Loading...
Search for: mobile-computing
0.004 seconds
Total 33 records

    Mobility in file sharing

    , Article 11th International Conference on Distributed Multimedia Systems, DMS 2005, 5 September 2005 through 7 September 2005 ; 2005 , Pages 155-160 ; 1891706179 (ISBN) Sheikhattar, H ; Haghighat, A ; Noroozi, N ; Sharif University of Technology
    Knowledge Systems Institute Graduate School  2005
    Abstract
    New advances in technology of mobile computers along with advent of wireless and mobile networking bring new capabilities, applications and concerns to the computer world. In this paper, we discussed on file sharing requirements in a mobile environment. Then, we proposed an architecture that supports mobility of hardware, data and software over the environment. Finally a sample implementation of the suggested architecture is presented. © 2005 by Knowledge Systems Institute Graduate School  

    Design and implementation issues for mobfish

    , Article 12th International Conference on Distributed Multimedia Systems, DMS 2006, 30 August 2006 through 1 September 2006 ; 2006 , Pages 17-22 ; 1891706195 (ISBN) Sheikhattar, H ; Rahiman, V ; Jaberipur, G ; Noroozi, N ; Sharif University of Technology
    Knowledge Systems Institute Graduate School  2006
    Abstract
    New advances in mobile-computer technology, together with the advent of wireless networking, introduce new requirements, capabilities and concerns to the computer science and industry. In this paper, we discuss the special requirements of file sharing in mobile environments. Then our proposed architecture for mobile file sharing (MobFish) is presented. Finally, we present an implementation of the proposed architecture based on its special design tactics. © 2006 by Knowledge Systems Institute Graduate School. All rights reserved  

    Flopcoin: a cryptocurrency for computation offloading

    , Article IEEE Transactions on Mobile Computing ; 2017 ; 15361233 (ISSN) Chatzopoulos, D ; Ahmadi, M ; Kosta, S ; Hui, P ; Sharif University of Technology
    Abstract
    During the last years, researchers have proposed solutions to help smartphones improve execution time and reduce energy consumption by offloading heavy tasks to remote entities. Lately, inspired by the promising results of message forwarding in opportunistic networks, many researchers have proposed strategies for task offloading towards nearby mobile devices, giving birth to the Device-to-Device offloading paradigm. None of these strategies, though, offers any mechanism that considers selfish users and, most importantly, that motivates and defrays the participating devices who spend their resources. In this paper, we address these problems and propose the design of a framework that... 

    A model for assured software download on mobile terminals

    , Article Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, 6 January 2009 through 8 January 2009, Kunming, Yunnan ; Volume 2 , 2009 , Pages 432-436 ; 9780769535012 (ISBN) Sabetghadam, S ; Niamanesh, M ; Esmaeili, J ; Sharif University of Technology
    2009
    Abstract
    Over-the-air (OTA) software download is a key enabling technology for terminal reconfigurations. With increasing the number of network protocols, variety of software products with different software providers and new software threats, it becomes important to download and install assured software on the mobile terminals. Most of the related research works on downloading assured software, focus on software validation after download, and mainly on the terminal. In this paper, a model is proposed in which an Assurance Agency is exploited. This agency is responsible for performing software examination and validations. Unlike related work, examination and validation operations are centrally... 

    Stability enhancement of mobile manipulators via soft computing

    , Article International Journal of Advanced Robotic Systems ; Volume 3, Issue 3 , 2006 , Pages 191-198 ; 17298806 (ISSN) Ghaffari, A ; Meghdari, A ; Naderi, D ; Eslami, S ; Sharif University of Technology
    InTech Europe  2006
    Abstract
    Nowadays the size and dimension of mobile manipulators have been decreased for being usable in various regions. This leads several problems such as danger of instability. Therefore, many researches have been done to overcome the problem of overturning of a mobile manipulator. In this paper, an algorithm for increasing the stability of a mobile manipulator is presented based on the optimization of a performance index. The path of vehicle and the desired task of the end-effector are predefined. In order to apply the optimal stability criterion, it is more convenient that the manipulator be of a redundant. Considering the interaction between the vehicle and the manipulator and using the genetic... 

