You are previewing Emergent Trends in Personal, Mobile, and Handheld Computing Technologies.
O'Reilly logo
Emergent Trends in Personal, Mobile, and Handheld Computing Technologies

Book Description

Personal computing has taken many forms over recent years, as trends have seen the emergence of mobile and tablet technologies taking over the PC marketplace.Emergent Trends in Personal, Mobile, and Handheld Computing Technologies offers a vital compendium of the latest research within the field of personal computing, highlighting the latest trends in research and development of personal technology. As tablets and mobile phones begin to replace traditional hardware, it is important to stay abreast of the latest market research to keep your institution on the technological cutting-edge. This collection of case studies, best practices, and research offers chapters from experts from around the world, offering a critical resource for practitioners and academics alike.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. International Advisory Board
    2. Associate Editors
    3. International Editorial Review Board
  5. Preface
    1. INTRODUCTION
    2. A MOBILE TREND
    3. A CHALLENGE FOR MOBILE DEVELOPERS: WHICH MOBILE OPERATING SYSTEMS TO PICK?
    4. A DILEMMA FOR COMPANIES: WITH OR WITHOUT A MOBILE WEBSITE
    5. MOBILE APPLICATION STORES
    6. A RISING MOBILE APPLICATION: LOCATION-BASED SERVICES (LBS)
    7. GREEN COMPUTING AND MOBILE HANDHELD DEVICES
    8. CONTEMPORARY METHODS IN HANDHELD DATA PROTECTION
  6. Chapter 1: Contemporary Issues in Handheld Computing Research
    1. ABSTRACT
    2. INTRODUCTION
    3. MOBILE HANDHELD DEVICES
    4. SYSTEM STRUCTURE OF HANDHELD DEVICES
    5. HANDHELD COMPUTING
    6. TOPICS IN HANDHELD COMPUTING RESEARCH/APPLICATIONS
  7. Chapter 2: Opportunistic Software Deployment in Disconnected Mobile Ad Hoc Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. RATIONALE
    4. DEPLOYMENT PLATFORM
    5. MAJOR STEPS OF AN APPLICATION’S DEPLOYMENT
    6. EVALUATION
    7. RELATED WORK
    8. CONCLUSION AND FUTURE WORK
  8. Chapter 3: The Impact of Zoning Concept on Data-Flow Management within LBS System Components
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. ZONE-BASED UPDATE MECHANISM
    4. 3. INITIAL IMPLEMENTATION
    5. 4. TESTING AND EVALUATION
    6. 5. CONCLUSION
  9. Chapter 4: A Personal Handheld Device to Support People with Life-Threatening Anaphylactic Allergies (PervaLaxis)
    1. ABSTRACT
    2. INTRODUCTION
    3. PERVASIVE HEALTH AND HANDHELD DEVICES
    4. PERVALAXIS
    5. USER REQUIREMENTS
    6. EMERGENCY SCENARIO
    7. EVERYDAY LIFE
    8. EXPERIMENTS AND RESULTS
    9. SYSTEM USABILITY SCALE (SUS) ANALYSIS
    10. CONCLUSION
    11. FUTURE WORK
  10. Chapter 5: Enterprise Network Packet Filtering for Mobile Cryptographic Identities
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. HOST IDENTITY PROTOCOL ARCHITECTURE
    5. FIREWALL ARCHITECTURE
    6. OVERVIEW
    7. PACKET FILTERING
    8. CONNECTION TRACKING
    9. DATA STRUCTURES
    10. PERFORMANCE EVALUATION
    11. DISCUSSION
    12. CONCLUSION
  11. Chapter 6: A Novel Energy Saving Approach through Mobile Collaborative Computing Systems
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORKS
    4. 3. ENERGY SAVING THROUGH MOBILE COLLABORATIVE COMPUTING
    5. 4. NUMERICAL RESULTS
    6. 5. REAL SYSTEM DESIGN AND SIMULATION STUDY
  12. Chapter 7: A Measurement Framework of Mobile Service Adoption
    1. ABSTRACT
    2. 1 INTRODUCTION
    3. 2 EARLIER RESEARCH
    4. 3 A FRAMEWORK OF MOBILE SERVICE ADOPTION
    5. 4 EMPIRICAL ANALYSIS
    6. 5 CONCLUSION
    7. APPENDIX A
    8. APPENDIX B
  13. Chapter 8: Applying Commonsense Reasoning to Place Identification
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. MAIN COMPONENTS
