You are previewing Mobile Intelligence.
O'Reilly logo
Mobile Intelligence

Book Description

  • Focuses on learning patterns and knowledge from data generated by mobile users and mobile technology.

  • Covers research and application issues in applying computational intelligence applications to mobile computing

  • Delivers benefits to a wide range of applications

  • Introduces the state of the art of computational intelligence to the mobile paradigm

  • Table of Contents

    1. Cover Page
    2. Title Page
    3. Copyright
    4. Contents
    5. Preface
    6. Contributors
    7. Part I: Mobile Data and Intelligence
      1. Chapter 1: A Survey of State-of-the-Art Routing Protocols for Mobile Ad Hoc Networks
        1. 1.1 INTRODUCTION
        2. 1.2 A TAXONOMY OF MANET ROUTING PROTOCOLS
        3. 1.3 PROACTIVE ROUTING PROTOCOLS
        4. 1.4 REACTIVE ROUTING PROTOCOLS
        5. 1.5 OTHER ROUTING PROTOCOLS
        6. 1.6 CONCLUSION
        7. REFERENCES
      2. Chapter 2: Connected Dominating Set for Topology Control in Ad Hoc Networks
        1. 2.1 INTRODUCTION
        2. 2.2 RELATED WORK
        3. 2.3 NETWORK ASSUMPTIONS AND PRELIMINARIES
        4. 2.4 AREA-BASED CDS FORMATION ALGORITHM
        5. 2.5 EXPERIMENTAL SIMULATIONS
        6. 2.6 CONCLUSION AND FUTURE WORK
        7. ACKNOWLEDGMENTS
        8. REFERENCES
      3. Chapter 3: An Intelligent Way to Reduce Channel Under-utilization in Mobile Ad hoc Networks
        1. 3.1 INTRODUCTION
        2. 3.2 RELATED WORKS
        3. 3.3 BACKGROUND
        4. 3.4 ENHANCEMENTS FOR EFFICIENT CHANNEL UTILIZATION
        5. 3.5 PERFORMANCE EVALUATION AND DISCUSSIONS
        6. 3.6 SUMMARY
        7. REFERENCES
      4. Chapter 4: Mobility in Publish/Subscribe Systems
        1. 4.1 INTRODUCTION
        2. 4.2 MOBILE APPLICATIONS
        3. 4.3 PUBLISH/SUBSCRIBE
        4. 4.4 CLIENT MOBILITY
        5. 4.5 EXAMPLE APPLICATION
        6. 4.6 SUMMARY
        7. REFERENCES
      5. Chapter 5: Cross-Layer Design Framework for Adaptive Cooperative Caching in Mobile Ad Hoc Networks
        1. 5.1 INTRODUCTION
        2. 5.2 CROSS-LAYER DESIGN IN WIRELESS NETWORKS
        3. 5.3 COOPERATIVE CACHING APPROACHES IN MANETs
        4. 5.4 THE PROPOSED CLUSTER-BASED ADAPTIVE COOPERATIVE CACHING SCHEME
        5. 5.5 CONCLUSIONS AND FUTURE TRENDS
        6. REFERENCES
      6. Chapter 6: Recent Advances in Mobile Agent-Oriented Applications
        1. 6.1 INTRODUCTION
        2. 6.2 MOBILE AGENTS AND DISTRIBUTED INFORMATION RETRIEVAL
        3. 6.3 SYSTEM ADMINISTRATION
        4. 6.4 MOBILE AGENTS AND SENSOR NETWORK
        5. 6.5 SWARMING INTELLIGENCE
        6. 6.6 AGENTS, PERVASIVE COMPUTING, AND EDUCATION: A CASE STUDY
        7. 6.7 CONCLUSIONS AND FUTURE TRENDS
        8. ACKNOWLEDGMENTS
        9. REFERENCES
    8. Part II: Location-Based Mobile Information Services
      1. Chapter 7: KCLS: A Cluster-Based Location Service Protocol and Its Applications in Multihop Mobile Networks
        1. 7.1 INTRODUCTION
        2. 7.2 THE KCLS PROTOCOL
        3. 7.3 PERFORMANCE ANALYSIS
        4. 7.4 LOCATION SERVICE AND APPLICATIONS
        5. 7.5 CONCLUSION
        6. REFERENCES
      2. Chapter 8: Predictive Location Tracking in Cellular and in Ad Hoc Wireless Networks
        1. 8.1 INTRODUCTION
        2. 8.2 PREDICTIVE LOCATION TRACKING TECHNIQUES
        3. 8.3 PREDICTIVE LOCATION INDEXING TECHNIQUES
        4. 8.4 CONCLUSION
        5. ACKNOWLEDGMENTS
        6. REFERENCES
      3. Chapter 9: An Efficient Air Index Scheme for Spatial Data Dissemination in Mobile Computing Environments
