doi:

DOI: 10.3724/SP.J.1016.2011.02029

Chinese Journal of Computers (计算机学报) 2011/34:11 PP.2029-2051

Mobile Internet: Terminal Devices, Networks and Services


Abstract:
The technologies for wireless broadband access and mobile devices have been changing very fast. People expect that information and services can be delivered from the Internet anytime and anywhere even while they are moving. Under the current circumstances, the Mobile Internet becomes an emerging technology and expects to grow up in an accelerated pace. The challenges we are facing from the Mobile Internet come from the mobile devices, access networks, services and security and privacy protection. It is essential for us to further explore the fundamental theories and key technologies to meet the requirements from our national information industry and broad research communities. We conduct a survey of the Mobile Internet on four aspects, namely mobile devices, access networks, services and security and privacy protection. We further give our research on test-bed of WLAN base station and performance optimization of wireless mesh networks. Finally we conclude the paper by elaborating the future research directions on the Mobile Internet.

Key words:Mobile Internet,mobile devices,access networks,services,security and privacy protection

ReleaseDate:2014-07-21 15:58:06



[1] Morgan Stanley. Mobile Internet Research Report,Dec. 2009

[2] KPCB. Mobile Internet Trends Report, May, 2011

[3] CNNIC. 27th Statistical Report on Internet Development in China, Jan. 2011(in Chinese) (中国互联网络信息中心. 第27次中国互联网络发展状况统计报告,2011年1月)

[4] China Academy of Telecommunication Research of MIIT, Mobile Internet White Paper, May, 2011(in Chinese) (工业和信息化部电信研究院. 移动互联网白皮书. 2011, 5)

[5] Weiser M. The computer for the 21st century. Scientific American, 1991, 265(3): 94-104

[6] Oliver E. A survey of platforms for mobile networks research. ACM SIGMOBILE Mobile Computing and Communications Review, 2009, 12(4): 56-63

[7] Hall S P, Anderson E. Operating systems for mobile computing. Journal of Computing Sciences in Colleges, 2009, 25(2): 64-71

[8] Cuervo E, Balasubramanian A, Cho D et al. MAUI: Making smartphones last longer with code offload//Proceedings of the 8th International Conference on Mobile Systems, Applications,and Services(MobiSys’10).San Francisco, USA, 2010: 49-62

[9] Das T, Mohan P, Padmanabhan V N et al. PRISM: Platform for remote sensing using smartphones//Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services(MobiSys’10). San Francisco, USA, 2010: 63-76

[10] Naik K. A survey of software based energy saving methodologies for handheld wireless communication devices. Department of ECE, University of Waterloo: Technical Report No.2010-13, 2010

[11] Gezici S. A survey on wireless position estimation. Wireless Personal Communications, 2008, 44(3): 263-282

[12] Krishnamoorthy S, Agrawala A. Poster: A context-aware framework for mobile applications//Proceedings of the 9th international conference on Mobile systems, applications, and services(MobiSys’11). Bethesda, Maryland, USA, 2011: 403-404

[13] Zhang D. Web content adaptation for mobile handheld devices. Communications of the ACM, 2007, 50(2): 75-79

[14] Adzic V, Kalva H, Furht B. A survey of multimedia content adaptation for mobile devices. Multimedia Tools and Applications, 2011, 51(1): 379-396

[15] Weilenmann A, Juhlin O. Time to revisit mobility in mobile HCI?//Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services. Stockholm, Sweden, 2011: 717-719

[16] Zhao X, Guo Y, Feng Q et al. A system context-aware approach for battery lifetime prediction in smart phones//Proceedings of the 2011 ACM Symposium on Applied Computing. TaiChung, Taiwan, China, 2011: 641-646

[17] Vallerio K S, Zhong L, Jha N K. Energy-efficient graphical user interface design. IEEE Transactions on Mobile Computing, 2006, 5(7): 846-859

[18] Shih E, Bahl P, Sinclair M J. Wake on wireless: An event driven energy saving strategy for battery operated devices//Proceedings of the 8th Annual International Conference on Mobile Computing and Networking(MobiCom’02). Atlanta, USA, 2002: 160-171

[19] Kim T, Lee J, Cha H et al. An energy-aware transmission mechanism for WiFi-based mobile devices handling upload TCP traffic. International Journal of Communication Systems, 2009, 22(5): 625-640

