounds has recently emerged to meet these demands. Ultrasound technology has a number of desirable features: it is easy to deploy, flexible, and inaudible by humans.  ...  We then analyse real-world Android apps and find that tracking techniques based on ultrasounds suffer from a number of vulnerabilities and are susceptible to various attacks.  ...  Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect the views of NSF or Secure Business Austria.  ... 
doi:10.1515/popets-2017-0018 dblp:journals/popets/MavroudisHFMKV17 fatcat:oouykfzv4bffjc5ghsiy3e6dki

Walle: An End-to-End, General-Purpose, and Large-Scale Production System for Device-Cloud Collaborative Machine Learning [article]

Chengfei Lv, Chaoyue Niu, Renjie Gu, Xiaotang Jiang, Zhaode Wang, Bin Liu, Ziqi Wu, Qiulin Yao, Congyu Huang, Panos Huang, Tao Huang, Hui Shu (+8 others)
2022 arXiv   pre-print
The core of MNN is the novel mechanisms of operator decomposition and semi-auto search, sharply reducing the workload in manually optimizing hundreds of operators for tens of hardware backends and further  ...  Specifically, the compute container is based on Mobile Neural Network (MNN), a tensor compute engine along with the data processing and model execution libraries, which are exposed through a refined Python  ...  The opinions, findings, conclusions, and recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the funding agencies or the government.  ... 
arXiv:2205.14833v1 fatcat:d32fpqs2fvbrperbcqyetmuoaq

The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators

Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes
2018 2018 IEEE Symposium on Security and Privacy (SP)  
Given the tight coupling of generated apps with their services' backends, we further identify security issues in their infrastructure.  ...  We present the first comprehensive classification of commonly used OAGs for Android and show how to fingerprint uniquely generated apps to link them back to their generator.  ...  ACKNOWLEDGMENTS We would like to thank the anonymous reviewers for their valuable feedback.  ... 
doi:10.1109/sp.2018.00005 dblp:conf/sp/OltroggeDSAFRPB18 fatcat:nfixn2qnn5bf3p6gxhtvhyj7xy

A resilient cybersecurity framework for Mobile Financial Services (MFS)

Stephen Ambore, Christopher Richardson, Huseyin Dogan, Edward Apeh, David Osselton
2017 Journal of Cyber Security Technology  
The advent of mobile devices has created a means of providing financial services to over 2 billion people globally that hitherto had no access to formal banking services.  ...  However, the dark side of using mobile devices to bridge the banking gap is that mobile devices are now an added vector for cybersecurity threats.  ...  In developing the framework, the unique characteristics of the human element and the social context of mobile device communication would be examined. E.  ... 
doi:10.1080/23742917.2017.1386483 fatcat:2xqidpgyujbhhjpfp5xejmdeey

From the internet of things to embedded intelligence

Bin Guo, Daqing Zhang, Zhiwen Yu, Yunji Liang, Zhu Wang, Xingshe Zhou
2012 World wide web (Bussum)  
The characteristics, major applications, research issues, the reference architecture, as well as our ongoing efforts to embedded intelligence are also presented and discussed.  ...  The Internet of Things (IoT) represents the future technology trend of sensing, computing, and communication.  ...  For example, the OGC Sensor Web Enablement (SWE) [51] is devoted to building a unique framework of open standards (e.g., XML, Web Service, IEEE 1451) for exploiting Internet-connected sensors of all types  ... 
doi:10.1007/s11280-012-0188-y fatcat:ocyb57s5mvhmtep5ezcf7pbcku

A Semantic Model for Interchangeable Microservices in Cloud Continuum Computing

Salman Taherizadeh, Dimitris Apostolou, Yiannis Verginadis, Marko Grobelnik, Gregoris Mentzas
2021 Information  
The rapid growth of new computing models that exploit the cloud continuum has a big impact on the adoption of microservices, especially in dynamic environments where the amount of workload varies over  ...  In order to exploit the true potential of cloud continuum computing applications, it is essential to use a comprehensive set of various intricate technologies together.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/info12010040 fatcat:mcfct462brc4bhbc4en5ztq6be

Mobile Phone Sensing: A New Application Paradigm

Shaukat Ali, Shah Khusro
2016 Indian Journal of Science and Technology  
Mobile phone sensing applications should optimally exploit the potentials of mobile phones for effective solutions.  ...  Background/Objectives: The main objectives are to present a comprehensive survey of mobile phones sensing applications by analyzing and classifying them in a unique chronological order, and identifying  ...  applications to large number of user across the globe, and (5) developers can upload mobile services to backend servers on the cloud to enjoy high valued resources for computation of large scale sensory  ... 
doi:10.17485/ijst/2016/v9i19/53088 fatcat:szw7k2w3tzabbiwq46zhq7vvay

DeepRecSys: A System for Optimizing End-To-End At-scale Neural Recommendation Inference [article]

