

Mobile Intelligence
Samenvatting
∗ Focuses on learning patterns and knowledge from data generated by mobile users and mobile technology.
∗ Covers research and application issues in applying computational intelligence applications to mobile computing
∗ Delivers benefits to a wide range of applications
∗ Introduces the state of the art of computational intelligence to the mobile paradigm
Specificaties
Inhoudsopgave
<p>Contributors.</p>
<p>Part I Mobile Data and Intelligence.</p>
<p>1. A Survey of State–of–the–Art Routing Protocols for Mobile Ad Hoc Networks.</p>
<p>2. Connected Dominating Set for Topology Control in Ad Hoc Networks.</p>
<p>3. An Intelligent Way to Reduce Channel Under–utilization in Mobile Ad Hoc Networks,</p>
<p>4. Mobility in Publish/Subscribe Systems,</p>
<p>5. Cross–Layer Design Framework for Adaptive Cooperative Caching in Mobile Ad Hoc Networks.</p>
<p>6. Recent Advances in Mobile Agent–Oriented Applications.</p>
<p>Part II Location–Based Mobile Information Services.</p>
<p>7. KCLS: A Cluster–Based Location Service Protocol and Its Applications in Multihop Mobile Networks.</p>
<p>8. Predictive Location Tracking in Cellular and in Ad Hoc Wireless Networks.</p>
<p>9. An Efficient Air Index Scheme for Spatial Data Dissemination in Mobile Computing Environments.</p>
<p>10. Next Generation Location–based Services: Merging Positioning and Web 2.0.</p>
<p>Part III Mobile Mining.</p>
<p>11. Data Mining for Moving Object Databases.</p>
<p>12. Mobile Data Mining on Small Devices Through Web Services.</p>
<p>Part IV Mobile Context–Aware and Applications.</p>
<p>13. Context Awareness: A Formal Foundation.</p>
<p>14. Experiences with a Smart Office Project 294</p>
<p>15. An Agent–Based Architecture for Providing Enhanced Communication Services.Part V Mobile Intelligence Security.</p>
<p>16. MANET Routing Security.</p>
<p>17. An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks.</p>
<p>18. SMRTI: Secure Mobile Ad Hoc Network Routing with Trust Intrigue.</p>
<p>19. Managing Privacy in Location–based Access Control Systems.</p>
<p>Part VI Mobile Multimedia.</p>
<p>20. VoiceXML–Enabled Intelligent Mobile Services.</p>
<p>21. User Adaptive Video Retrieval on Mobile Devices.</p>
<p>22. A Ubiquitous Fashionable Computer with an i–Throw Device on a Location–based Service Environment.</p>
<p>23. Energy Efficiency for Mobile Multimedia Replay.</p>
<p>Part VII Intelligent Network.</p>
<p>24. Efficient Data–Centric Storage Mechanisms in Wireless Sensor Networks.</p>
<p>25. Tracking in Wireless Sensor Networks.</p>
<p>26. DDoS Attack Modeling and Detection in Wireless Sensor Networks.</p>
<p>27. Energy–Efficient Pattern Recognition for Wireless Sensor Networks.</p>
<p>Index.</p>