[20] Benini L, Bogliolo A, De Micheli G. A survey of design techniques for system-level dynamic power management. IEEE Transactions on Very Large Scale Integration(VLSI) Systems, 2000, 8(3): 299-316

[21] Min J, Cha H, Ha R. System-level integrated power management for handheld systems.Microprocessors and Microsystems, 2009, 33(3): 201-210

[22] Rahmati A, Zhong L. Context-for-wireless: Context-sensitive energy-efficient wireless data transfer//Proceedings of the 5th International Conference on Mobile Systems, Applications and Services(MobiSys’07). San Juan, Puerto Rico, 2007: 165-178

[23] Agarwal Y, Chandra R, Wolman A et al. Wireless wakeups revisited: Energy management for VoIP over Wi-Fi smartphones//Proceedings of the 5th International Conference on Mobile Systems, Applications and Services(MobiSys’07). San Juan, Puerto Rico, 2007: 179-191

[24] Raghunathan V, Pering T, Want R et al. Experience with a low power wireless mobile computing platform//Proceedings of the 2004 International Symposium on Low Power Electronics and Design. Newport Beach, USA, 2004: 363-368

[25] Jung E, Vaidya N H. Improving IEEE 802.11 power saving mechanism. Wireless Networks, 2008, 14(3): 375-391

[26] Krashinsky R, Balakrishnan H. Minimizing energy for wireless web access with bounded slowdown//Proceedings of the 8th Annual International Conference on Mobile Computing and Networking(MobiCom’02). Atlanta, USA, 2002: 119-130

[27] Qiao D, Shin K G. Smart power-saving mode for IEEE 802.11 wireless LANs//Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM’05). Miami, USA, 2005: 1573-1583

[28] Anastasi G, Conti M, Gregori E et al. 802.11 power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues. Wireless Networks, 2008, 14(6): 745-768

[29] Lee J, Rosenberg C, Chong E K P. Energy efficient schedulers in wireless networks: Design and optimization. Mobile Networks and Applications, 2006, 11(3): 377-389

[30] Zhang M. Study on WLAN based indoor location estimation technology[Ph.D. dissertation] . Graduate School of Shanghai Jiaotong University, Shanghai, 2009(in Chinese) (张明华. 基于WLAN的室内定位技术研究[博士学位论文] . 上海交通大学, 上海, 2009)

[31] Zhou Ao-Ying, Yang Bin, Jin Che-Qing, Ma Qiang. Location-based services: Architecture and progress. Chinese Journal of Computers, 2011, 34(7): 1155-1171(in Chinese) (周傲英, 杨彬, 金澈清, 马强. 基于位置的服务: 架构与进展. 计算机学报, 2011, 34(7): 1155-1171)

[32] Engee P K. The global positioning system: Signals, measurements and performance. International Journal of Wireless Information Networks, 1994, 1(2): 83-105

[33] Liu H, Darabi H, Banerjee P, Liu J. Survey of wireless indoor positioning techniques and systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2007, 37(6): 1067-1080

[34] Seppanen A, Ikonen J, Porras J. Extracting and using position information in WLAN networks. Lappeenranta University of Technology, Finland, 2003

[35] Chen Y, Chan Y, She C. Enabling location-based services in wireless LAN hotspots. International Journal of Network Management, 2005, 15(3): 163-175

[36] Li X, Pahlavan K. Super-resolution TOA estimation with diversity for indoor geolocation. IEEE Transactions on Wireless Communications, 2004, 3(1): 224-234

[37] Li X, Pahlavan K, Latva-Aho M et al. Comparison of indoor geolocation methods in DSSS and OFDM wireless LAN systems//Proceedings of the IEEE 52nd Vehicular Technology Conference(VTC’00). Boston, USA, 2000: 3015-3020

[38] Gunther A, Hoene C. Measuring round trip times to determine the distance between WLAN nodes//Proceedings of the 4th International IFIP Networking Conference. Waterloo, Ontario, Canada, 2005: 303-319

[39] Pahlavan K, Li X, Makela J P. Indoor geolocation science and technology. IEEE Communications Magazine, 2002, 40(2): 112-118

[40] Teuber A, Eissfeller B, Pany T. A two-stage fuzzy logic approach for wireless LAN indoor Positioning//Proceedings of the IEEE/ION Position,Location,and Navigation Symposium. San Diego, USA, 2006: 730-738