        1. 9.1 INTRODUCTION
        2. 9.2 PRELIMINARIES
        3. 9.3 AIR INDEXES FOR NONSPATIAL DATA
        4. 9.4 AIR INDEXES FOR SPATIAL DATA
        5. 9.5 CELL-BASED DISTRIBUTED AIR INDEX FOR SPATIAL DATA
        6. 9.6 SUMMARY
        7. REFERENCES
      4. Chapter 10: Next Generation Location-based Services: Merging Positioning and Web 2.0
        1. 10.1 INTRODUCTION
        2. 10.2 LBS: THE FIRST GENERATION
        3. 10.3 WEB 2.0
        4. 10.4 LBS CLASSIFICATION
        5. 10.5 A WEB 2.0 SUPPLY CHAIN FOR LBS
        6. 10.6 LOCATION SERVICES
        7. 10.7 LOCATION PRIVACY
        8. 10.8 SUMMARY
        9. REFERENCES
    9. Part III: Mobile Mining
      1. Chapter 11: Data Mining for Moving Object Databases
        1. 11.1 INTRODUCTION
        2. 11.2 MOBILITY PREDICTION USING MOVEMENT HISTORIES
        3. 11.3 SEQUENTIAL PATTERN MINING-BASED APPROACHES
        4. 11.4 FINDING OTHER INTERESTING PATTERNS
        5. 11.5 CLUSTERING MOVING OBJECTS
        6. 11.6 DENSE REGIONS AND SELECTIVITY ESTIMATION
        7. 11.7 COMPARING MOVING OBJECT TRAJECTORIES
        8. 11.8 CONCLUSIONS
        9. ACKNOWLEDGMENTS
        10. REFERENCES
      2. Chapter 12: Mobile Data Mining on Small Devices Through Web Services
        1. 12.1 INTRODUCTION
        2. 12.2 MOBILE DATA MINING
        3. 12.3 MOBILE WEB SERVICES
        4. 12.4 SYSTEM DESIGN AND IMPLEMENTATION
        5. 12.5 SUMMARY
        6. REFERENCES
    10. Part IV: Mobile Context-Aware and Applications
      1. Chapter 13: Context Awareness: A Formal Foundation
        1. 13.1 INTRODUCTION
        2. 13.2 BACKGROUND
        3. 13.3 RELATED WORK
        4. 13.4 WIRELESS SENSOR NETWORKS
        5. 13.5 FORMALIZING CONTEXT AWARENESS AND CONTEXT DEPENDENCY
        6. 13.6 CASE STUDY: FROM SPECIFICATION, VIA FORMALISM, TO IMPLEMENTATION
        7. 13.7 CONCLUDING REMARKS
        8. REFERENCES
      2. Chapter 14: Experiences with a Smart Office Project
        1. 14.1 INTRODUCTION
        2. 14.2 SMART OFFICE PROJECT
        3. 14.3 REFLECTIVE MOBILE AGENTS WITHIN SMART OFFICES
        4. 14.4 LOCATION TRACKING AND PREDICTION
        5. 14.5 ORGANIC COMPUTING MIDDLEWARE FOR UBIQUITOUS ENVIRONMENTS
        6. 14.6 CONCLUSION
        7. REFERENCES
      3. Chapter 15: An Agent-Based Architecture for Providing Enhanced Communication Services
        1. 15.1 INTRODUCTION
        2. 15.2 MOTIVATION
        3. 15.3 CONSOLIDATED PRESENCE INFORMATION
        4. 15.4 ARCHITECTURE
        5. 15.5 BDI AND AGENTSPEAK(L)
        6. 15.6 BDI AND CONTEXT AWARE COMMUNICATION
        7. 15.7 RELATED WORK
        8. 15.8 CONCLUSIONS
        9. ACKNOWLEDGMENTS
        10. REFERENCES
    11. Part V: Mobile Intelligence Security
      1. Chapter 16: MANET Routing Security
        1. 16.1 INTRODUCTION
        2. 16.2 MANETs ROUTING APPROACHES
        3. 16.3 SECURE MANET ROUTING PROPOSALS
        4. 16.4 ROBUST SOURCE ROUTING
        5. 16.5 SUMMARY
        6. REFERENCES
      2. Chapter 17: An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks
        1. 17.1 INTRODUCTION
        2. 17.2 GRAPH NEURON
        3. 17.3 HIERARCHICAL GRAPH NEURON
        4. 17.4 CASE STUDY I: DHGN FOR PATTERN RECOGNITION
        5. 17.5 CASE STUDY II: GN FOR THREAT DETECTION IN WSN
        6. 17.6 DHGN APPROACH FOR THREAT DETECTION IN MANET
        7. 17.7 SUMMARY
        8. ACKNOWLEDGMENTS
        9. REFERENCES
      3. Chapter 18: SMRTI: Secure Mobile Ad Hoc Network Routing with Trust Intrigue
        1. 18.1 INTRODUCTION
        2. 18.2 RELATED WORK
        3. 18.3 ASSUMPTIONS AND TERMINOLOGIES
