You are previewing Mobile and Handheld Computing Solutions for Organizations and End-Users.
O'Reilly logo
Mobile and Handheld Computing Solutions for Organizations and End-Users

Book Description

Mobile and Handheld Computing Solutions for Organizations and End-Users discusses a broad range of topics in order to advance handheld knowledge and apply the proposed methods to real-world issues for organizations and end users. This book brings together researchers and practitioners involved with mobile and handheld computing solutions useful for IT students, researchers, and scholars.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. Associate Editors
    3. List of Reviewers
  5. Preface
    1. INTRODUCTION
    2. CONTEMPORARY METHODOLOGIES AND TECHNOLOGIES OF MOBILE AND HANDHELD COMPUTING
    3. ORGANIZATION OF THE BOOK
    4. SUMMARY
  6. Section 1: Mobile Security
    1. Chapter 1: A 2D Barcode Validation System for Mobile Commerce
      1. ABSTRACT
      2. INTRODUCTION
      3. UNDERSTANDING 2D BARCODES AND SUPPORTING TECHNOLOGIES
      4. RELATED WORK IN MOBILE COMMERCE
      5. AN OVERVIEW OF A 2D BARCODE-BASED VALIDATION SOLUTION
      6. A 2D BARCODE VALIDATION APPLICATION: MOBILE MOVIE TICKETS
      7. CONCLUSION
    2. Chapter 2: Threshold-Based Location-Aware Access Control
      1. ABSTRACT
      2. INTRODUCTION
      3. DISTANCE BOUNDING PROTOCOLS
      4. LOCATION-AWARE ACCESS CONTROL
      5. DISCUSSION
      6. CONCLUSION
    3. Chapter 3: Survivability Enhancing Techniques for RFID Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. RFID SURVIVABILITY
      4. RFID SURVIVABILITY ENHANCING TECHNIQUES
      5. CONCLUSION AND RESEARCH DIRECTION
    4. Chapter 4: Mobile Agent Based Network Defense System in Enterprise Network
      1. ABSTRACT
      2. INTRODUCTION
      3. SYSTEM ARCHITECTURE
      4. AUTONOMOUS AGENTS AND CENTRAL SERVERS
      5. DATA FUSION AND EVENT ANALYSIS ENGINE
      6. INTRUSION MODELING LANGUAGE
      7. QOS-BASED INTRUSION RESPONSE
      8. AN ATTACK SCENARIO
      9. EXPERIMENTAL RESULT
      10. RELATED WORK
      11. CONCLUSION
    5. Chapter 5: Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. CATEGORIZATION AND DETERMINATION OF THE SECURITY CRITICALITY OF IT SYSTEMS’ CONTEXT OF USE
      5. STEPS OF THE SECURITY ASSURANCE EVALUATION METHODOLOGY
      6. ARCHITECTURAL CHOICE FOR THE SECURITY ASSURANCE EVALUATION METHODOLOGY
      7. APPLICATION TEST-BED
      8. CONCLUSION AND FUTURE WORK
  7. Section 2: Mobile Evaluations and Analyses
    1. Chapter 6: Modeling and Analyzing User Contexts for Mobile Advertising
      1. ABSTRACT
      2. 1. INTRODUCTION AND MOTIVATION
      3. 2. BACKGROUND REVIEW
      4. 3. A CONTEXT-AWARE MOBILE ADVERTISING SYSTEM
      5. 4. PROTOTYPE IMPLEMENTATION AND CASE STUDY
      6. 5. CONCLUSION AND FUTURE WORK
    2. Chapter 7: Effect of Personal Innovativeness, Attachment Motivation, and Social Norms on the Acceptance of Camera Mobile Phones
      1. ABSTRACT
      2. INTRODUCTION
      3. RESULTS AND DISCUSSION
      4. DISCUSSION
      5. CONCLUSION
    3. Chapter 8: A Framework for the Quality Evaluation of B2C M-Commerce Services
      1. ABSTRACT
      2. INTRODUCTION
      3. QUALITY EVALUATION OF B2C M-COMMERCE
      4. CONCLUSION
  8. Section 3: Mobile Applications
    1. Chapter 9: MICA
      1. ABSTRACT
      2. INTRODUCTION
      3. REQUIREMENTS AND CONCEPTS
      4. DEVELOPMENT METHODOLOGY OF MICA
      5. THE EFFECTS OF MICA ON ART
      6. USABILITY EVALUATION
      7. EVALUATION OF EFFICIENCY
      8. ANALYSIS OF SALES POTENTIAL
      9. RELATED WORK
      10. CONCLUSION
    2. Chapter 10: Ontology-Based Personal Annotation Management on Semantic Peer Network to Facilitating Collaborations in E-Learning
      1. ABSTRACT
      2. INTRODUCTION
      3. SEMANTIC P2P ARCHITECTURE FOR SOCIAL COLLABORATION
      4. DISTRIBUTED RDF STORE ON THE TWO LEVEL RING NETWORK
      5. COLLABORATION SERVICES BASED ON THE DISTRIBUTED RDF STORE
