scispace - formally typeset
Search or ask a question

Showing papers on "Mobile telephony published in 2004"


Journal ArticleDOI
TL;DR: This work presents a stable control strategy for groups of vehicles to move and reconfigure cooperatively in response to a sensed, distributed environment and focuses on gradient climbing missions in which the mobile sensor network seeks out local maxima or minima in the environmental field.
Abstract: We present a stable control strategy for groups of vehicles to move and reconfigure cooperatively in response to a sensed, distributed environment. Each vehicle in the group serves as a mobile sensor and the vehicle network as a mobile and reconfigurable sensor array. Our control strategy decouples, in part, the cooperative management of the network formation from the network maneuvers. The underlying coordination framework uses virtual bodies and artificial potentials. We focus on gradient climbing missions in which the mobile sensor network seeks out local maxima or minima in the environmental field. The network can adapt its configuration in response to the sensed environment in order to optimize its gradient climb.

1,291 citations


Book
01 Jan 2004
TL;DR: Ling et al. as mentioned in this paper examined the once unexpected interaction between humans and cell phones, and between humans, period, based on world-wide research involving tens of thousands of interviews and contextual observations, looked into the impact of the phone on our daily lives.
Abstract: Has the cell phone forever changed the way people communicate? The mobile phone is used for “real time” coordination while on the run, adolescents use it to manage their freedom, and teens “text” to each other day and night. The mobile phone is more than a simple technical innovation or social fad, more than just an intrusion on polite society. This book, based on world-wide research involving tens of thousands of interviews and contextual observations, looks into the impact of the phone on our daily lives. The mobile phone has fundamentally affected our accessibility, safety and security, coordination of social and business activities, and use of public places. Based on research conducted in dozens of countries, this insightful and entertaining book examines the once unexpected interaction between humans and cell phones, and between humans, period. The compelling discussion and projections about the future of the telephone should give designers everywhere a more informed practice and process, and provide researchers with new ideas to last years. *Rich Ling (an American working in Norway) is a prominent researcher, interviewed in the new technology article in the November 9 issue of the New York Times Magazine. *A particularly "good read", this book will be important to the designers, information designers, social psychologists, and others who will have an impact on the development of the new third generation of mobile telephones. *Carefully and wittily written by a senior research scientist at Telenor, Norway's largest telecommunications company, and developer of the first mobile telephone system that allowed for international roaming. Table of Contents Preface Acknowledgments Chapter 1: Introduction Chapter 2: Making Sense of Mobile Telephone Adoption Chapter 3: Safety and Security Chapter 4: The Coordination of Everyday Life Chapter 5: The Mobile Telephone and Teens Chapter 6: The Intrusive Nature of Mobile Telephony Chapter 7: Texting and the Growth of Asynchronous Discourse Chapter 8: Conclusion: The Significance of Osborne's Prognosis Appendix Endnotes Bibliography Index

898 citations


Proceedings Article
Yannis Labrou1, Jonathan R. Agre1, Lusheng Ji1, Jesus Molina1, W.-I. Chen1 
01 Jan 2004
TL;DR: A framework for agreements in pervasive environments called the Universal Pervasive Transaction Framework (UPTF) for parties transacting in wireless insecure environments using mobile devices and one type of such agreement with commercial interest, namely mobile payments from a payer to a payee is discussed.
Abstract: We present a framework for agreements in pervasive environments called the Universal Pervasive Transaction Framework (UPTF) for parties transacting in wireless insecure environments using mobile devices. We discuss one type of such agreement with commercial interest, namely mobile payments from a payer to a payee. We have implemented two complete systems for purchasing and payment with mobile devices utilizing UPTF. The first introduces a special purpose, new mobile device called the Universal Pervasive Transaction Device (UPTD) and the second utilizes J2ME-capable mobile phones.

593 citations


Proceedings ArticleDOI
17 May 2004
TL;DR: This work presents a service-oriented context-aware middleware (SOCAM) architecture for the building and rapid prototyping of context- aware mobile services, and proposes an ontology-based approach to model various contexts.
Abstract: Computing becomes increasingly mobile and pervasive today; these changes imply that applications and services must be aware and adapt to highly dynamic environments. Today, building context-aware mobile services is a complex and time-consuming task. We present a service-oriented context-aware middleware (SOCAM) architecture for the building and rapid prototyping of context-aware mobile services. We propose an ontology-based approach to model various contexts. Our context model supports semantic representation, context reasoning and context knowledge sharing. We take a service-oriented approach to build our middleware which supports tasks including acquiring, discovering, interpreting, accessing various contexts and interoperability between different context-aware systems.

