Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges

S Abolfazli, Z Sanaei, E Ahmed… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable
ground from academia and industry. CMA is the state-of-the-art mobile augmentation model …

Multi-agent technology and ontologies to support personalization in B2C E-Commerce

D Rosaci, GML Sarnè - Electronic Commerce Research and Applications, 2014 - Elsevier
In this paper we present an XML-based multi-agent system, called Multi Agent System for
Traders (MAST), that supports several Business-to-Customer e-Commerce activities …

[HTML][HTML] Threat modeling framework for mobile communication systems

SP Rao, HY Chen, T Aura - Computers & Security, 2023 - Elsevier
This paper presents a domain-specific threat-modeling framework for the cellular mobile
networks. We survey known attacks against mobile communication and organize them into …

Shedding light on the Internet: Stakeholders and network neutrality

A Antonopoulos, E Kartsakli, C Perillo… - IEEE …, 2017 - ieeexplore.ieee.org
The latest impressive technological advancements in the telecommunications domain have
entailed the involvement of new network operators and over-the-top (OTT) providers that …

User behavior-aware scheduling based on time–frequency resource conversion

H Shan, Y Zhang, W Zhuang, A Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Time-frequency resource conversion (TFRC) is a recently proposed network resource
allocation strategy. By exploiting user behavior, it withdraws and reutilizes spectrum …

On efficient matching of spatiotemporal rules

X Yu, J Liu, Z Cui - Future Generation Computer Systems, 2023 - Elsevier
Spatiotemporal rules are ubiquitous nowadays. For example, a user may need to pay for a
phone call or the usage of the Internet services. The payment may depend on many factors …

An overview of online charging in 3GPP networks: new ways of utilizing user, network, and service‐related information

T Grgic, M Matijasevic - International journal of network …, 2013 - Wiley Online Library
Modern charging systems routinely apply the user, network, and service‐related information
while performing online charging. Compared, however, to all the information available to …

Wireless authorization and access network-neutral advice of charge techniques

M Grayson, J Henry, BA Brinckman… - US Patent …, 2022 - Google Patents
Presented herein are techniques to facilitate wireless authorization based on in-line
assurance and tariffing information. In one example, a method may include obtaining, by a …

Active accounting and charging for programmable wireless networks

B Lee, N Murray, Y Qiao - Mobile Networks and Applications, 2015 - Springer
A programmable networking approach to accounting and charging for services in software
defined wireless networks (SDWN) could greatly facilitate the service innovation that is …

Quality‐based charging solutions for wireless multimedia services

T Jursonovics, S Imre - International Journal of Network …, 2014 - Wiley Online Library
The evolution of mobile telecommunication networks and access bandwidth has enabled
operators to deliver IPTV services for mobile customers; however, the existing mobile …