Academia.eduAcademia.edu

Mobile and Pervasive Computing

description1,279 papers
group877 followers
lightbulbAbout this topic
Mobile and Pervasive Computing is an interdisciplinary field that focuses on the development and application of computing technologies that enable seamless access to information and services across various mobile devices and environments, emphasizing user mobility, context-awareness, and the integration of computing into everyday life.
lightbulbAbout this topic
Mobile and Pervasive Computing is an interdisciplinary field that focuses on the development and application of computing technologies that enable seamless access to information and services across various mobile devices and environments, emphasizing user mobility, context-awareness, and the integration of computing into everyday life.

Key research themes

1. How can context-awareness enhance user interaction and system adaptation in mobile and pervasive computing?

Research in mobile and pervasive computing increasingly focuses on leveraging context-awareness—understood as the system's ability to sense, interpret, and respond to environmental, user, and device context—to improve user experience and enable dynamic system behavior adaptation. This is critical because mobile and pervasive systems operate in highly dynamic settings with heterogeneous sensors and varying user environments. Effective context inference and management reduce information overload, empower personalized services, and support user-centric interaction models, thereby making pervasive computing practical and valuable.

Key finding: The UPCASE project demonstrated a multi-layered sensor data processing architecture using smartphones augmented with Bluetooth-connected sensors, employing decision-tree induction techniques for real-time context inference to... Read more
Key finding: This work argues for formal context modeling (e.g., via ontologies) as essential for supporting adaptable, context-aware mobile applications beyond simple location-based services. It highlights that context information can... Read more
Key finding: By surveying a range of context-aware pervasive computing implementations across domains such as healthcare and IoT, this paper identifies the challenges related to handling multi-context recognition and noisy sensor data.... Read more

2. What architectural strategies and middleware designs facilitate scalable, adaptable, and seamless pervasive and mobile computing systems?

The dynamic, heterogeneous, and resource-constrained nature of pervasive computing environments necessitates novel architectural approaches and middleware platforms. Research emphasizes separating data from functionality to enable graceful evolution, applying feature-driven architecture synthesis to tailor pervasive systems, and developing middleware supporting nomadic mobile services with transparent service discovery and deployment. These strategies address scalability, adaptability, and seamlessness, fundamental for deploying pervasive applications across diverse devices and contexts.

Key finding: This paper identifies three critical architectural 'fault lines' of distributed computing detrimental to pervasive computing: tight coupling of data and functionality, inability to dynamically acquire resources, and lack of... Read more
Key finding: The authors propose a feature-driven approach to automatically generate architectures for pervasive systems from a catalog of architectural features identified by surveying over 50 existing architectures. By decomposing... Read more
Key finding: The Mobile Service Platform (MSP) extends Service-Oriented Architecture (SOA) principles to mobile devices by using a Jini surrogate architecture to enable mobile devices—often constrained and nomadic—to host and advertise... Read more

3. How do mobile sensing and location technologies enable pervasive applications, and what are their challenges and research trends?

Locating users and objects accurately in space and time is integral to ubiquitous computing applications such as navigation, asset tracking, and context-aware services. Research explores various positioning techniques—proximity, triangulation, scene analysis, dead reckoning—implemented with wireless, sensor, and communication technologies. Key challenges include accuracy, precision, scalability, cost, and integration with mobile devices. Emerging trends highlight hybrid approaches and combining sensing modalities to enhance robustness in diverse environments.

Key finding: This article classifies positioning methods (proximity, triangulation, scene analysis, dead reckoning), detailing their operating principles, advantages, and limitations in accuracy and applicability. It highlights the... Read more
Key finding: Surveying integration of mobile phone sensing with Internet and Web of Things, the paper enumerates domains (health, gaming, transportation) where location and sensor data fusion underpin novel applications. It discusses... Read more
Key finding: Addressing the challenge of estimating traffic volumes without traditional sensors, this study develops a stochastic queue discharge model utilizing sparse, crowd-sourced vehicle trajectory data with penetration rates as low... Read more

