—Considering user behaviors in the performance evaluation of mobile networks is crucial as traffic generation in such networks is highly dependent on mobility and communication a...
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
In this paper, we describe the design of a profile generator toolkit, which aims to automatically create realistic user profiles for a mobile personalized portal service. These pr...
A novel method for quantitatively measuring social interactions on small temporal and spatial scales on the basis of interaction geometry (reduced to the parameters interpersonal d...
Georg Groh, Alexander Lehmann, Jonas Reimers, Marc...
The mobile Internet enables 24-hour always-on computing with increased demands on time-based analysis. From an assumption that the mobile users are split into three different clus...