OpenMobs: Mobile Broadband Internet Connection Sharing

@inproceedings{Ciobanu2014OpenMobsMB,
  title={OpenMobs: Mobile Broadband Internet Connection Sharing},
  author={Nicusor Ciobanu and Dragos-George Comaneci and Ciprian Dobre and Constandinos X. Mavromoustakis and George Mastorakis},
  booktitle={MONAMI},
  year={2014}
}
We witness an explosion in the number of applications being developed for mobile devices. Many such applications are in need or generate a lot of Internet traffic, and as such mobile devices are today equipped with more networking capabilities, from mobile broadband (3G/4G) to WiFi, Bluetooth, and others. However, when it comes to mobile broadband Internet access, for economic reasons, today mobile providers tend to switch from unlimited mobile data plans to tiered data pricing models, putting… 
Enabling Mobile Cloud Wide Spread Through an Evolutionary Market-Based Approach
TLDR
In this paper, incentives for mobile cloud systems are studied and an evolutionary market-based approach to create these incentives is considered as a solution.
Trust models for efficient communication in Mobile Cloud Computing and their applications to e-Commerce
TLDR
An adaptive model for the trust management in structured overlay networks is presented, based on a Mobile Cloud architecture and considering a honeycomb overlay, that actively uses the social links between users and the model of interaction between them.
Middleware Platform for Mobile Crowd-Sensing Applications Using HTML5 APIs and Web Technologies
TLDR
This chapter presents a web-based cross-platform architecture based on HTML5 APIs and other state-on-the-art web technologies which exploits the ubiquitous capabilities of modern mobile devices, along with their built-in sensing capabilities, in order to motivate the users to collect, share and use different kind of sensor data.
Trust Management Approach for Securingthe Services Access: Telecom OperatorsCollaborations in IMS Network
TLDR
This paper discusses the case when the customer wishes to access to a service hosted by an external service provider, Tr-OrBAC, and presents the encountered security problems.
Handling Big Data in the Era of Internet of Things (IoT)
TLDR
This chapter aims to shortly present the correlation between Internet of Things and the expansion of Big Data, and two different approaches for the implementation of Big data are presented.
A Resource Prediction Engine for Efficient Multimedia Services Provision
TLDR
A Resource Prediction Engine (RPE) is presented that utilizes novel models and algorithms for resource usage prediction, making possible the optimal distribution of streaming data and the prediction of the upcoming fluctuations of the network.
The Technical Debt in Cloud Software Engineering: A Prediction-Based and Quantification Approach (.pdf Document)
TLDR
In this chapter, the probability of introducing the Technical Debt due to budget and cloud service selection decisions is investigated and a cost estimation approach for implementing Software as a Service (SaaS) in the cloud is examined, indicating three scenarios for predicting the incurrence of Technical Debt in the future.

References

SHOWING 1-10 OF 11 REFERENCES
An automatic and on-demand MNO selection mechanism
TLDR
This work presents an automatic and on-demand MNO selection mechanism, that has been designed and implemented on the Android platform, and for evaluation purposes the energy and end-to-end (e2e) time consumption while switching among MNOs using this mechanism is evaluated.
Content Download in Vehicular Networks in Presence of Noisy Mobility Prediction
TLDR
This work proposes a fog-of-war model that allows for different degrees of prediction accuracy in a simple, yet effective, manner, and shows that this model can closely reproduce the prediction accuracy of Markovian techniques.
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
TLDR
The use of self-reported social networks for routing in mobile networks in comparison with detected social networks discovered through encounters is explored, and using techniques from social network analysis, it is found that the two social networks are different.
SPRINT: Social prediction-based opportunistic routing
Opportunistic networks are mobile networks that rely on the store-carry-and-forward paradigm, using contacts between nodes to opportunistically transfer data. For this reason, traditional routing
Reality mining: sensing complex social systems
TLDR
The ability to use standard Bluetooth-enabled mobile telephones to measure information access and use in different contexts, recognize social patterns in daily user activity, infer relationships, identify socially significant locations, and model organizational rhythms is demonstrated.
Branch-and-Bound Methods: A Survey
TLDR
The essential features of the branch-and-bound approach to constrained optimization are described, and several specific applications are reviewed, including integer linear programming Land-Doig and Balas methods, nonlinear programming minimization of nonconvex objective functions, and the quadratic assignment problem Gilmore and Lawler methods.
AT&T’s new data tiers: cost less, less value? http:// mobileoffice.about.com
  • [Accessed April
  • 2010
Introduction to Operations Research.
Choosing the best broadband plan
  • http://www.whistleout. com.au/Broadband/Guides/choosing-the-best-bradband-plan,
  • 2013
Overview of Wi-Fi, 3G and 4G Data Plans
  • http:// mobileoffice.about.com/. [Accessed April
  • 2014
...
...