All papers in Mobile and Pervasive Computing

A noise map facilitates the monitoring of environmental noise pollution in urban areas. It can raise citizen awareness of noise pollution levels, and aid in the development of mitigation strategies to cope with the adverse effects.... more
Η ψηφιακή τεχνολογία έχει μετασχηματίσει ριζικά τον τομέα της υγείας, από τους ηλεκτρονικούς φακέλους και την τηλεϊατρική έως τη χρήση τεχνητής νοημοσύνης στη διάγνωση και τη θεραπεία. Παρά τα σημαντικά οφέλη, οι καινοτομίες αυτές... more
Home and Building Automation Systems (HBAS) are becoming of widespread adoption. When distinct users interact with such systems, their intentions are likely to be different, often resulting in conflicting situations, which the systems... more
Το περιεχόμενο του συγγράμματος αντιστοιχεί στο εργαστηριακό μέρος των προπτυχιακών μαθημάτων «Συστήματα Ψηφιακής Επεξεργασίας Σήματος σε Πραγματικό Χρόνο» και των μεταπτυχιακών μαθημάτων «Συστήματα Πραγματικού Χρόνου», «Διασύνδεση Η/Υ με... more
Communication protocols need to be more reliable and efficient since the Internet of Things (IoT) is growing exponentially, changing how devices interact. IoT ecosystems often comprise many devices with varying degrees of processing... more
This paper presents a model for building context-based systems in pervasive computing environments from high level specifications. A pervasive computing environment is viewed as a collaboration space consisting of mobile users, system... more
Understanding human mobility is essential for many fields, including transportation planning. Currently, surveys are the primary source for such analysis. However, in the recent past, many researchers have focused on Call Detail Records... more
Understanding human mobility is essential for many fields, including transportation planning. Currently, surveys are the primary source for such analysis. However, in the recent past, many researchers have focused on Call Detail Records... more
The purpose of this study was to investigate the effects of the interaction mode on users' wayfinding performance. Both the dynamic peephole (DP) and static peephole (SP) interaction modes were examined. Sixty users were divided into two... more
Initiatives like Linked Open Data have resulted in a rapid growth of the Web of data, and this growth is expected to continue. While impressive progress has been made in recent years in scalable storing, querying, and reasoning with... more
In recent years, the widespread diffusion of pervasive sensing devices and the increasing need for reducing energy consumption have encouraged research in the energy-aware management of smart environments. Following this direction, this... more
Low-power wireless communication is a central building block of Cyber-physical Systems and the Internet of Things. Conventional low-power wireless protocols make avoiding packet collisions a cornerstone design choice. The concept of... more
Consider a house cleaning robot planning its activities for the day. Assume that the robot expects the human inhabitant to first dress, then have breakfast, and finally go out. Then, it should plan not to clean the bedroom while the human... more
This article presents a new representation of semantic virtual environments. We propose to use the ontology as a tool for implementation. Our model, called SVHsIEVs 1 provides a consistent representation of the following aspects: the... more
The number of wireless sensors in use—for example, the global positioning system (GPS) intelligent sensor—has increased in recent years. These intelligent sensors generate a vast amount of spatiotemporal data, which can assist in finding... more
This paper presents a model for building context-based systems in pervasive computing environments from high level specifications. A pervasive computing environment is viewed as a collaboration space consisting of mobile users, system... more
The cloud computing is a technology which connects multiple nodes to each other in network. Cloud computing facilitate sharing of computational task and resources with clients and servers. It also operates in heterogeneous environment but... more
Home energy management is becoming increasingly important and, though there are a plethora of tools for accessing energy consumption data, few provide concrete insights that can directly help users manage demand. Mechanisms that enable a... more
Home energy management is becoming increasingly important and, though there are a plethora of tools for accessing energy consumption data, few provide concrete insights that can directly help users manage demand. Mechanisms that enable a... more
This work presents a system for collecting user activity annotations using in-home distributed energy monitoring combined with a novel algorithm that generates device-specific profiles used to identify potentially important changes in... more
Rainbow trout (Oncorhynchus mykiss, Walbaum, 1792) was grown in cages (water reservoirs "Bočac", Bosnia and Herzegovina) in two separate experiments for a period of 90 days (autumn -winter and springsummer). Trout were fed six different... more
Currently it is very difficult for connection oriented applications to use a mobile environment. One reason is that Mobile IP requires intermediate software agents to be deployed in the Internet. This infrastructure based mobility scheme... more
