Energy Efficient Group Messaging for Mobile Instant Messenger Apps
نویسندگان
چکیده
منابع مشابه
Characterizing Instant Messaging Apps on Smartphones
Proliferation of smart devices has fueled the popularity of using mobile instant messaging (IM) apps at a rapid pace. While the IM apps on smartphones have become increasingly popular, there has only been a little research on understanding the characteristics of these apps. Because most of the IM apps use proprietary protocols, it is challenging to analyze their internal operations. In this wor...
متن کاملMobile Instant Messaging
In this paper we describe a Mobile Instant Messaging system, MIM, designed for mobile environments. During design of mobile applications several new problems and possibilities have to be considered that do not exist with applications targeted at desktop PCs. One example of an application not designed for a mobile environment is current, very popular, instant messaging systems such as ICQ, AIM a...
متن کاملInstant Messaging Enabled Mobile Payments
According to an old telecom saying, no service can be considered as such, unless you can charge for it. Mobile payment (MP) is a term used to describe any payment where a mobile device is used in order to initiate, activate and/or confirm this payment. Contrary to popular belief, mobile payments do not restrict themselves to payments via mobile phone but can be made by virtually any mobile devi...
متن کاملNetwork Working Group Indication of Message Composition for Instant Messaging
In instant messaging (IM) systems, it is useful to know during an IM conversation whether the other party is composing a message; e.g., typing or recording an audio message. This document defines a new status message content type and XML namespace that conveys information about a message being composed. The status message can indicate the composition of a message of any type, including text, vo...
متن کاملVirus Throttling for Instant Messaging
Virus Throttling is a technique to slow the spread of worms and viruses by targeting their propagation. It works by preventing an infected machine infecting many others. This then results in fewer machines becoming infected and less traffic generated by the virus. The technique has been shown to work well for worms that spread over many TCP/IP protocols as well as email. This paper applies the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Signal Processing, Image Processing and Pattern Recognition
سال: 2016
ISSN: 2005-4254,2005-4254
DOI: 10.14257/ijsip.2016.9.10.37