[41] Niculescu D, Nath B. VOR base stations for indoor 802.11 positioning//Proceedings of the 10th Annual International Conference on Mobile Computing and Networking(MobiCom’04). Philadelphia, USA, 2004: 58-69

[42] Bahl P, Padmanabhan V N. RADAR: An in-building RF-based user location and tracking system//Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM’00). Tel Aviv, Israel, 2000: 775-784

[43] Battiti R, Villani A, Nhat T L. Neural network models for intelligent networks: Deriving the location from signal patterns//Proceedings of the 1st Annual Symposium on Autonomous Intelligent Networks and Systems. Los Angeles, USA, 2002

[44] Brunato M, Battiti R. Statistical learning theory for location fingerprinting in wireless LANs. Computer Networks, 2005, 47(6): 825-845

[45] Prasithsangaree P, Krishnamurthy P, Chrysanthis P. On indoor position location with wireless LANs//Proceedings of the 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Lisboa, Portagal, 2002: 720-724

[46] Madigan D, Einahrawy E, Martin R P et al. Bayesian indoor positioning systems//Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM’05). Miami, USA, 2005: 1217-1227

[47] Kjargaard M. A taxonomy for radio location fingerprinting//Proceedings of the 3rd International Conference on Location-and Context-Awareness. Oberpfaffenhofen, Germany, 2007: 139-156

[48] Youssef M A, Agrawala A, Udaya Shankar A. WLAN location determination via clustering and probability distributions//Proceedings of the 1st IEEE International Conference on Pervasive Computing and Communications(PerCom 2003). Dallas-Fort, USA, 2003: 143-150

[49] Chen Y, Yang Q, Yin J et al. Power-efficient access-point selection for indoor location estimation. IEEE Transactions on Knowledge and Data Engineering, 2006, 18(7): 877-888

[50] King T, Haenselmann T, Effelsberg W. On-demand fingerprint selection for 802.11-based positioning systems//Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks. Newport Beach, USA, 2008: 1-8

[51] Jie Y, Qiang Y, Ni L M. Learning adaptive temporal radio maps for signal-strength-based location estimation. IEEE Transactions on Mobile Computing, 2008, 7(7): 869-883

[52] Safwat A M, Mouftah H. 4G network technologies for mobile telecommunications. IEEE Network, 2005, 19(5): 3-4

[53] Jun M, Li G Y, Biing H J. Signal processing in cognitive radio. Proceedings of the IEEE, 2009, 97(5): 805-823

[54] Gesbert D, Shafi M, Da-Shan S et al. From theory to practice: An overview of MIMO space-time coded wireless systems. IEEE Journal on Selected Areas in Communications, 2003, 21(3): 281-302

[55] Ariananda D D, Lakshmanan M K, Nikoo H. A survey on spectrum sensing techniques for cognitive radio//Proceedings of the 2nd International Workshop on Cognitive Radio and Advanced Spectrum Management. Aalborg, Denmark, 2009: 74-79

[56] Akyildiz I F, Lee W, Vuran M C et al. Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer Networks, 2006, 50(13): 2127-2159

[57] Incel O D. A survey on multi-channel communication in wireless sensor networks. Computer Networks, 2011, 55(13): 3081-3099

[58] Akyildiz I F, Wang X, Wang W. Wireless mesh networks: A survey. Computer Networks, 2005, 47(4): 445-487

[59] Al-Surmi I, Othman M, Mohd Ali B. Mobility management for IP-based next generation mobile networks: Review, challenge and perspective. Journal of Network and Computer Applications, 2011(in Press)

[60] Akyildiz I F, Won-Yeol L, Vuran M C et al. A survey on spectrum management in cognitive radio networks. IEEE Communications Magazine, 2008, 46(4): 40-48

[61] Katz R H, Brewer E A, Amir E et al. The bay area research wireless access network (BARWAN)//Proceedings of the 41st IEEE International Computer Conference. Washington, USA, 1996: 15-20

[62] Technical Specification Group Services and System Aspects; 3GPP System to Wireless Local Area Network (WLAN) Interworking; System Description. 3GPP TS 23.234 v6.3.0, Dec. 2004

[63] Feasibility study on 3GPP system to wireless local area network(WLAN) interworking. 3GPP TS 22.934 v6.2.0, Sept. 2003