416 citations


Journal ArticleDOI
TL;DR: In this paper, the authors used a binomial logit model based on a survey of 973 mobile users in Korea to identify the determinants of subscriber churn and customer loyalty in the Korean mobile telephony market.

412 citations


Proceedings ArticleDOI
05 Dec 2004
TL;DR: The problem of scheduling the mobile element in the network, so that there is no data loss due to buffer overflow is presented, it is proved that the problem is NP-complete and an ILP formulation is given.
Abstract: Wireless networks have historically considered support for mobile elements as an extra overhead. However, recent research has provided means by which network can take advantage of mobile elements. Particularly, in the case of wireless sensor networks, mobile elements are deliberately built into the system to improve the lifetime of the network, and act as mechanical carriers of data. The mobile element, which is controlled, visits the nodes to collect their data before their buffers are full. It may happen that the sensor nodes are sampling at different rates, in which case some nodes need to be visited more frequently than others. We present this problem of scheduling the mobile element in the network, so that there is no data loss due to buffer overflow. We prove that the problem is NP-complete and give an ILP formulation. We give some practical algorithms, and compare their performances.

339 citations


Journal ArticleDOI
TL;DR: The aim of this work is to introduce the reader to mobile payments, present current concepts and the motivation behind it, and provide an overview of past and current efforts as well as standardization initiatives that guide this rapidly evolving domain.
Abstract: It is predicted that mobile applications will become an integral part of our lives at the personal and professional level. Mobile payment (MP) is a promising and exciting domain that has been rapidly developing recently, and although it can still be considered in its infancy, great hope is put on it. If MP efforts succeed, they will boost both e- and m-commerce and may be the killer service in 2.5 G and beyond future ambient intelligence infrastructures. This article introduces the mobile payment arena and describes some of the most important mobile payment procedures and consortia that are relevant to the development of mobile payment services. The aim of this work is to introduce the reader to mobile payments, present current concepts and the motivation behind it, and provide an overview of past and current efforts as well as standardization initiatives that guide this rapidly evolving domain.

297 citations


Journal ArticleDOI
TL;DR: This paper presents a new and efficient wireless authentication protocol providing user anonymity based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption.
Abstract: Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is somewhat more concentrated and complex than that of wired network. Authentication is the most essential procedure to ensure that the service is properly used. But its limited resource, such as weak power supplies and limited bandwidth, must be taken into account in the design of security schemes. In this paper, we present a new and efficient wireless authentication protocol providing user anonymity. Our scheme is based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption. In our protocol, it takes only one round of message exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The most significant feature is one-time use of key between mobile user and visited network. Finally, the performance of our scheme is analyzed.

278 citations


Patent
14 Jul 2004
TL;DR: In this article, a loosely-coupled client-server architecture is proposed to improve the efficiency of voice communications by allowing communication device users to dynamically manage how and when mobile calls take place, intelligently screen calls based on caller identity, urgency and subject matter, determine which contacts in a directory are available to talk and which ones choose not to be disturbed.
Abstract: A communication system is provided that uses loosely-coupled client-server architectures to improve the efficiency of communications. The communication system includes client and facilitator applications. The client application is a component of processor-based mobile communication devices. The facilitator application is hosted on one or more servers or other processor-based devices, and communicates with the client application via one or more couplings. The facilitator application can also be distributed among one or more portable processor-based devices including the communication devices hosting the client application. The communication system improves efficiency of voice communications by allowing communication device users to dynamically manage how and when mobile calls take place, intelligently screen calls based on caller identity, urgency, and subject matter, determine which contacts in a directory are available to talk and which ones choose not to be disturbed, and increase accessibility of enterprise and personal contact information from mobile phones.

262 citations


Patent
15 Oct 2004
TL;DR: In this paper, a mobile communications device initiates a handoff from its current base station (BS) sector network attachment point to a new BS sector, e.g., via a network link.
Abstract: A mobile communications device initiates a handoff from its current base station (BS) sector network attachment point to a new BS sector. The mobile sends a handoff request over its current wireless link to the current BS sector, which forwards the request to the new BS sector, e.g., via a network link. The new BS sector processes the request assigning dedicated resources, e.g., an identifier and dedicated uplink segments. Information identifying the allocated resources is conveyed from the new BS sector via the current BS sector to the mobile. The mobile determines the time of the allocated dedicated segments based upon a received beacon signal from the new BS sector with known timing relationships to dedicated segments. The mobile breaks the original wireless link just prior to the time of the first assigned dedicated segment. The mobile communicates information on the assigned dedicated segments to perform registration operations, e.g., timing synchronization and power control, establishing a new wireless link.