    Telecommuting suitability modeling: An approach based on the concept of abstract job

    , Article Transportation ; Volume 33, Issue 4 , 2006 , Pages 329-346 ; 00494488 (ISSN) Mamdoohi, A. R ; Kermanshah, M ; Poorzahedy, H ; Sharif University of Technology
    2006
    Abstract
    A new approach to modeling telecommuting suitability is proposed in this paper. The approach, based on the concept of abstract job, can be employed to assess the level of suitability for telecommuting of the bundle of tasks comprising a job. By abstract job is meant a way of considering jobs on the basis of their elements and tasks, representing the general structure of the job. In this study, the basic tasks a job is composed of, pertaining to telecommuting suitability, are identified. To show the applicability of the approach, discrete choice models are calibrated, based on a sample of 245 employees in Tehran, Iran, indicating that from among the 6 tasks identified, 5 tasks are... 

    Capacity maximization in MIMO vehicular communication using a novel antenna selection algorithm

    , Article 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Cagliari, Sardinia ; 2013 , Pages 1246-1251 ; 9781467324793 (ISBN) Mousavi, H. S ; Khalighinejad, B ; Khalaj, B. H ; Sharif University of Technology
    2013
    Abstract
    The capacity of multiple-input multiple-output (MIMO) systems in vehicular communication is investigated throughout this paper. The goal is to consider a link between a vehicle-side and a road-side unit in presence of line-of-sight in a way that the road-side end uses all available antennas but the vehicle-side end chooses a subset of available antennas such that the link capacity becomes maximized. In order to maximize the channel capacity a criterion is derived that forces some circumstances about the configuration of antenna array in vehicle-side. If such circumstances are satisfied the channel capacity will be at its maximum. By proposing an antenna selection algorithm, the conditions... 

    A price-based optimal routing algorithm in Wireless Sensor Networks

    , Article 7th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2011, 23 September 2011 through 25 September 2011 ; September , 2011 , Page(s): 1 - 6 ; ISSN : 2161-9646 ; 9781424462520 (ISBN) Emamjomeh, M ; Arisian, B ; Sharif University of Technology
    2011
    Abstract
    Routing methods and algorithms in "Wireless Sensor Networks" attract researchers' attention a lot recently. In order to find the optimal path in WSNs depending on their type and application, various algorithms are proposed. In this paper, an optimal path finding algorithm based on "Game Theory" is discussed and improved. This algorithm finds a path witch is optimizing network lifetime, load distribution, and path reliability simultaneously  

    Cross-layer rateless coding over wireless relay networks

    , Article IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, 4 July 2011 through 8 July 2011 ; July , 2011 , Pages 1545-1549 ; 9781424495399 (ISBN) Shirvani Moghaddam, M ; Khalaj, B. H ; Pasandshanjani, E ; Sharif University of Technology
    2011
    Abstract
    The focus of the paper is on cross-layer transmission based on rateless coding for relay networks. In the proposed method, rateless coding is used at the packet level and a separate physical layer coding is used at the physical layer. As rateless codes are originally designed and optimized for erasure channels, using these codes at the physical layer can lead to significant performance degradation. The proposed scheme has the advantage of a cross-layer design which uses a rateless code at the packet level modeled by an erasure channel. Based on the analysis and simulation results provided in this paper, the cross-layer scheme results in earlier successful decoding at the destination  

    A Game Theory approach for optimal routing: In Wireless Sensor Networks

    , Article 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2010, 23 September 2010 through 25 September 2010 ; September , 2010 ; 9781424437092 (ISBN) Arisian, B ; Eshghi, K ; Sharif University of Technology
    2010
    Abstract
    In this paper, a "Game Theory" approach for finding an optimal path in a "Wireless Sensor Network" is discussed. WSN is one of the most interesting research fields in the communication networks, and is the center of attention in recent years. In our model, a pricing and payment technique is presented to obtain an optimal path in a WSN by considering reliability, energy and traffic load. The proposed algorithm is able to find a path which improves network lifetime, load distribution and path reliability  

    Fine-grained access control for hybrid mobile applications in Android using restricted paths