[64] Broadband Radio Access Networks (BRAN); HIPERLAN Type 2; Requirements and Architectures for Interworking between HIPERLAN/2 and 3rd Generation Cellular Systems. ETSI Technical Report 101 957, Aug. 2001

[65] Niebert N, Prytz M, Schieder A et al. Ambient networks: A framework for future wireless internetworking//Proceedings of the IEEE VTC 2005-Spring. Stockholm, Sweden, 2005: 2969-2973

[66] Toenjes R, Benko P, Ebenhard J et al. Architecture for a future generation multi-access wireless system with dynamic spectrum allocation//Proceedings of the IST Mobile Summit. Galway, Ireland, 2000: 95-100

[67] Identification, definition and assessment of cooperation schemes between RANs-final deliverable. WINNER D4.3 version 1.0, June 2005

[68] Final report on the evaluation of RRM/CRRM algorithms. EVEREST IST-2002-001858, Oct. 2005

[69] Jia Hui-Ling. Access selection and call admission control in heterogeneous wireless networks[Ph.D. dissertation] . Graduate School of Zhejiang University, Hangzhou, 2007(in Chinese) (贾会玲. 异构无线网络中的接入选择与准入控制研究[博士学位论文] . 浙江大学, 杭州, 2007)

[70] Buddhikot M, Chandranmenon G, Han S et al. Integration of 802.11 and third-generation wireless data networks//Proceedings of the 22rd Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM’03). San Francisco, USA, 2003: 503-512

[71] Chen J, Chen W. Design and analysis of a mobility gateway for GPRS-WLAN integration. IEEE Transactions on Vehicular Technology, 2007, 56(5): 2603-2616

[72] Wu G, Mizuno M, Havinga P J M. MIRAI architecture for heterogeneous network. IEEE Communications Magazine, 2002, 40(2): 126-134

[73] Havinga P J M, Smit G J M, Wu G et al. The SMART project: Exploiting the heterogeneous mobile world//Proceedings of the 2nd International Conference on Internet Computing. Las Vegas, USA, 2001: 346-352

[74] Akyildiz I F, Mohanty S, Jiang X. A ubiquitous mobile communication architecture for next-generation heterogeneous wireless systems. IEEE Communications Magazine, 2005, 43(6): S29-S36

[75] Kibria M R, Jamalipour A. On designing issues of the next generation mobile network. IEEE Network, 2007, 21(1): 6-13

[76] IEEE Standard for Local and Metropolitan Area Networks- Part 21: Media Independent Handover. IEEE Std 802.21-2008. 2009: c1-c301

[77] Johnson D, Perkins C et al. Mobility Support in IPv6. IETF RFC 3775, June 2004

[78] Soliman H, Castelluccia C, El-Malki K, Bellier L. Hierarchical Mobile IPv6 Mobility Management (HMIPv6). IETF RFC 4140, Aug. 2005

[79] Koodli G. Fast Handovers for Mobile IPv6. IETF RFC 4068, July 2005

[80] Gundavelli S, Leung K, Devarapalli V, Chowdhury K, Patil B. Proxy Mobile IPv6 (RFC 5213). Cisco: IETF, August 2008

[81] De La Oliva A, Banchs A, Soto I et al. An overview of IEEE 802.21: Media-independent handover services. IEEE Wireless Communications, 2008, 15(4): 96-103

[82] Calhoun P, Hara B O, Suri R et al. Light Weight Access Point Protocol (RFC5412). Mar. 2007

[83] Narasimhan P, Harkins D, Ponnuswamy S. SLAPP: Secure Light Access Point Protocol (RFC 5413). Mar. 2005

[84] Singh I, Francisco P, Pakulski K et al. CAPWAP Tunneling Protocol (CTP). June 2005

[85] Iino S, Govindan S, Sugiura M, Cheng H. Wireless LAN Control Protocol (WiCoP) (RFC 5414). July 2005

[86] Calhoun P, Montemurro M, Stanley D. Control and Provisioning of Wireless Access Points(CAPWAP) Protocol Specification (RFC 5415). Mar. 2009

[87] Calhoun P, Montemurro M, Stanley D. Control and Provisioning of Wireless Access Points (CAPWAP) Protocol Binding for IEEE 802.11 (RFC 5416). Mar. 2009

[88] Bernaschi M, Cacace F, Iannello G et al. OpenCAPWAP: An open source CAPWAP implementation for the management and configuration of WiFi hot-spots. Computer Networks, 2009, 53(2): 217-230

