874 resultados para Mobile-casual games


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores the distinctive characteristics of mobile telephone use among the elderly population using the most recent European country-level data on individual use of mobile telephony and advanced mobile services, Eurostat 2008. Through a cluster analysis of mobile phone use data across 30 countries, it is possible to confirm that mobile telephone occupies a peripheral position for the elderly in Europe.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We characterize market traders at two rural fairs in Puno, Peru, based on quantitative and qualitative data gathered in 2008, to gain insight into types of traders and the information needs that influence the degree to which they use mobile phones to make decisions regarding which weekly fairs to attend. Using variables such as origin, type of goods sold, means of transportation to the market, and reliance on networks, we identify traders as full-time traders, part-time traders, or subsistence traders, that is, people trading solely to survive. We find that when traders are already familiar with the technology, regularly rely on endogenous networks to make decisions, and have more to lose from failing to trade (e.g., those selling perishable goods), they are more likely to use mobile phones to decide where to sell.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

By means of a qualitative approach I bring insights on the relationship older people (60+) have with mobile communication in a low income district of Lima (Peru). The case study I conducted in September 2013 included interviews and one focus group with 20 inhabitants of San Juan de Miraflores district. The user/non-user dichotomous classification turned out to be too narrow in this context. While some participants reported a common, bidirectional use of the device, restrictions and discontinuities played a role. Some described an asymmetric use of the mobile phone, as they used it exclusively for receiving calls, while never making outgoing calls. Others described discontinuities in ownership, which was the case when their mobile was stolen and they could not replace it immediately. My initial hypothesis is that such restrictions are related to income, skills and age.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

JXME is the JXTA protocols implementation formobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default security level provided. This paper presents a brief analysis of the current state of security in JXME, focusing on the JXME-Proxied version, identifies existing vulnerabilities and proposes further improvements in this field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The conditions for the analysis of selected doping substances by UHPSFC-MS/MS were optimized to ensure suitable peak shapes and maximized MS responses. A representative mixture of 31 acidic and basic doping agents was analyzed, in both ESI+ and ESI- modes. The best compromise for all compounds in terms of MS sensitivity and chromatographic performance was obtained when adding 2% water and 10mM ammonium formate in the CO2/MeOH mobile phase. Beside mobile phase, the nature of the make-up solvent added for interfacing UHPSFC with MS was also evaluated. Ethanol was found to be the best candidate as it was able to compensate for the negative effect of 2% water addition in ESI- mode and provided a suitable MS response for all doping agents. Sensitivity of the optimized UHPSFC-MS/MS method was finally assessed and compared to the results obtained in conventional UHPLC-MS/MS. Sensitivity was improved by 5-100-fold in UHPSFC-MS/MS vs. UHPLC-MS/MS for 56% of compounds, while only one compound (bumetanide) offered a significantly higher MS response (4-fold) under UHPLC-MS/MS conditions. In the second paper of this series, the optimal conditions for UHPSFC-MS/MS analysis will be employed to screen >100 doping agents in urine matrix and results will be compared to those obtained by conventional UHPLC-MS/MS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The problem of robust beamformer design for mobile communicationsapplications in the presence of moving co-channel sources isaddressed. A generalization of the optimum beamformer based on a statisticalmodel accounting for source movement is proposed. The new methodis easily implemented and is shown to offer dramatic improvements overconventional optimum beamforming for moving sources under a varietyof operating conditions.