Handbook of Mobile Systems Applications and Services

Front Cover
Anup Kumar, Bin Xie
CRC Press, Apr 26, 2012 - Computers - 612 pages

From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolution of mobile services technologies. It examines service-oriented architecture (SOA) and explains why SOA and service oriented computing (SOC) will play key roles in the development of future mobile services.

Investigating current service discovery frameworks, the book covers the basics of mobile services and applications developed in various contexts. The first section provides readers with the required background in mobile services architecture. Next, it details of middleware support for mobile services. The final section discusses security and applications of mobile services. Containing the contributions of leading researchers and academics from around the world, the book:

  • Introduces a new location-based access control model
  • Unveils a simple, yet powerful enhancement that enables Web services to locally manage workflow dependencies and handle messages resulting from multiple workflows
  • Examines an event-based location aware query model that continuously aggregates data in specific areas around mobile sensors of interest
  • Addresses the problem of location-based access control in the context of privacy protection
  • Presents a layered architecture of context-aware middleware
  • Considers the development of assistive technology solutions for the blind or visually impaired

Discussing architecture for supporting multi-mode terminals in integrated heterogeneous wireless networks, this book addresses the network availability constraint to serve all mobile services originating from a single-user terminal. It examines QoS protocols and their enhancements in supporting user mobility. Analyzing mobile services security vulnerabilities, it details security design best practices that mobile service developers can use to improve the security of their mobile systems.

 

What people are saying - Write a review

User Review - Flag as inappropriate

Excellent detailed info, great concept and basis for further thinking

Other editions - View all

Common terms and phrases

About the author (2012)

About the Editors:

Dr. Anup Kumar completed his PhD from NCSU and is currently a professor of CECS Department at the University of Louisville and the director of Mobile Information Network and Distributed Systems (MINDS) Lab. His research interests include wireless and mobile systems, routing in adhoc and sensor networks, distributed algorithm implementation, QoS-based Web services, seamless mobile computing environment, and wireless content delivery over the Internet. He has been PI and Co-PI of several federal grants funded by National Science Foundation, Department of Treasury, Kentucky Science Foundation, Department of Hometown Security, etc. He is the associate editor of IEEE Transactions on Services Computing. He is also the associate editor of the Internal Journal of Web Services Research and International Society of Computers and their Application Journal. He was a member of IEEE Distinguished Visitor Program (2006–2008). In GLOBECOM-2010, he had organized the Cloud Computing Forum and has given tutorials on Cloud Computing at CyberC-2010, ICCNT-2010, and SCC-2009. He is currently serving on the organizing committees of many international conferences. He was the Chair of IEEE Computer Society Technical Committee on Simulation (TCSIM) (2004–2007). He has published and presented over 175 papers. Some of his papers have appeared in ACM Multimedia Systems Journal, several IEEE Transactions, Wireless Communication and Mobile Computing, Journal of Parallel and Distributed Computing, IEEE Journal on Selected Areas in Communications, etc. He was the associate editor of the International Journal of Engineering Design and Automation (1995–1998). He has served on many conference programs and organizing committees such as CyberC-2009, MASS-2008, SCC-2008, ICWS-2008, IEEE ISCC 2007, IEEE ICSW-2006, IEEE MASS-2005, IEEE SCC-2005, IEEE ICWS-2005, CIT-2005, IEEE MASCOTS, and ADCOM ’97 and ’98. He has also edited special issues in IEEE Internet Magazine and International Journal on Computers and Operations Research. He is a senior member of IEEE.

Dr. Bin Xie received his MSc and PhD (with honors) in computer science and computer engineering from the University of Louisville, Kentucky, USA, in 2003 and 2006, respectively. He was a post doc at the University of Cincinnati from 2006 to 2008. He thereafter was a visiting scholar at the NEC C&C Innovation Research Laboratories and Carnegie Mellon University CyLab Japan. Dr. Xie is the founder and currently the president of InfoBeyond Technology LLC. InfoBeyond researches, simulates, prototypes, develops, and delivers useful networking products for wireless mobile communications and information processes. The research works at InfoBeyond have been broadly supported by the army, navy, air force, and the State of Kentucky. Dr. Xie is the author of Handbook/Encyclopedia of Ad Hoc and Ubiquitous Computing (World Scientific: ISBN-10: 981283348X) and Heterogeneous Wireless Networks—Networking Protocol to Security (VDM Publishing House: ISBN: 3836419270). He has published over 60 papers in the IEEE conferences and journals. Some of his papers have appeared in the most-cited journals in the areas of telecommunication and computer architecture. His research interests focus on mobile computing and applications, such as wireless sensor network, ad-hoc networks, mesh networks, 4G, and network security. In these areas, he has carried out substantial research on the fundamental issues of network deployment, network coverage, network connectivity, performance evaluation, and Internet/wireless infrastructure security. His recent research encompasses image process supported by the Navy Research Laboratory. He has successfully established many mathematical models (graph theory, information/code theory, game theory, linear programming, and optimization) for communication networks and their security. He is an editor member of the Journal of International Journal of Information Technology, Communications and Convergence (IJITCC), and has edited a special issue on the cyber-enabled information discovery. He has recently edited a special issue on clustering and clouding computing for Elsevier Future Generation Computer Systems (FGCS). Dr. Xie has served as the program chair or TPC member for over 30 conferences and workshops. He is a senior member of IEEE.

Bibliographic information