You are previewing Advancing the Next-Generation of Mobile Computing.
O'Reilly logo
Advancing the Next-Generation of Mobile Computing

Book Description

The growth of mobile technology has caused considerable changes in the way we interact with one another within both personal and business environments. Advancements in mobile computing and mobile multimedia resonate with engineers, strategists, developers, and managers while also determining the behavior and interaction of end users. Advancing the Next-Generation of Mobile Computing: Emerging Technologies offers historical perspectives on mobile computing, as well as new frameworks and methodologies for mobile networks, intelligent mobile applications, and mobile computing applications. This collection of research aims to inform researchers, designers, and users of mobile technology and promote awareness of new trends and tools in this growing field of study.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. Associate Editors
    3. List of Reviewers
  5. Preface
  6. Section 1: Ad Hoc Networks
    1. Chapter 1: Security Management for Mobile Ad Hoc Network of Networks (MANoN)
      1. ABSTRACT
      2. Introduction
      3. Interval Temporal Logic
      4. Security Management
      5. Mobile Ad Hoc Networks of Networks SCENAIRO
      6. Security Architecture
      7. Security Requirements
      8. Security Layers
      9. Implementing Security Solutions Defined in Our Security Architecture for ManoN
      10. Syntax Expression
      11. Behavior Analyser
      12. Coping with Misbehavior Users
      13. Simulation Results
      14. Conclusion
    2. Chapter 2: A Probabilistic Routing Protocol in VANET
      1. Abstract
      2. Introduction
      3. Related Work
      4. The Probability Model
      5. Our Proposed Protocol
      6. Simulations
      7. Conclusion and Future Work
      8. Appendix
    3. Chapter 3: An Inter-Domain Agent Based Secure Authorization and Communication for Mobile Clients in Wireless AdHoc Networks
      1. Abstract
      2. 1. Introduction
      3. 2. Related Work
      4. 3. Advantages of Using Agents
      5. 4. Proposed Scheme
      6. 5. Simulation and Results Obtained
      7. 6. Conclusion
    4. Chapter 4: Improving Throughput of Starved TCP Flow by Sidestepping Bottleneck Nodes Using Concurrent Transmission
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. PRELIMINARIES
      5. MOTIVATION AND PROBLEM FORMULATION
      6. THE PROPOSED SOLUTION
      7. SIMULATION RESULTS
      8. CONCLUSION
    5. Chapter 5: Building Wireless Sensor Network Applications with LooCI
      1. Abstract
      2. 1. Introduction
      3. 2. Related Work
      4. 3. The LooCI Middleware
      5. 4. Performance and Footprint
      6. 5. Case Study Application
      7. Components
      8. Policies
      9. 6. Future Work
      10. 7. Conclusion
  7. Section 2: Multimedia and Streaming
    1. Chapter 6: Options for WiMAX Uplink Media Streaming
      1. Abstract
      2. Introduction
      3. Related Research
      4. WiMAX Scheduling
      5. Subscriber Station Operation
      6. Methodology
      7. Simulation Results
      8. Conclusion
    2. Chapter 7: On Uplink Channel Estimation in WiMAX Systems
      1. Abstract
      2. Introduction
      3. Baseband Model of WiMAX System
      4. Channel Estimation Algorithms
      5. Analysis and Comparison of the Proposed Algorithms
      6. Simulation Results
    3. Chapter 8: Quality of Experience Models for Multimedia Streaming
      1. Abstract
      2. Introduction
      3. QoE Measurement Methods
      4. QoE Prediction Models
      5. Statistical Models for QoE
      6. ML QoE Prediction Models
      7. Online Prediction Models
      8. Experimental Setup and Results
      9. Online Setup
      10. Online Results and Analysis
      11. Conclusion
    4. Chapter 9: Utilization of an Improvement Manuel Configuration for Multimedia in 6to4 Tunneling
      1. Abstract
      2. 1. Introduction
      3. 2. IPv6 Motivations and Overview
      4. 3. IPv6 Address and Configuration
      5. 4. IPv6 Auto-Configuration
      6. 5. Manual Configuration using Red Hat Operating System
      7. 6. Proposed Methods
      8. 7. Validation on Red Hat Operating System and Analysis
      9. 8. Quality of Service and 6to4 Tunneling Mechanism
      10. 9. Conclusion
    5. Chapter 10: A Proposed Intelligent Denoising Technique for Spatial Video Denoising for Real-Time Applications
      1. Abstract
      2. Introduction
      3. Video Denoising Techniques
      4. Comparison Criteria
      5. The Proposed Video Denoising System
      6. Simulation Results of the Proposed System
      7. Conclusion
    6. Chapter 11: Automatic Speaker Localization and Tracking
      1. Abstract
      2. Introduction
      3. Speech Database
      4. Sound Field Description
      5. Algorithm of the New Filtered Correlation Method: FCM
      6. Algorithm of the New Energy Differential Method: EDM
      7. Generation of the Command Signals for the Camera Control
      8. Experiments and Results
      9. Conclusion
  8. Section 3: Mobile Technologies
    1. Chapter 12: Extended Mobile IPv6 Route Optimization for Mobile Networks in Local and Global Mobility Domain
      1. Abstract
      2. Introduction
      3. Related Works
      4. EMIP Scheme
      5. Performance Evaluation
      6. Conclusion
    2. Chapter 13: Network Layer Mobility Management Schemes for IP-Based Mobile Networks
      1. Abstract
      2. Introduction
      3. Macro-Mobility Management Schemes
      4. Micro-Mobility Management Schemes
      5. Conclusion
    3. Chapter 14: A CASE Tool for Java Mobile Computing Applications
      1. Abstract
      2. Introduction
      3. Related Work
      4. The Algorithm
      5. Type Definitions
      6. Definitions
      7. The Generator Algorithm
      8. The Integrated CASE System
      9. Experimental Results
      10. Conclusion and Future Directions
  9. Section 4: Privacy
    1. Chapter 15: Pertinent Prosodic Features for Speaker Identification by Voice
      1. Abstract
      2. Introduction
      3. Database
      4. Variability of Some Prosodic Features
      5. Optimal Distance for Heterogeneous Features: “ODHEF distance”
      6. Method of Speaker Recognition
      7. Experimental Results
      8. Conclusion
    2. Chapter 16: Memorizing Algorithm
      1. Abstract
      2. Introduction
      3. Related Works
      4. Anonymization Area and Privacy Problem
      5. Grid-Based Solution for the Trusted Party Architecture
      6. Memorizing Algorithm for Grid-Based Solution
      7. Evaluation
      8. Conclusion
    3. Chapter 17: Building an Intelligent Mobile Advertising System
      1. Abstract
      2. 1. Introduction
      3. 2. Understanding Mobile Advertising
      4. 3. SmartMobile-AD
      5. 4. Technical Solutions in The SmartMobile-AD System
      6. 5. Application Examples and Simulation Results
      7. 6. Related Work
      8. 6. Conclusion
  10. Compilation of References
  11. About the Contributors