[89] Bernaschi M, Cacace F, Davoli A et al. A CAPWAP-based solution for frequency planning in large scale networks of WiFi Hot-Spots. Computer Communications, 2011, 34(11): 1283-1293

[90] Lee M J, Zheng J, Ko Y et al. Emerging standards for wireless mesh technology. IEEE Wireless Communications, 2006, 13(2): 56-63

[91] IEEE Draft Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications-Amendment 10: Mesh Networking. IEEE P802.11s/D9.0, February 2011, 2011: p.1-361

[92] De Couto D S J, Aguayo D, Bicket J et al. A high-throughput path metric for multi-hop wireless routing//Proceedings of the 9th Annual International Conference on Mobile Computing and Networking(MobiCom’03). San Diego, USA, 2003: 134-146

[93] Draves R, Padhye J, Zill B. Routing in multi-radio, multi-hop wireless mesh networks//Proceedings of the 10th Annual International Conference on Mobile Computing and Networking(MobiCom’04). Philadelphia, USA, 2004: 114-128

[94] Hassanein H, Zhou A. Routing with load balancing in wireless Ad hoc networks//Proceedings of the 4th ACM Interna-tional Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Rome, Italy, 2001: 89-96

[95] Lee S J, Gerla M. Dynamic load-aware routing in ad hoc networks//Proceedings of the IEEE International Conference on Communications (ICC’01). Helsinki, Finland, 2001: 3206-3210

[96] Yang Y, Wang J, Kravets R. Designing routing metrics for mesh networks//Proceedings of the 1st IEEE Workshop on Wireless Mesh Networks. Santa Clara, USA, 2005

[97] Jones E P C, Karsten M, Ward P A S. Multipath load balancing in multi-hop wireless networks//Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. Montreal, Canada, 2005: 158-166

[98] Marina M K, Das S R. Ad hoc on-demand multipath distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 2002, 6(3): 92-93

[99] Bahl P, Adya A, Padhye J et al. Reconsidering wireless systems with multiple radios. ACM SIGCOMM Computer Communication Review, 2004, 34(5): 39-46

[100] Kyasanur P, Vaidya N H. Capacity of multi-channel wireless networks: Impact of number of channels and interfaces//Proceedings of the 11th Annual International Conference on Mobile Computing and Networking(MobiCom). Cologne, Germany, 2005: 43-57

[101] Raniwala A, Gopalan K, Chiueh T. Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks. ACM SIGMOBILE Mobile Computing and Communications Review, 2004, 8(2): 50-65

[102] Ramachandran K N, Belding E M, Almeroth K C et al. Interference-aware channel assignment in multi-radio wireless mesh networks//Proceedings of the 25th IEEE International Conference on Computer Communications(INFOCOM’06). Barcelona, Spain, 2006: 1-12

[103] Wu S L, Lin C Y, Tseng Y C et al. A new multi-channel MAC protocol with on-demand channel assignment for multi-hop mobile ad hoc networks//Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks. Los Alamitos, USA, 2000: 232-237

[104] Kyasanur P, Vaidya N H. Routing and interface assignment in multi-channel multi-interface wireless networks//Proceedings of the 2005 IEEE Wireless Communications and Networking Conference(WCNC). Piscataway, USA, 2005: 2051-2056

[105] Alicherry M, Bhatia R, Li L. Joint channel assignment and routing for throughput optimization in multi-radio wireless mesh networks//Proceedings of the 11th Annual International Conference on Mobile Computing and Networking(MobiCom’05). Cologne, Germany, 2005: 58-72

[106] Mohsenian-Rad A H, Wong V W S. Joint logical topology design, interface assignment, channel allocation, and routing for multi-channel wireless mesh networks. IEEE Transactions on Wireless Communications, 2007, 6(12): 4432-4440

[107] Gardellin V, Das S K, Lenzini L et al. G-PaMeLA: A divide-and-conquer approach for joint channel assignment and routing in multi-radio multi-channel wireless mesh net-works. Journal of Parallel and Distributed Computing, 2011, 71(3): 381-396

[108] Srinivas A, Zussman G, Modiano E. Mobile backbone networks-construction and maintenance//Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc’06). Florence, Italy, 2006: 166-177

[109] Robinson J, Singh M, Swaminathan R et al. Deploying mesh nodes under non-uniform propagation//Proceedings of the 29th IEEE International Conference on Computer Communications(INFOCOM’10). San Diego, United States, 2010: 2142-2150