259 citations


Patent
Nihtilae Jukka1
16 Nov 2004
TL;DR: In this paper, a system and method for interacting with a virtual physiological model of a user with use of a mobile communication device is presented, where the user can access data and depictions of the user developed from the physiological data.
Abstract: A system and method provide for interacting with a virtual physiological model of a user with use of a mobile communication device. Physiological data associated with the user is acquired from the user. The physiological data is transmitted to the mobile communication device, preferably with use of a wireless communication protocol. The methodology further involves using the mobile communication device to communicate the physiological data to a network server. The physiological data is integrated into the virtual physiological model of the user. The user can access data and depictions of the user developed from the physiological data.

Patent
Antti Ruha1
17 Sep 2004
TL;DR: In this article, a method for operating two or more mobile terminals in an interactive session is described. But the authors do not specify how the data received from the other mobile communication terminals is communicated to the user of the respective mobile communication devices via the user interface.
Abstract: The disclosed embodiments relate to a method for operating two or more mobile terminals in an interactive session. The mobile terminals are provided with one or more sensors. The data captured by the sensors is sent via a wireless connection to the other mobile terminals that participate in the interactive session. The data received from the other mobile communication terminals is communicated to the user of the respective mobile communication terminals via the user interface.

Patent
11 May 2004
TL;DR: In this paper, an enhanced mobile communication device, or on-board equipment, communicates according to an enhanced ad-hoc mode of communication (12) and an infrastructure mode of communications (14).
Abstract: An enhanced mobile communication device, or on-board equipment, communicates according an enhanced ad-hoc mode of communication (12) and an infrastructure mode of communication (14). A method switches between the enhanced ad-hoc mode of communications (12) and infrastructure mode of communications (14). The enhanced mobile communication device receives content and updates a geographic database. The enhanced mobile communication device reads the geographic database and transmits content. Data, such as location information from global positioning satellite signals, is collected by the enhanced mobile communication device. On-board software of the enhanced mobile communication device communicates with the geographic database for computing routes, paths, and turn-by-turn direction.

Journal ArticleDOI
TL;DR: In this paper, the effects of several phone chassis-related parameters-length, width, thickness, and distance between the head and phone-on the bandwidth, efficiency, and specific absorption rate (SAR) characteristics of internal mobile phone antennas are investigated.
Abstract: This paper presents a thorough investigation into the effects of several phone chassis-related parameters-length, width, thickness, and distance between the head and phone-on the bandwidth, efficiency, and specific absorption rate (SAR) characteristics of internal mobile phone antennas. The studied antenna-chassis combinations are located beside an anatomical head model in a position of actual handset use. The effect of the user's hand is also studied with two different hand models. The main part of the study is based on FDTD simulations, but also experimental results, which support the computationally obtained conclusions, are given. The presented analysis provides novel and useful information for future design of mobile handset antennas. The results show the general trends of bandwidth, SAR, and efficiency with different chassis parameters. The results also reveal a connection between these three performance parameters: an increase in SARs and a decrease in radiation efficiency occur compared to the general trend when the bandwidth reaches its maximum. This happens when the resonant frequency of the chassis equals that of the antenna.

Patent
17 Feb 2004
TL;DR: In this paper, the authors present a method and apparatus for storing, referencing, retrieving, and graphically displaying spatial and non-spatial related information of a mobile computing device, such as a laptop computer or a cellular telephone.
Abstract: The present invention is directed to a method and apparatus for storing, referencing, retrieving, and graphically displaying spatial and non-spatial related information of a mobile computing device, such as a laptop computer or a cellular telephone. The spatial-related information may be obtained by using positioning tracking systems such as a global positioning system, whereas the non-spatial related information may include communication activities associated with the mobile computing device, such as phone calls, e-mails, text messages, pages, etc. The present invention also provides methods and apparatus of sharing event information between mobile communication devices as well as related navigational information for traveling to an event from a real-time position of a mobile communication device.