    , Article 13th International ISC Conference on Information Security and Cryptology, 7 September 2016 through 8 September 2016 ; 2016 , Pages 85-90 ; 9781509039494 (ISBN) Pooryousef, S ; Amini, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Hybrid Mobile Applications are a new generation of mobile applications that have recently introduced new security challenges. In these applications, untrusted web content, such as an advertisement inside an embedded browser, has the same privileges as the entire application and can directly access the device resources. Unfortunately, existing access control mechanisms are very coarse-grained and do not provide adequate facilities for fine-grained access rule definition and enforcement in hybrid mobile applications. In this paper, we propose a fine-grained access control mechanism for privilege separation in hybrid mobile applications. Our proposed access control mechanism, called... 

    Let me join two worlds! analyzing the integration of web and native technologies in hybrid mobile apps

    , Article Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, 31 July 2018 through 3 August 2018 ; 2018 , Pages 1814-1819 ; 9781538643877 (ISBN) Pouryousef, S ; Rezaiee, M ; Chizari, A ; Sharif University of Technology
    Abstract
    We can notice that security problems of inappropriate integration of native and web technologies in hybrid mobile applications (apps) have been covered in the related state-of-the-art research. However, analyzing hybrid mobile apps' unique behaviors has been seldom addressed. In this paper, we explore the influence of native and web technologies integration in hybrid mobile apps on the generated profile of mobile applications. Specifically, we analyze the type of Security Sensitive APIs (SS-APIs) exposed to web content and identify the corresponding usage patterns by systematically tracking function-call-graphs of a large number of hybrid and native mobile apps. Our investigations indicate... 

    Flopcoin: a cryptocurrency for computation offloading

    , Article IEEE Transactions on Mobile Computing ; Volume 17, Issue 5 , 2018 , Pages 1062-1075 ; 15361233 (ISSN) Chatzopoulos, D ; Ahmadi, M ; Kosta, S ; Hui, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    During the last years, researche'rs have proposed solutions to help smartphones improve execution time and reduce energy consumption by offloading heavy tasks to remote entities. Lately, inspired by the promising results of message forwarding in opportunistic networks, many researchers have proposed strategies for task offloading towards nearby mobile devices, giving birth to the Device-to-Device offloading paradigm. None of these strategies, though, offers any mechanism that considers selfish users and, most importantly, that motivates and defrays the participating devices who spend their resources. In this paper, we address these problems and propose the design of a framework that... 

    Mobile positioning using enhanced signature database method and error reduction in location grid

    , Article Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, 6 January 2009 through 8 January 2009, Kunming, Yunnan ; Volume 2 , 2009 , Pages 175-179 ; 9780769535012 (ISBN) Manzuri, M. T ; Naderi, A. M ; Sharif University of Technology
    2009
    Abstract
    Today, communication science is advancing very rapidly; one of these advances is mobile location determination which means finding position of a mobile station. There are some methods to location determination; one of these methods is Signal Strength (Power of Arrivals). In this research, Mobile Location Determination using enhanced signature database method in a Location grid will be introduced; several ways for positioning error reduction will also be described. © 2009 IEEE  

    Performance evaluation of mobile software systems: Challenges for a software engineer

    , Article 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE 2008, Mexico City, 12 November 2008 through 14 November 2008 ; December , 2008 , Pages 346-351 ; 9781424424993 (ISBN) Rahimian, V ; Habibi, J ; Sharif University of Technology
    2008
    Abstract
    New Advances in mobile computer technology, along with rapid growth of quality and quantity of wireless networks, introduce new capabilities, applications, and concerns to computer science and industry. Unique requirements and constraints of mobile systems bring new challenges to software development for such environments. It demands reconsidering the traditional approaches of information access, software design, and performance evaluation. Despite the various constraints and problems, research endeavors aimed at ameliorating the status quo through enhancing/devising software design and performance evaluation techniques for mobile software systems have been relatively few and far in between.... 