      6. IMPLEMENTATION
      7. CONCLUSION
    3. Chapter 11: A Petri-Net Based Context Representation in Smart Car Environment
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. SMART CAR
      4. 3. CONTEXT REPRESENTATION
      5. 4. AN APPLICATION SCENARIO: THE SMART CAR
      6. 5. ANALYSIS AND PERFORMANCE EVALUATION
      7. 6. RELATED WORK
      8. 7. CONCLUSION AND FUTURE WORK
  9. Section 4: Mobile Human Computer Interaction (HCI)
    1. Chapter 12: Tool-Supported User-Centred Prototyping of Mobile Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. TOOL SUPPORT FOR USER-CENTRED PROTOTYPING
      4. MOPEDT: A USER-CENTRED PROTOTYPING TOOL FOR MOBILE PHONES
      5. EXECUTING EMPIRIC EVALUATIONS: OBSERVATION
      6. CONCLUSION
    2. Chapter 13: Sampling and Reconstructing User Experience
      1. ABSTRACT
      2. INTRODUCTION
      3. CHALLENGES AND PITFALLS OF EXPERIENCE SAMPLING
      4. THE DAY RECONSTRUCTION METHOD
      5. ESRM PROCEDURE
      6. CASE STUDY: SURVEYING COMMUNICATION NEEDS OF BUSY PARENTS
      7. RESULTS
      8. RELATED WORK
      9. DISCUSSION
      10. CONCLUSION, FUTURE WORK, AND DIRECTIONS FOR IMPROVEMENT
  10. Section 5: Mobile Health
    1. Chapter 14: Mobile E-Health Information System
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. EHR ARCHITECTURE
      5. MEHIS DESIGN
      6. MEHIS SUBSYSTEMS
      7. ADMISSIONS, DISCHARGE, AND TRANSFER
      8. MEHIS IMPLEMENTATION
      9. MEHIS EVALUATION
      10. CONCLUSION AND FUTURE WORK
    2. Chapter 15: Integration of Health Records by Using Relaxed ACID Properties between Hospitals, Physicians and Mobile Units like Ambulances and Doctors
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE TRANSACTION MODEL
      4. 3. MOST IMPORTANT ASYNCHRONOUS REPLICATION METHODS FOR DISCONNECTED SYSTEMS
      5. 4. IMPLEMENTATION OF INTERNET REPLICATION SERVICES WITH RELAXED ACID PROPERTIES
      6. 5. DESCRIPTION OF THE MOST IMPORTANT INTEGRATION ARCHITECTURES FOR DISTRIBUTED EHRS
      7. 6. DISCUSSION OF IMPLICATIONS AND POTENTIALS WITH THE PROPOSED ARCHITECTURAL SOLUTION
      8. 7. CONCLUSION AND FUTURE RESEARCH
  11. Section 6: Pervasive Computing
    1. Chapter 16: DSOA
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RELATED WORK
      4. 3. THE DSOA ARCHITECTURE
      5. 4. UBIQUITOUS PROTOCOLS (UP)
      6. 6. USE CASE: THE HYDRA APPLICATION
      7. 7. RESULTS
      8. 8. CONCLUSION
    2. Chapter 17: A Generic Context Interpreter for Pervasive Context-Aware Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. PRELIMINARIES
      4. THE ARCHITECTURE OF GENERIC CONTEXT INTERPRETER
      5. FUNCTIONAL DESIGN OF CONTEXT INTERPRETER GENERATOR MAPPING OPERATORS
      6. SCHEMA MATCHING
      7. CONTEXT EDITOR
      8. SYSTEM CONSTRUCTION AND EVALUATION
      9. CONCLUSION
  12. Section 7: Mobile Green Computing, Location-Based Services (LBS), and Mobile Networks
    1. Chapter 18: Reducing Power and Energy Overhead in Instruction Prefetching for Embedded Processor Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. INSTRUCTION PREFETCHING TECHNIQUES
      4. DLIC-BASED INSTRUCTION PREFETCHING
      5. CASE 1: LOOPS WITH DETERMINATE LOOP COUNTS
      6. CASE 2: LOOPS WITH INDETERMINATE LOOP COUNTS
      7. EXPERIMENTL RESULTS
      8. CONCLUSION
    2. Chapter 19: Interactive Rendering of Indoor and Urban Environments on Handheld Devices by Combining Visibility Algorithms with Spatial Data Structures
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. OVERVIEW
      5. TESTS AND RESULTS
      6. CONCLUSION AND FUTURE WORK
    3. Chapter 20: Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS
      1. ABSTRACT
      2. INTRODUCTION
      3. PROPOSED BINARY TREE BASED PROACTIVE ROUTING PROTOCOL
      4. PERFORMANCE ANALYSIS OF BTB-PROACTIVE APPROACH
      5. JUSTIFICATION OF PROPOSED ROUTING PROTOCOL
      6. CONCLUSION
  13. Compilation of References
  14. About the Contributors