Journal ArticleDOI
TL;DR: A framework for further enhancements of the traditional IP- based protocol stack to meet current and future requirements is described and a first solution involving cross-layer design is proposed.
Abstract: The classical TCP/IP layered protocol archi- tecture is beginning to show signs of age. In order to cope with problems such as the poor performance of wireless links and mobile termi- nals, including the high error rate of wireless network interfaces, power saving requirements, quality of service, and an increasingly dynamic network environment, a protocol architecture that considers cross-layer interactions seems to be required. This article describes a framework for further enhancements of the traditional IP- based protocol stack to meet current and future requirements. Known problems associated with the strictly layered protocol architecture are summarized and classified, and a first solution involving cross-layer design is proposed.

Journal ArticleDOI
TL;DR: This work presents a taxonomy of attacks against mobile phones that shows known as well as potential attacks, and describes viruses, worms, and trojans specifically designed for the mobile environment.
Abstract: Understanding existing threats against mobile phones helps us better protect our information and prepare for future dangers. Mobile phones have evolved from their roots as analog walkie-talkies to full-scale Internet-enabled computers. Today, mobile phone handsets are arguably the dominant computer form factor consumers purchase. But having such powerful networked computers leads to a new class of malware: viruses, worms, and trojans specifically designed for the mobile environment. Merely enumerating known attacks doesn't help us understand all possible threats. Instead, we present a taxonomy of attacks against mobile phones that shows known as well as potential attacks.

Patent
09 Aug 2004
TL;DR: In this paper, the authors present a method and apparatus for recording and generating additional information related to telecommunication events using a mobile communication device, such as a telephone call or a text messaging event using cellular phone or a personal digital assistant.
Abstract: The present invention is directed to a method and apparatus for recording and generating additional information related to telecommunication events using a mobile communication device, such as a telephone call or a text messaging event using cellular phone or a personal digital assistant. Specifically, the preferred embodiments of the present invention records information such as GPS coordinates that indicate a position of the mobile communication device during the communication event, as well as a location of a sender or receiver of data to or from the mobile communication device, so as to facilitate a log entry of the position of the mobile communication device as well as other useful information that are associated with the communication events.

Journal ArticleDOI
TL;DR: A novel integrated WWAN/WLAN two-hop-relay architecture is proposed that both enhances the system capacity of existing WWAN systems and extends the system coverage of WLAN terminals.
Abstract: Next-generation wireless systems (4G and beyond) are envisioned to provide ubiquitous high-speed access over heterogeneous radio technologies. The integration of cellular WWANs and WLANs has drawn considerable attention from the research and commercial communities (e.g., 3G+802.11). Emerging dualmode mobile terminals could provide flexibility and system performance enhancement by providing seamless roaming between WWANs and WLANs. In this article we propose a novel integrated WWAN/WLAN two-hop-relay architecture that both enhances the system capacity of existing WWAN systems and extends the system coverage of WLAN terminals. The proposed two-hop-relay architecture can be considered as a system-level macro diversity technique that utilizes temporal channel quality variation to achieve increased system capacity. Significant capacity gain is achieved with the proposed twohop-relay architecture in both a fixed-rate uplink CDMA system and a variable data rate downlink HDR-like system.

Journal ArticleDOI
TL;DR: The IVC network's potential vulnerabilities and emerging research aimed at mitigating them are explored, and a security architecture under development called SecCar offers a promising approach to dealing with these risks.
Abstract: With the advent of intelligent transportation systems (ITS), safer and more efficient roadways are on the horizon. Future generations of in-vehicle ITS will network with nearby vehicles for greater safety and efficiency. Through wireless communication and advanced sensor technologies, intelligent vehicles will learn of nearby vehicles' intentions and dynamics, and of the presence of roadway hazards. These IT technologies will allow safe, tightly spaced vehicle clusters or platoons and coordinate safe lane merges and collision avoidance in intersections and under limited-visibility conditions. For efficiency and economy, the wireless communication will probably take place directly between vehicles. The resulting intervehicle communication (IVC) network will be of the general class of mobile, ad hoc networks without a fixed infrastructure. In contrast to railroad dispatch system or air traffic control systems, which make decisions in a central location and then transmit them to trains or planes, the network will rely on ordinary nodes for routing and network management, spreading the intelligence and infrastructure throughout the network in the vehicles themselves. This article explores the IVC network's potential vulnerabilities and emerging research aimed at mitigating them. Our project, a security architecture under development called SecCar, offers a promising approach to dealing with these risks.

Journal ArticleDOI
TL;DR: In this paper, the authors explore the driving forces of m-commerce, analyze the institutional and functional change of the 3G mobile communication value chain and isolate critical factors and essential characteristics of mobile applications for economic success of 3G mcommerce.

