Results 21 to 30 of about 684,644 (338)

Mitigating Trade-Off in Unlicensed Network Optimization Through Machine Learning and Context Awareness

open access: yesIEEE Access, 2023
Unlicensed cellular networks are being deployed worldwide by cellular operators to meet the rising data demands. However, the unlicensed band has existing incumbents such as Wi-Fi and radar systems.
Srikant Manas Kala   +4 more
doaj   +1 more source

Computation-Bandwidth Trading for Mobile Edge Computing [PDF]

open access: yes2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2019
Angel Lozano’s work is funded by the European Research Council (ERC) under the European Union’s H2020 Framework Research Programme (grant agreement No 694974).
Gupta, Sabyasachi, Lozano, Angel
openaire   +2 more sources

Contextual barriers to mobile health technology in African countries: a perspective piece [PDF]

open access: yes, 2015
On a global scale, healthcare practitioners are now beginning to move from traditional desktop-based computer technologies towards mobile computing environments[1].
O’ Connor, Y, O’ Donoghue, J
core   +2 more sources

Lies Kill, Facts Save: Detecting COVID-19 Misinformation in Twitter

open access: yesIEEE Access, 2020
Online social networks (ONSs) such as Twitter have grown to be very useful tools for the dissemination of information. However, they have also become a fertile ground for the spread of false information, particularly regarding the ongoing coronavirus ...
Mabrook S. Al-Rakhami, Atif M. Al-Amri
doaj   +1 more source

COMPSs-Mobile: parallel programming for mobile-cloud computing [PDF]

open access: yes, 2016
The advent of Cloud and the popularization of mobile devices have led us to a shift in computing access. Computing users will have an interaction display while the real computation will be performed remotely, in the Cloud.
Badia Sala, Rosa Maria   +1 more
core   +1 more source

Sybil Defense Techniques in Online Social Networks: A Survey

open access: yesIEEE Access, 2017
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online.
Muhammad Al-Qurishi   +5 more
doaj   +1 more source

Smooth Complete Coverage Trajectory Planning Algorithm for a Nonholonomic Robot

open access: yesSensors, 2022
The complete coverage path planning is a process of finding a path which ensures that a mobile robot completely covers the entire environment while following the planned path.
Ana Šelek   +3 more
doaj   +1 more source

Framework for Computation Offloading in Mobile Cloud Computing [PDF]

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2012
Published by OpenLab ...
Kovachev, Dejan, Klamma, Ralf
openaire   +5 more sources

Anticipatory Mobile Computing: A Survey of the State of the Art and Research Challenges [PDF]

open access: yes, 2015
Today's mobile phones are far from mere communication devices they were ten years ago. Equipped with sophisticated sensors and advanced computing hardware, phones can be used to infer users' location, activity, social setting and more.
Musolesi, Mirco, Pejovic, Veljko
core   +2 more sources

Greening emerging IT technologies: techniques and practices

open access: yesJournal of Internet Services and Applications, 2017
The tremendous increase in global industrial activity has resulted in high utilization of natural energy resources and increase in global warming over the last few decades. Meanwhile, computing has become a popular utility of modern human lifestyle. With
Junaid Shuja   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy