InfoBeyond Technology is an innovative company specializing in AI, Computer Vision, Communications, and Cybersecurity within the Information Technology industry.

Contact Info

320 Whittington PKWY, STE 303
Louisville, KY, USA 40222-4917
[email protected]
(502) 919 7050

Learn More

Follow Us

Handbook of Mobile Systems Applications and Services

Heterogeneous Wireless Networks: Networking Protocol to Security

Encyclopedia on Ad Hoc and Ubiquitous Computing

Selected Books

Check the books we published

  • Editors: Anup Kumar, Bin Xie
  • Content: 612 Pages; 164 Illustrations
  • ISBN: 9781439801529
  • Viewnum: 498
  • Series: Mobile Services and Systems
  • Publisher: Auerbach Publications
  • Published: April 26, 2012

Handbook of Mobile Systems Applications and Services

From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolution of mobile services technologies. It examines service-oriented architecture (SOA) and explains why SOA and service oriented computing (SOC) will play key roles in the development of future mobile services.

Investigating current service discovery frameworks, the book covers the basics of mobile services and applications developed in various contexts. The first section provides readers with the required background in mobile services architecture. Next, it details of middleware support for mobile services. The final section discusses security and applications of mobile services. Containing the contributions of leading researchers and academics from around the world, the book:

  • Introduces a new location-based access control model
  • Unveils a simple, yet powerful enhancement that enables Web services to locally manage workflow dependencies and handle messages resulting from multiple workflows
  • Examines an event-based location aware query model that continuously aggregates data in specific areas around mobile sensors of interest
  • Addresses the problem of location-based access control in the context of privacy protection
  • Presents a layered architecture of context-aware middleware
  • Considers the development of assistive technology solutions for the blind or visually impaired

Discussing architecture for supporting multi-mode terminals in integrated heterogeneous wireless networks, this book addresses the network availability constraint to serve all mobile services originating from a single-user terminal. It examines QoS protocols and their enhancements in supporting user mobility. Analyzing mobile services security vulnerabilities, it details security design best practices that mobile service developers can use to improve the security of their mobile systems.

  • Author: Bin Xie
  • Content: 224 pages
  • ISBN-10: 3836419270
  • ISBN-13: 978-3836419277
  • Publisher: VDM Verlag Dr. Mueller e.K.
  • Published: September 1, 2009

Heterogeneous Wireless Networks: Networking Protocol to Security

Heterogeneous wireless networks (HWNs) provide flexible and diversified wireless network access (e.g., cellular, IEEE 802.11) by integrating cellular networks, wireless LANs, and ad hoc networks with the Internet. It has been emerging as a promising solution to offer a variety of exciting applications, anytime and anywhere. The flexibility and benefits of the HWN, for example, is to extend the service coverage of the existing cellular and WLAN infrastructure, to improve the communication throughput, and reduce packet transmission latency, based on availability of different types of radio network in the roaming area (cellular, WLAN, or others). In the study, we answer some fundamental questions in the design and deployment of a HWN. The first is how to effectively operate a mobile terminal in ad hoc mode to access the Internet through a cellular network, WLAN or other underlying wireless access networks. The second is how to design ubiquitous seamless mobility support for a roaming user, allowing ubiquitous and bi-directional Internet accessibility, connectivity, and mobility. Finally, it answers the questions that what is the security threats for a mobile terminal that is operating in the ad hoc mode, and how to provide information confidentiality for a continuously moving mobile terminal.

For details, please click:

  • Editors: Dharma P Agrawal, Bin Xie
  • Content: 688 Pages
  • ISBN: 9789812833488
  • Viewnum: 637
  • Published: September, 2009

Encyclopedia on Ad Hoc and Ubiquitous Computing

Anim pariatur cliche reprehenderit, enim eiusmod high life accusamus terry richardson ad squid. 3 wolf moon officia aute, non cupidatat skateboard dolor brunch. Food truck quinoa nesciunt laborum eiusmod. Brunch 3 wolf moon tempor, sunt aliqua put a bird on it squid single-origin coffee nulla assumenda shoreditch et. Nihil anim keffiyeh helvetica, craft beer labore wes anderson cred nesciunt sapiente ea proident. Ad vegan excepteur butcher vice lomo. Leggings occaecat craft beer farm-to-table, raw denim aesthetic synth nesciunt you probably haven't heard of them accusamus labore sustainable VHS.