    Survivability modeling of wireless sensor networks

    , Article 2008 IEEE International Symposium on Wireless Communication Systems, ISWCS'08, ReykjavIk, 21 October 2008 through 24 October 2008 ; 2008 , Pages 593-597 ; 9781424424894 (ISBN) Masoum, A. R ; Jahangir, A. H ; Taghikhaki, Z ; Masoum, A ; Sharif University of Technology
    2008
    Abstract
    Network survivability is one of the main design challenges in wireless sensor networks (WSN). Survivability is the ability of the network to provide essential services in the presence of attacks and/or failures, and recover full service in a timely manner. To the best knowledge of us, survivability for WSN has never been studied considering failure effects on network. We consider the network survivability as a composite measure consisting of both network failure duration and failure impact on the network. In this paper we model network survivability in steady state. In this state, network is affected by predicted failures. This modeling is based on network connectivity and coverage, when an... 

    MPaySmart: A customer centric approach in offering efficient mobile payment services

    , Article 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, 9 December 2008 through 12 December 2008 ; 2008 , Pages 1038-1043 ; 9780769534732 (ISBN) Rahimian, V ; Habibi, J ; Sharif University of Technology
    IEEE Computer Society  2008
    Abstract
    New advances in mobile computer technology,along with rapid growth of quality and quantity of wireless networks, introduce new capabilities, applications, and concerns to computer science and industry. Mobile payment, in which mobile customers use their phones for performing financial transactions,is a promising and exciting domain that has been rapidly developing recently. Although different mobile payment schemes has been designed and deployed worldwide, there is still a lack of research in achieving efficient and global mobile payment systems. Different business players and various technologies make the situation more complex. In this paper, we present MPaySmart, a secure and... 

    On combining distributed joint source-channel-network coding and turbo equalization in multiple access relay networks

    , Article 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2007, White Plains, NY, 8 October 2007 through 10 October 2007 ; December , 2007 ; 0769528899 (ISBN); 9780769528892 (ISBN) Del Ser, J ; Crespo, P. M ; Hossein Khalaj, B ; Gutiérrez Gutiérrez, J ; Sharif University of Technology
    2007
    Abstract
    We consider a multiple access relay channel where two sources S1 and S2 send their data to a common destination node aided by a shared relay node. In this paper we extend previous work on this topic by assuming that the output of both information sources are correlated with memory. Furthermore, we consider frequency-selective fading channels, which introduce inter-symbol interference among the transmitted symbols. In this context, we propose an iterative receiver which comprises Turbo Maximum a Posteriori (MAP) equalization and distributed source-channelnetwork decoding in an iterative fashion. Various relaying strategies such as network coding or time multiplexing are analyzed in detail. In... 

    Mobility aware distributed topology control in mobile ad-hoc networks with model based adaptive mobility prediction

    , Article 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2007, White Plains, NY, 8 October 2007 through 10 October 2007 ; 2007 , Pages 86- ; 0769528899 (ISBN); 9780769528892 (ISBN) Mousavi, S. M ; Rabiee, H. R ; Moshref, M ; Dabirmoghaddam, A ; Sharif University of Technology
    IEEE Computer Society  2007
    Abstract
    Topology control in mobile ad-hoc networks allows better spatial reuse of the wireless channel and control over network resources. Topology control algorithms tend to optimize network power usage by keeping the topology connected. However, few efforts have focused on the issue of topology control with mobility. One of the most efficient mobility aware topology control protocols is the "Mobility Aware Distributed Topology Control Protocol". The major problem with this protocol is the future distance predictor which uses mobility prediction to estimate the future distance of neighboring nodes. The efficiency of this estimator varies in presence of different mobility models, sampling rates and... 

    QoS-aware joint policies in cognitive radio networks

    , Article IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, 4 July 2011 through 8 July 2011 ; July , 2011 , Pages 2220-2225 ; 9781424495399 (ISBN) Salehkaleybar, S ; Majd, S. A ; Pakravan, M. R ; Sharif University of Technology
    2011
    Abstract
    One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi secondary users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, we propose a new method to find joint policies for SUs which not only tries to guarantee QoS requirements but also maximize network throughput. We use Decentralized Partially Observable Markov Decision Process (Dec-POMDP) to formulate interactions between SUs. Meanwhile, a tractable approach for Dec-POMDP is utilized to extract sub-optimum joint policies for large horizons. Among these policies, the QoS-aware joint...