efficiency, privacy, and transparency by integrating public and private blockchains. The system guarantees secure transaction validation through adaptive consensus protocols and multi-signature authentication, greatly enhancing... more
Demographics prediction is an important component of user profile modeling. The accurate prediction of users' demographics can help promote many applications, ranging from web search, personalization to behavior targeting. In this paper,... more
Smartphones are increasingly becoming popular. All Smartphones have rich set of sensors, which can be used to provide driver assistant services. Services such as road traffic information and road condition to provide such services, there... more
This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will... more
For guidance on citations see FAQs.
Vehicular ad hoc networks (VANETs) enable vehicles to communicate with each other (V2V) as well as with roadside infrastructure units (V2I). These units provide different services such as driver information systems and Internet access.... more
Vehicular ad hoc networks (VANETs) enable vehicles to communicate with each other (V2V) as well as with roadside infrastructure units (V2I). These units provide different services such as driver information systems and Internet access.... more
Over the past decade, smartphones have become the point of convergence for many applications and services. There is a growing trend in which traditional smart-card based services like banking, transport and access control are being... more
Urban computing is a wide area for research, which has picked up momentum after the introduction of Smart City vision. Smart City initiative aims to improve the quality of life of its citizens by building a strong and resilient framework... more
The convergence of social networking and mobile computing is expected to generate a new class of applications, called Mobile Social Networking (MSN) applications, that will be of significant importance for the coming years. Indeed, MSN... more
The nature of many sensor applications as well as continuously changing sensor data often imposes real-time requirements on wireless sensor network protocols. Due to numerous design constraints, such as limited bandwidth, memory and... more
Ad-hoc Mobile Cloud (AMC) computing represents an opportunistic platform for inexpensive and collaborative resource provisioning. However, service discovery in AMC faces resource limitation and dynamic context challenges. Current attempts... more
Οι πολύπλοκες διαδικασίες κρατήσεων ή οι μη διαισθητικές διαδικασίες κρατήσεων και έλλειψη εξατομίκευσης, μπορούν να δημιουργήσουν σύγχυση και να οδηγήσουν σε απογοήτευση και ενδεχομένως σε εγκατάλειψη της διαδικασίας κράτησης. Η... more
Smart phones today are equipped with inbuilt sensors that give safety enhancement to the drivers on road. The accelerometer and a GPS tracking system of smart phone can give assistance to the driver while travelling. In this paper, the... more
Blockchain technology has gained prominence recently by virtue of its strong security features for clinical data. Automation of blockchain transactions enables data transactions and records, providing decentralized, secure, and dependable... more
Assessing the driver's cognitive load has become an increasing research interest. Methods described in literature fall into three categories: self-assessment, physiological measures, and performance-based measures. We claim that cognitive... more
Security is vital for the reliable operation of vehicular ad hoc networks (VANETs). One of the critical security issues is the revocation of misbehaving vehicles. While essential, revocation checking can leak private information. In... more
People involved in mass emergencies increasingly publish information-rich contents in online social networks (OSNs), thus acting as a distributed and resilient network of human sensors. In this work, we present HERMES, a system designed... more
People involved in mass emergencies increasingly publish information-rich contents in online social networks (OSNs), thus acting as a distributed and resilient network of human sensors. In this work, we present HERMES, a system designed... more
According to recent studies, such as the World Bank report, COVID-19 and the pandemic crisis triggered a massive erosion of human capital at critical moments in the life cycle, derailing development for millions of children and youth,... more
According to recent studies, such as the World Bank report, COVID-19 and the pandemic crisis triggered a massive erosion of human capital at critical moments in the life cycle, derailing development for millions of children and youth,... more
Current MAC (Medium Access Control) protocols for data collection scenarios with a large number of mobile nodes that generate bursty traffic are typically based on low-power listening (LPL) for network synchronization and FSA (Frame... more
Fog computing has emerged to support the requirements of IoT applications that could not be met by today's solutions. Different initiatives have been presented to drive the development of fog, and much work has been done to improve... more
Download research papers for free!