Dynamic 2D-barcodes for multi-device Web session migration including mobile phones

@article{Alapetite2009Dynamic2F,
  title={Dynamic 2D-barcodes for multi-device Web session migration including mobile phones},
  author={A. Alapetite},
  journal={Personal and Ubiquitous Computing},
  year={2009},
  volume={14},
  pages={45-52}
}
  • A. Alapetite
  • Published 2009
  • Computer Science
  • Personal and Ubiquitous Computing
This article introduces a novel Web architecture that supports session migration in multi-device Web applications, particularly the case when a user starts a Web session on a computer and wishes to continue on a mobile phone. The proposed solution for transferring the needed session identifiers across devices is to dynamically generate pictures of 2D-barcodes containing a Web address and a session ID in an encoded form. 2D-barcodes are a cheap, fast and robust approach to the problem. They are… Expand
DireWolf - Distributing and Migrating User Interfaces for Widget-Based Web Applications
TLDR
It is shown that the DireWolf framework facilitates the use case of collaborative semantic video annotation and provides more flexible control over different parts of an application by enabling the simultaneous use of smart phones, tablets and computers. Expand
DireWolf Framework for Widget-based Distributed User Interfaces
TLDR
The DireWolf framework facilitates the use case of DUI-enabled semantic video annotation and opens the way for creating distributed Web applications which can access device specific functionalities such as multi-touch, text input, etc. in a federated and usable manner. Expand
Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional Code
  • N. Teraura, K. Sakurai
  • Computer Science
  • 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
  • 2012
TLDR
A registration server for inspecting WEB addresses and storing the corresponding registration IDs in the two-dimensional code format was established but was susceptible to phishing and camouflage when malicious software was used to rewrite the registration ID and the relationship of the WEB address on the registration server. Expand
TaskShadow-W: NFC-triggered migration of web browsing across personal devices
TLDR
The TaskShadow-W, an NFC-triggered web session migration system, provides the functionality of session management to guarantee the continuous experience of web browsing and is compatible with most of the existing websites, and does not require dedicated proxy servers or modifying the existing web servers. Expand
Research and Application of 2D Barcode in Hospital Informatization
Barcode technology is one of the automatic identification technologies that are developed and used very rapidly in recent years. As the application and popularization of wireless communication andExpand
Electronic Toll Collection System Using Barcode Technology
TLDR
The proposed techniques make use of digital image processing techniques to scan the barcode and to match it with the existing database, by utilizing the decoded data. Expand
Qr Code Based Mobile App and Business Process Integration
TLDR
The development of QR based new system will allow technology savvy users to just scan QR codes to complete end to end business process flow execution to complete task at hand. Expand
On-demand cross-device interface components migration
TLDR
This paper presents their solution for partial Web migration: it allows users to interactively select parts of existing interfaces and have them migrate to a target device. Expand
SD-EQR: A New Technique To Use QR CodesTM in Cryptography
TLDR
This method will be suitable in any business house, government sectors, communication network to send their encrypted messages faster to the destination and a person can even use this method to keep his important documents perfectly secured with him all the time, without the information getting leaked to outside world. Expand
Liquid Transfer of User Identity
TLDR
The paper describes the on-going work on investigating how liquid transfer of user identity can be added to various ways of handing the user authentication. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 15 REFERENCES
Barcode readers using the camera device in mobile phones
TLDR
New algorithms and the implementations of image reorganization for EAN/QR barcodes in mobile phones are shown and the introduced algorithm is based on the code area found by four corners detection for 2D barcode and spiral scanning for 1D barcodes using the embedded DSP. Expand
Stateful session handoff for mobile WWW
TLDR
A web session handoff system that can hand over not only stateless but also stateful sessions between homogenous and heterogeneous user devices to enable uninterrupted and seamless web access is proposed. Expand
Using visual tags to bypass Bluetooth device discovery
TLDR
This paper has implemented the described framework completely for Nokia Series 60 cameraphones and demonstrated that the tag-based connection-establishment technique offers order of magnitude time improvements over the standard Bluetooth Device Discovery model; and is significantly easier to use in a variety of realistic scenarios. Expand
Design and Performance Analysis of Multimedia Teachware Making System Using 2D Barcode
TLDR
A new system was suggested in this study which combined 2D barcode of ubiquitous technology and the URL(Uniform Resource Location) of multimedia teachware and it is demonstrated that this system is superior to existing one and that the minimization of time for bridging the multimedia contents to 2Dbarcode enables the optimization of performance. Expand
Interacting with mobile services: an evaluation of camera-phones and visual tags
TLDR
It was found that participants’ attitudes to visual-tag-based applications were broadly positive, although they had several important reservations about camera-phone technology more generally. Expand
Flexible interface migration
TLDR
The solution that is developed for a service to support platform-aware runtime migration for Web applications, which allows users interacting with an application to change device and continue their interaction from the same point. Expand
A Web 2.0 Platform to Enable Context-Aware Mobile Mash-Ups
TLDR
This work provides a platform which combines social context-aware annotation of objects and spatial regions with sentient mobile devices enabling multi-modal human to environment interaction in order to enable advanced context- aware data and service discovery, filtering and consumption within both indoor and outdoor environments. Expand
Browser Session Preservation and Migration
TLDR
The design of the BSPM infrastructure is based on a browser-side plug-in that can capture browser session state, and a proxy server that can store browser session snapshots securely for each individual user. Expand
CyberCode: designing augmented reality environments with visual tags
TLDR
Examples of augmented reality applications based on CyberCode are described, and some key characteristics of tagging technologies that must be taken into account when designing augmented reality environments are discussed. Expand
Visual-tag reader: image capture by cell phone camera
TLDR
A method for recognizing the ID tags of "objects" in the real world that uses the image capture capabilities of conventional cell phone cameras and uses five colored rectangles to establish the "geometric invariants of five coplanar point". Expand
...
1
2
...