        4. 18.4 SMRTI: ARCHITECTURE
        5. 18.5 SIMULATION RESULTS
        6. 18.6 CONCLUSION
        7. REFERENCES
      4. Chapter 19: Managing Privacy in Location-based Access Control Systems
        1. 19.1 INTRODUCTION
        2. 19.2 RELATED WORK
        3. 19.3 BASIC SCENARIO AND CONCEPTS
        4. 19.4 LOCATION-BASED ACCESS CONTROL
        5. 19.5 OBFUSCATION TECHNIQUES FOR USER-PRIVACY
        6. 19.6 A PRIVACY-AWARE LBAC SYSTEM
        7. 19.7 SUMMARY
        8. ACKNOWLEDGMENTS
        9. REFERENCES
    12. Part VI: Mobile Multimedia
      1. Chapter 20: VoiceXML-Enabled Intelligent Mobile Services
        1. 20.1 INTRODUCTION
        2. 20.2 RELATED WORK
        3. 20.3 A SCENARIO OF USING THE VOICE SYSTEM
        4. 20.4 ARCHITECTURE OF THE VOICE SYSTEM
        5. 20.5 USER SESSION STATES
        6. 20.6 APPLICATION VARIABLES
        7. 20.7 AVAILABLE USER SESSION STATES
        8. 20.8 USABILITY EXPERIMENTS
        9. 20.9 CONCLUSION AND FUTURE WORK
        10. REFERENCES
      2. Chapter 21: User Adaptive Video Retrieval on Mobile Devices
        1. 21.1 INTRODUCTION
        2. 21.2 RELATED WORK
        3. 21.3 SYSTEM ARCHITECTURE
        4. 21.4 VIDEO DATABASE MODELING
        5. 21.5 MoVR: MOBILE-BASED VIDEO RETRIEVAL
        6. 21.6 IMPLEMENTATION AND EXPERIMENTS
        7. 21.7 SUMMARY
        8. ACKNOWLEDGMENTS
        9. REFERENCES
      3. Chapter 22: A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-based Service Environment
        1. 22.1 INTRODUCTION
        2. 22.2 UBIQUITOUS FASHIONABLE COMPUTER
        3. 22.3 LOCATION-BASED SERVICE ENVIRONMENT
        4. 22.4 APPLICATION EXAMPLE: USER-FRIENDLY INTERACTION WITH UBIQUITOUS ENVIRONMENT USING I-THROW
        5. 22.5 RELATED WORK
        6. 22.6 CONCLUSION
        7. REFERENCES
      4. Chapter 23: Energy Efficiency for Mobile Multimedia Replay
        1. 23.1 INTRODUCTION
        2. 23.2 VIDEO CODEC
        3. 23.3 EXPERIMENT SETTING
        4. 23.4 EXPERIMENT RESULTS
        5. 23.5 SUMMARY
        6. ACKNOWLEDGMENTS
        7. REFERENCES
    13. Part VII: Intelligent Network
      1. Chapter 24: Efficient Data-Centric Storage Mechanisms in Wireless Sensor Networks
        1. 24.1 INTRODUCTION
        2. 24.2 BASIC DATA-CENTRIC MECHANISMS
        3. 24.3 DATA-REPLICA MECHANISMS
        4. 24.4 LOAD-BALANCED MECHANISMS
        5. 24.5 HIERARCHICAL MANAGEMENT MECHANISMS
        6. 24.6 FUTURE DIRECTIONS AND OPEN ISSUES
        7. 24.7 SUMMARY
        8. REFERENCES
      2. Chapter 25: Tracking in Wireless Sensor Networks
        1. 25.1 INTRODUCTION
        2. 25.2 TRACKING SCENARIOS IN WSNs
        3. 25.3 TRACKING TECHNIQUES
        4. 25.4 TRACKING IN WHSNs
        5. 25.5 SUMMARY
        6. REFERENCES
      3. Chapter 26: DDoS Attack Modeling and Detection in Wireless Sensor Networks
        1. 26.1 INTRODUCTION
        2. 26.2 ATTACK MODELS IN WIRELESS SENSOR NETWORK
        3. 26.3 REQUIREMENTS FOR DDoS ATTACK DETECTION IN WIRELESS SENSOR NETWORKS
        4. 26.4 ADVERSARY MODEL
        5. 26.5 NETWORK MODEL
        6. 26.6 THRESHOLD PATTERN MODELING
        7. 26.7 TRAFFIC FLOW OBSERVATION TABLE
        8. 26.8 CENTRALIZED ATTACK DETECTION
        9. 26.9 CONCLUSIONS
        10. REFERENCES
      4. Chapter 27: Energy-Efficient Pattern Recognition for Wireless Sensor Networks
        1. 27.1 INTRODUCTION
        2. 27.2 PRINCIPLES OF EVENT RECOGNITION FOR SENSOR NETWORKS
        3. 27.3 VOTING GRAPH NEURON APPROACH
        4. 27.4 SIMULATIONS
        5. 27.5 COMPARISON
        6. 27.6 CONCLUSION AND FUTURE WORK
        7. REFERENCES
    14. Index