Patent
14 Oct 2004
TL;DR: In this article, a mobile communications device initiates a handoff from its current base station (BS) sector network attachment point to a new BS sector, e.g., via a network link.
Abstract: A mobile communications device initiates a handoff from its current base station (BS) sector network attachment point to a new BS sector. The mobile sends a handoff request over its current wireless link to the current BS sector, which forwards the request to the new BS sector, e.g., via a network link. The new BS sector processes the request assigning dedicated resources, e.g., an identifier and dedicated uplink segments. Information identifying the allocated resources is conveyed from the new BS sector via the current BS sector to the mobile. The mobile determines the time of the allocated dedicated segments based upon a received beacon signal from the new BS sector with known timing relationships to dedicated segments. The mobile breaks the original wireless link just prior to the time of the first assigned dedicated segment. The mobile communicates information on the assigned dedicated segments to perform registration operations, e.g., timing synchronization and power control, establishing a new wireless link.

Journal ArticleDOI
08 Nov 2004
TL;DR: An overview of future high-speed satellite mobile communication systems, the technologies deployed or planned for deployment, and the challenges is presented, focusing in particular on nonlinear downlink channel behavior, shadowing and multipath fading.
Abstract: Central features of future 4G mobile communication systems are high-speed data transmission (up to 1 Gb/s) and interactive multimedia services. For effective delivery of these services, the network must satisfy some stringent QoS metrics, defined typically in terms of maximum delay and/or minimum throughput. Mobile satellite systems will be fully integrated with the terrestrial cellular systems to provide ubiquitous global coverage to diverse users. The challenges for future broadband satellite systems, therefore, lie in the proper deployment of state-of-the-art satellite technologies to ensure seamless integration of the satellite networks into the cellular systems and its QoS frameworks, while achieving, as far as possible, efficient use of satellite link resources. The paper presents an overview of future high-speed satellite mobile communication systems, the technologies deployed or planned for deployment, and the challenges. Focusing in particular on nonlinear downlink channel behavior, shadowing and multipath fading, various physical channel models for characterizing the mobile satellite systems are presented. The most prominent technologies used in the physical layer, such as coding and modulation schemes, multiple-access techniques, diversity combining, etc., are then discussed in the context of satellite systems. High-speed and QoS-specific technologies, such as onboard processing and switching, mobility and resource management, IP routing and cross-layer designs, employed in the satellite systems are also discussed.

Patent
10 Dec 2004
TL;DR: In this article, the authors present a system and method for providing handwritten messages with electronic communication devices, which includes a touch screen, screen buffer memory, processor, and transceiver, where the handwritten message displayed on the touch screen may be stored to the buffer memory as an image, directed by the processor to the transceiver and transmitted via a wireless connection to a wireless base station and the Internet.
Abstract: The present invention provides a system and method for providing handwritten messages with electronic communication devices. For example the electronic communication device may be a mobile communication device and may include a touch screen, screen buffer memory, processor, and transceiver. In preferred embodiments, the mobile communication device may be a personal digital assistant (PDA), a two-way pager, or a mobile telephone. The mobile communication device user may create a handwritten message on the touch screen using, for example, a stylus. In one exemplary embodiment, the handwritten message displayed on the touch screen may be stored to the buffer memory as an image, directed by the processor to the transceiver, and transmitted via a wireless connection to, for example, a wireless base station and the Internet. The Internet may route the handwritten message image to a desired Internet address. The handwritten message may be displayed in real time on the recipient's display, e.g., an instant message (IM) session, or stored in their email mailbox for later retrieval and display. The recipient may type in a text message in response to the hand written message, and this message will be transmitted to mobile communication device and displayed on the mobile communication device. In another embodiment, the receiving party may also have handwritten messaging capabilities (included with, for example, a PC, PDA or a mobile phone) and may respond with a handwritten message.

Proceedings ArticleDOI
07 Jul 2004
TL;DR: An adaptive scheme for vertical handoff in wireless overlay networks is presented and two adaptive evaluation methods for the mobile terminal to determine the handoff time that relies on the candidates' resources and the running applications are proposed.
Abstract: Vertical handoff is the switching process between heterogeneous wireless networks. Discovering the reachable wireless networks is the first step for vertical handoff. After discovering the reachable candidate networks, the mobile terminal decides whether to perform handoff or not. We present an adaptive scheme for vertical handoff in wireless overlay networks. Our system discovery method effectively discovers the candidate networks for the mobile terminal. Moreover, we propose two adaptive evaluation methods for the mobile terminal to determine the handoff time that relies on the candidates' resources and the running applications. The simulation results show that the proposed system discovery method can balance the power consumption and the system discovery time. Furthermore, the proposed handoff decision method can decide the appropriate time to perform handoff.