[110] Bejerano Y. Efficient integration of multihop wireless and wired networks with QoS constraints. IEEE/ACM Transactions on Networking(TON), 2004, 12(6): 1064-1078

[111] Drabu Y, Peyravi H. Gateway placement with QoS constraints in wireless mesh networks//Proceedings of the 7th International Conference on Networking(ICN’08). Cancun, Mexico, 2008: 46-51

[112] Tsai F S, Etoh M, Xie X et al. Introduction to mobile information retrieval. IEEE Intelligent Systems, 2010, 25(1): 11-15

[113] Yao-Jen C, Hung-Huan L, Li-Der C et al. A general architecture of mobile social network services//Proceedings of the 2007 International Conference on Convergence Information Technology. Gyeongju, Korea, 2007: 151-156

[114] Varshney U, Vetter R. Mobile commerce: Framework, applications and networking support. Mobile Networks and Applications, 2002, 7(3): 185-198

[115] Kumar K, Yung-Hsiang L. Cloud computing for mobile users: Can offloading computation save energy?. Computer, 2010, 43(4): 51-56

[116] Lane N D, Miluzzo E, Hong L et al. A survey of mobile phone sensing. IEEE Communications Magazine, 2010, 48(9): 140-150

[117] Qin C, Bao X, Choudhury R R et al. TagSense: A smartphone-based approach to automatic image tagging//Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services(MobiSys’11). Bethesda, USA, 2011: 1-14

[118] Kamvar M, Baluja S. The role of context in query input: Using contextual signals to complete queries on mobile devices//Proceedings of the 9th International Conference on Human Computer Interaction with Mobile Devices and Services. Singapore, 2007: 405-412

[119] Jones S, Jones M, Deo S. Using keyphrases as search result surrogates on small screen devices. Personal Ubiquitous Computing, 2004, 8(1): 55-68

[120] Karlson A K, Robertson G G, Robbins D C et al. FaThumb: A facet-based interface for mobile search//Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Montrreal, Quebec, Canada, 2006: 711-720

[121] Pretschner A, Gauch S. Ontology based personalized search//Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence. Chicago, USA, 1999: 391-398

[122] Jones G J F, Brown P J. Context-aware retrieval for ubiquitous computing environments//Proceedings of the 2003 International Workshop on Mobile and Ubiquitous Information Access. Udine, Italy, 2003: 227-243

[123] Coppola P, Mea V D, Gaspero L D et al. The context-aware browser. IEEE Intelligent Systems, 2010, 25(1): 38-47

[124] Yan B, Chen G. AppJoy: Personalized mobile application discovery//Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services(MobiSys’11). Bethesda, USA, 2011

[125] Wikipedia, http://en.wikipedia.org/wiki

[126] Wang Yu-Xiang, Qiao Xiu-Quan, Li Xiao-Feng, Meng Luo-Ming. Research on context-awareness mobile SNS service selection mechanism. Chinese Journal of Computers, 2010, 33(11): 2126-2135(in Chinese) (王玉祥, 乔秀全, 李晓峰, 孟洛明. 上下文感知的移动社交网络服务选择机制研究. 计算机学报, 2010, 33(11): 2126-2135)

[127] Adams B, Phung D, Venkatesh S. Sensing and using social context. ACM Transactions on Multimedia Computing, Comunications and Applications, 2008, 5(2): 1-27

[128] Eagle N, Pentland A. Social serendipity: Mobilizing social software. IEEE Pervasive Computing, 2005, 4(2): 28-34

[129] Li K A, Sohn T Y, Huang S et al. Peopletones: A system for the detection and notification of buddy proximity on mobile phones//Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys’08). Breckenridge, USA, 2008: 160-173

[130] Gaonkar S, Li J, Choudhury R R et al. Micro-Blog: Sharing and querying content through mobile phones and social participation//Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services(MobiSys’08). Breckenridge, USA, 2008: 174-186

[131] Motani M, Srinivasan V, Nuggehalli P S. PeopleNet: Engineering a wireless virtual social network//Proceedings of the 11th Annual International Conference on Mobile Computing and Networking(MobiCom’05). Cologne, Germany, 2005: 243-257

[132] Yang Z, Zhang B, Dai J et al. E-SmallTalker: A distributed mobile system for social networking in physical proximity//Proceedings of the IEEE 30th International Conference on Distributed Computing Systems(ICDCS’10). Genoa, Italy, 2010: 468-477

