Autonomy and Intelligence - Opportunistic Service Delivery in Mobile Computing

نویسندگان

  • Jiangyan Chen
  • Michael J. O'Grady
  • Gregory M. P. O'Hare
چکیده

Significant opportunities exist for mobile network operators to enhance and refine those services they offer their subscribers. Developments in mobile devices have rendered it feasible to deploy solutions that incorporate an intelligent agent component. The use of agents is particularly apt in those situations that facilitate what may be termed opportunistic services provision. Such services are suited to certain domains that facilitate unobtrusive observance of the subscriber. As an illustration of the issues involved, a mobile blogging application is described.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Location-Aware Routing for Service-Oriented Opportunistic Computing

Smartphones, tablets, netbooks and laptops are intensively used every day by a large part of the population. These devices—which are equipped with Wi-Fi interfaces—can form disconnected mobile ad hoc networks (DMANETs) dynamically. These networks may allow service providers, such as local authorities, to deliver new kinds of services in a wide area (e.g., a city) without resorting to the infras...

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

Smart Devices for Next Generation Mobile Services

Ubiquitous computing requires new paradigms to assist users organizing and performing daily tasks. Supporting autonomy and providing secured execution environments are two among a lot of challenging issues. Next generation smart cards, so-called smart devices, are regarded as personal devices providing a secured execution and storage environment for application tasks and sensitive privacy infor...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks

The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006