Udit Gupta, Samuel Hsia, Vikram Saraph, Xiaodong Wang, Brandon Reagen, Gu-Yeon Wei, Hsien-Hsin S. Lee, David Brooks, Carole-Jean Wu
2020 arXiv   pre-print
Neural personalized recommendation is the corner-stone of a wide collection of cloud services and products, constituting significant compute demand of the cloud infrastructure.  ...  Leveraging the insights from the recommendation characterization, a new dynamic scheduler, DeepRecSched, is proposed to maximize latency-bounded throughput by taking into account characteristics of inference  ...  Built upon this framework, DeepRec-Sched exploits the unique characteristics of at-scale recommendation inference in order to optimize system throughput under a strict tail latency constraint.  ... 
arXiv:2001.02772v1 fatcat:7dj2dy4rvnfynbvjov42jhzcc4

Socio-technical awareness to support recommendation and efficient delivery of IMS-enabled mobile services

G. Cardone, A. Corradi, L. Foschini, R. Montanari
2012 IEEE Communications Magazine  
recommendation and to foster a more efficient delivery of mobile services.  ...  Figure 6 shows RFD scores of a messaging (the graph on the left) and of a video streaming service (the graph on the right) during a working day, from 8 a.m. to 6:30 p.m.; in particular, our experiment  ... 
doi:10.1109/mcom.2012.6211490 fatcat:mvj6ii6btrhbtm6fdur5bj6fei

D4.3 Implementation and development of systems; SSS, data processing and geo-tagged photos framework alpha versions (alpha version)

Orestis Sampson, Nikos Iliakis, Valantis Tsiakos (ICCS), Nikolaos Tsakiridis, Konstantinos Karyotis (I-BEC)
2022 Zenodo  
ecosystem of low-cost and easy to use smart tools and techniques for the accumulation of the in-situ information.  ...  The deliverable constitutes a report describing the technical details from the implementation and development of the alpha versions of the DIONE in-situ (WP4) components aiming to establish a complete  ...  The push notification system for the mobile application, relies fully on the OneSignal service. This service, primarily works by assigning player IDs to each application user.  ... 
doi:10.5281/zenodo.6368164 fatcat:73c5wsqegvbvtpqb5o73z64jom

Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps [article]

Tania Martin, Georgios Karopoulos, José L. Hernández-Ramos, Georgios Kambourakis, Igor Nai Fovino
2020 arXiv   pre-print
Bluetooth, and specifically its Low Energy (BLE) power-conserving variant has emerged as the most promising short-range wireless network technology to implement the contact tracing service.  ...  This work offers the first to our knowledge, full-fledged review of the most concrete contact tracing architectures proposed so far in a global scale.  ...  Acknowledgment Authors would like to thank Massimiliano Gusmini for the figures.  ... 
arXiv:2007.11687v2 fatcat:jth2wbomznbllkjylmenhrs4qi

Recommending user experiences based on extracted cultural personas for mobile applications - REPEAT methodology

Markos Konstantakis, John Aliprantis, Kostas Michalakis, George Caridakis
2018 International Conference on Human-Computer Interaction with Mobile Devices and Services  
Cultural institutions today tend to favor the incorporation of mobile technologies and applications and usually offer interpretive electronic guides to their visitors, with adaptive and personalized cultural  ...  The purpose of this research aims to analyze the impact and quantify how personalized and obtrusive should a mobile application be and correlate these aspects with the users perception, perspective and  ...  Therefore, REPEAT exploits the functionalities of modern smartphone devices to offer efficient visiting services in a friendly manner.  ... 
dblp:conf/mhci/KonstantakisAMC18 fatcat:ppgy2ksjw5c5vat6l7zww7xv7m

Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps

Tania Martin, Georgios Karopoulos, José L. Hernández-Ramos, Georgios Kambourakis, Igor Nai Fovino, Kim-Kwang Raymond Choo
2020 Wireless Communications and Mobile Computing  
Bluetooth, specifically its Low Energy (BLE) power-conserving variant, has emerged as the most promising short-range wireless network technology to implement the contact tracing service.  ...  This work offers the first to our knowledge full-fledged review of the most concrete contact tracing architectures proposed so far in a global scale.  ...  Acknowledgments The authors would like to thank Massimiliano Gusmini for the figures.  ... 
doi:10.1155/2020/8851429 fatcat:5vnph2eosreldga55ul5tzqdvi

Experiences with RFID-based interactive learning in museums

Yo Ping Huang, Yueh Tsun Chang, Frode Eika Sandnes
2010 International Journal of Autonomous and Adaptive Communications Systems  
With the increasing number of tourists comes an increased demand for guides at education-oriented leisure centers. Each provided needs unique way to present their services.  ...  To attract more tourists and local visitors, many stakeholders such as natural parks, museums, art galleries, hotels and restaurants provide personalised services to meet individual needs.  ...  A suggested route of additional items to browse is recommended by the proposed recommendation model. Finally, the guide interaction module is the user interface of the proposed mobile guide system.  ... 
doi:10.1504/ijaacs.2010.030312 fatcat:ap3qch7fuvahdpsjxfrhxg4z3u
« Previous Showing results 1 — 15 out of 1,747 results