[133] Becher M, Freiling F C, Hoffmann J et al. Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices//Proceedings of the IEEE Symposium on Security and Privacy(SP’11). Oakland, USA, 2011

[134] Yi P, Wu Y, Zou F et al. A survey on security in wireless mesh networks. IETE Technical Review, 2010, 27(1): 6-14

[135] Kandukuri B R, Paturi V R, Rakshit A. Cloud security issues//Proceedings of the IEEE International Conference on Services Computing. Bangulore, USA, 2009: 517-520

[136] Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399

[137] Yan Q, Li Y, Li T, Deng R. Insights into malware detection and prevention on mobile phone. Security Technology, 2009, 58: 242-249

[138] Bose A, Hu X, Shin K G et al. Behavioral detection of malware on mobile handsets//Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services(MobiSys’08). Breckenridge, USA, 2008: 225-238

[139] Enck W, Ongtang M, Mcdaniel P. On lightweight mobile phone application certification//Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09). Chicago, USA, 2009: 235-245

[140] Kim H, Smith J, Shin K G. Detecting energy-greedy anomalies and mobile malware variants//Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services(MobiSys’08). Breckenridge, USA, 2008: 239-252

[141] Cheng J, Wong S H Y, Yang H et al. SmartSiren: Virus detection and alert for smartphones//Proceedings of the 5th International Conference on Mobile Systems, Applications and Services(MobiSys’07). San Juan, Puerto Rico, 2007: 258-271

[142] Bickford J, Lagar-Cavilla H A, Varshavsky A. Security versus energy tradeoffs in host-based mobile malware detection//Proceedings of the 9th International Conference on Mobile Systems, Applications and Services(MobiSys’11). Bethesda, USA, 2011

[143] Kaasinen E. User needs for location-aware mobile services. Personal and Ubiquitous Computing, 2003, 7(1): 70-79

[144] Lei Y, Quintero A, Pierre S. Mobile services access and payment through reusable tickets. Computer Communications, 2009, 32(4): 602-610

[145] Sweeney L. K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5): 557-570

[146] Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Systems,Applications and Services(MobiSys’03).San Francisco, USA, 2003: 31-42

[147] Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services//Proceedings of the 21st International Conference on Data Engineering Workshops. Tokyo, Japan, 2005: 1248-1252

[148] Khoshgozaran A, Shahabi C. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy//Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases. Boston, USA, 2007: 239-257

[149] Hu H, Lee D L. Range nearest-neighbor query. IEEE Transactions on Knowledge and Data Engineering, 2006, 18(1): 78-91

[150] Pan Xiao, Hao Xing, Meng Xiao-Feng. Privacy preserving towards continuous query in location-based services. Journal of Computer Research and Development, 2010, 47(1): 121-129(in Chinese) (潘晓, 郝兴, 孟小峰. 基于位置服务中的连续查询隐私保护研究. 计算机研究与发展, 2010, 47(1): 121-129)

[151] Wu W, Luo J, Yang M. Cost-effective placement of mesh nodes in wireless mesh networks//Proceedings of the 5th International Conference on Pervasive Computing and Applications. Maribor, Slovenia, 2010

[152] Wu W, Luo J, Yang M. Gateway placement optimization for load balancing in wireless mesh networks//Proceedings of the 13th International Conference on CSCW in Design. Santiago, Chile, 2009: 408-413

[153] Luo J, Wu W, Yang M. Interference-aware gateway placement for wireless mesh networks with fault tolerance assurance//Proceedings of the 2010 IEEE International Conference on System, Man, and Cybernetics. Istanbul, Turkey, 2010: 2373-2380

[154] Wang W, Luo J, Yang M, Wu W. MT3-DA: Multicast optimization mechanism based on transmission time and interference minimization in wireless mesh networks//Proceedings of the 2010 9th International Conference on Grid and Cloud Computing. Nanjing, China, 2010: 344-349

[155] Lin K, Kansal A, Lymberopoulos D et al. Energy-accuracy trade-off for continuous mobile device location//Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services(MobiSys’10). San Francisco, California, USA, 2010: 285-298

[156] Armbrust M, Fox A, Griffith R et al. Above the clouds: A berkeley view of cloud computing. EECS Department, University of California, Berkeley, 2009

PDF