Journal ArticleDOI
TL;DR: The article presents the latest efforts undertaken by standardization bodies in the mobile telecommunication industry as well as by Internet Working Groups to meet the requirements of new sophisticated functions and protocols to support innovative, flexible, and efficient charging, accounting, and billing mechanisms.
Abstract: The current technological advances in mobile telecommunication networks and the Internet are about to alter existing business models. These different worlds converge and create an open market, where a large number of independent application/service providers will offer their services to users through a limited number of network providers. At the same time, the evolution of existing network technologies and the specification of new concepts requires new advanced and holistic solutions in several technical areas. One such area is related to the design and management of new sophisticated functions and protocols to support innovative, flexible, and efficient charging, accounting, and billing mechanisms. This survey article considers the key concepts of such mechanisms, and the requirements they impose upon the network infrastructure. The article presents the latest efforts undertaken by standardization bodies in the mobile telecommunication industry as well as by Internet Working Groups to meet these requirements.

Patent
19 Nov 2004
TL;DR: In this paper, the authors present a scheme for seamless switching of voice calls between different wireless networks by using call control equipment (CCE) for maintaining voice communications over a traffic channel established between a mobile device and a communication terminal.
Abstract: Methods and apparatus for providing a seamless switching of voice calls between different wireless networks are disclosed. In one illustrative example, a mobile communication device has a processor and one or more wireless transceivers coupled to the processor. The one or more wireless transceivers include a first transceiver portion operative in accordance with a first wireless network (e.g. a GSM/GPRS cellular network) and a second transceiver portion operative in accordance with a second wireless network (e.g. an 802.11 wireless network). A voice call is maintained between the mobile device and a communication terminal through call control equipment. The processor of the mobile device is operative to maintain voice communications for the voice call over a traffic channel established between the mobile device and the first wireless network using the first transceiver portion; cause a connecting call to be established with the communication terminal through the call control equipment in response to a predetermined condition, where the connecting call involves a traffic channel established between the second wireless network and the mobile device using the second transceiver portion; and after the connecting call is established, maintain voice communications for the voice call over the traffic channel established between the second wireless network and the mobile device.

Patent
28 Jun 2004
TL;DR: A mobile location reporting communication system consists of a network of communication sources and targets managed by one or more control stations as mentioned in this paper, where a communication source may request for the location of a mobile communication target from the network and that information is provided to the source.
Abstract: A mobile location reporting communication system consists of a network of communication sources and targets managed by one or more control stations. In the system, a communication source may request for the location of a mobile communication target from the network. The target conveys its location to the network and that information is provided to the source. In the invention a mobile communication source request for the location of mobile communication targets that are present in a prescribed geographic boundary. The network provides to the source only remote targets that are present in the prescribed boundary. Also in the invention, a concealed or clandestine mobile portable target, close to the mobile portable source, may be tracking the source. The source may invoke a method that may the result of mobile targets that have traveled a pre-specified distance with the source while maintaining proximity to the source.

Patent
05 Apr 2004
TL;DR: In this article, a system, method and computer program product are provided for accessing security or content analysis functionality utilizing a mobile communication device, including an operating system installed on a mobile device capable of communicating via a wireless network.
Abstract: A system, method and computer program product are provided for accessing security or content analysis functionality utilizing a mobile communication device. Included is an operating system installed on a mobile communication device capable of communicating via a wireless network. Further provided is an application program installed on the mobile communication device and executed utilizing the operating system for performing tasks. A scanning subsystem remains in communication with the application program via an application program interface. Such scanning subsystem is adapted for accessing security or content analysis functionality in conjunction with the tasks performed by the application program.

Journal ArticleDOI
TL;DR: Major service capabilities such as personalization, ambient awareness, and adaptability are described along with a reference model focusing in I-centric communication, which is a service infrastructure framework for the future wireless world.
Abstract: The acceptance of next-generation mobile communication systems depends to a large extent on the services and applications that can be offered to customers. Tailoring the services to actual user needs is considered to be crucial for the success of future wireless technology. The individual user, "I", has to be put in the center of service provisioning. In this article, we report the work developed by the Working Group 2 of the Wireless World Research Forum on a service infrastructure framework for the future wireless world. Major service capabilities such as personalization, ambient awareness, and adaptability are described along with a reference model focusing in I-centric communication.