    4. 3. APPLYING Cyc TO THE WHEREABOUTS DIARY
    5. 4. DEMONSTRATION
    6. 5. EXPERIMENTS
    7. 6. RELATED WORK
    8. 7. CONCLUSION AND FUTURE WORKS
  14. Chapter 9: Mobile Multimedia Streaming Using Secure Multipath in Wireless Ad Hoc Networks
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. ROUTING IN MANETs
    4. 3. NEIGHBOR STABILITY ROUTING
    5. 4. SECURE DATA DISTRIBUTION
    6. 5. CONCLUSION AND FUTURE WORK
  15. Chapter 10: A Collaborative Replication Approach for Mobile-P2P Networks
    1. ABSTRACT
    2. 1 INTRODUCTION
    3. 2 AN OVERVIEW OF THE ARCHITECTURE OF CADRE
    4. 3 RELATED WORK
    5. 4 KEY COMPONENTS OF CADRE
    6. 5 ENERGY-AWARE QUERY MODEL OF CADRE
    7. 6 CADRE: A DYNAMIC REPLICATION SCHEME FOR M-P2P NETWORKS
    8. 7 ALGORITHMS FOR REPLICATION IN CADRE
    9. 8 PERFORMANCE EVALUATION
    10. 9 CONCLUSION
  16. Chapter 11: Client-Server Based LBS Architecture
    1. ABSTRACT
    2. INTRODUCTION
    3. POSITIONING TECHNOLOGIES BACKGROUND
    4. EGNOS INTEGRITY MONITORING
    5. CLIENT-SERVER LBS ARCHITECTURE
    6. PROPOSED POSITIONING MODULE
    7. PRELIMINARY FIELD EXPERIMENTS
    8. CONCLUSION AND FUTURE WORK
  17. Chapter 12: Indoor Positioning Using FM Radio
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. FM POSITIONING
    5. RESULTS
    6. CONCLUSION
  18. Chapter 13: Exploring Personal Mobile Phones and Digital Display Systems to Support Indoor Navigation by Formative Study Methods
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. APPROACH
    5. THE EXPERIMENTAL SET-UP
    6. RESULTS
    7. DISCUSSION
    8. CONCLUSION AND FUTURE WORK
  19. Chapter 14: On Balancing Energy Consumption, Rendering Speed, and Image Quality on Mobile Devices
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. ADAPTIVE COMPONENTS OF OUR ALGORITHM
    5. BACKGROUND
    6. SYSTEM ARCHITECTURE
    7. OVERVIEW OF APPROACH
    8. WORKLOAD PREDICTING MODEL
    9. CPU SCHEDULER
    10. OUR OPTIMIZATION ALGORITHM
    11. EXPERIMENT AND RESULTS
    12. CONCLUSION AND FUTURE WORK
  20. Chapter 15: Commanding the Cloud by Moving a Camera Phone
    1. ABSTRACT
    2. INTRODUCTION
    3. CATCHING MOVEMENT
    4. BLOCK MATCHING
    5. CPU LOAD EXPERIMENT
    6. OPTIMIZATION
    7. DISCUSSION
    8. CONCLUSION
  21. Chapter 16: Session and Network Support for Autonomous Context-Aware Multiparty Communications in Heterogeneous Mobile Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. CONTEXT-AWARE MULTIPARTY SERVICE PROVISION
    4. ENABLING CONTEXT-AWARENESS AT THE SESSION LEVEL
    5. MODIFICATION OF A CONTEXT-AWARE SESSION TRIGGERED BY CONTEXT CHANGE
    6. ENABLING CONTEXT AWARENESS AT THE NETWORK LEVEL
    7. PROPAGATING CONTEXT TO CONTENT
    8. EVALUATING CONTEXT-AWARE MULTIPARTY SESSIONS
  22. Chapter 17: Peer Assist Live Streaming Overlay for Next-Generation-Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. NNodeTree ALGORITHM
    5. MONSTER P2P ADD-ON
    6. VALIDATION OF NNodeTree
    7. CONCLUSION
    8. FUTURE WORK
  23. Chapter 18: Effect of Personal Innovativeness, Attachment Motivation and Social Norms on the Acceptance of Camera Mobile Phones
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. LITERATURE REVIEW
    4. CONCEPTUAL MODEL AND HYPOTHESES DEVELOPMENT
    5. RESULTS AND DISCUSSION
    6. CONCLUSION
  24. Chapter 19: Annotation and Auto-Scrolling for Web Page Overview in Mobile Web Browsing
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. OVERVIEW PRESENTATION METHODS
    5. IMPLEMENTATION OF PROPOSED METHODS
    6. EXPERIMENTS
    7. USER EXPERIMENT
    8. SUMMARY
  25. Chapter 20: A Picture and a Thousand Words
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. A MOBILE SOCIAL COMPUTING APPLICATION FRAMEWORK
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
  26. Compilation of References
  27. About the Contributors