Table of Contents Author Guidelines Submit a Manuscript
Scientific Programming
Volume 2017 (2017), Article ID 5159690, 9 pages
https://doi.org/10.1155/2017/5159690
Research Article

Exploring the Evolution of New Mobile Services

1Big Data Technology and System Lab, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
2China Electric Power Research Institute, Beijing 100192, China

Correspondence should be addressed to Hai Jin

Received 6 January 2017; Accepted 9 March 2017; Published 6 April 2017

Academic Editor: Alex M. Kuo

Copyright © 2017 Yong Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. Ma, J. Zhou, M. Tang et al., “Social network and tag sources based augmenting collaborative recommender system,” IEICE Transactions on Information and Systems, vol. E98D, no. 4, pp. 902–910, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, “Securing SIFT: privacy-preserving outsourcing computation of feature extractions over encrypted image data,” IEEE Transactions on Image Processing, vol. 25, no. 7, pp. 3411–3425, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Wang, K. Wu, J. Xiao, and M. Hamdi, “Harnessing frequency domain for cooperative sensing and multi-channel contention in CRAHNs,” IEEE Transactions on Wireless Communications, vol. 13, no. 1, pp. 440–449, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. V. T. N. Nguyen and R. Kirner, “Throughput-driven partitioning of stream programs on heterogeneous distributed systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 3, pp. 913–926, 2016. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Chen and X. Li, “Input-adaptive parallel sparse fast Fourier transform for stream processing,” in Proceedings of the 28th ACM International Conference on Supercomputing (ICS '14), pp. 93–102, ACM, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. M.-H. Kuo, S.-L. Wang, and W.-T. Chen, “Using information and mobile technology improved elderly home care services,” Health Policy and Technology, vol. 5, no. 2, pp. 131–142, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Kong, M. Zhang, and D. Ye, “A belief propagation-based method for task allocation in open and dynamic cloud environments,” Knowledge-Based Systems, vol. 115, pp. 123–132, 2017. View at Publisher · View at Google Scholar
  8. G. Wang, Y. Zou, Z. Zhou, K. Wu, and L. M. Ni, “We can hear you with Wi-Fi!,” IEEE Transactions on Mobile Computing, vol. 15, no. 11, pp. 2907–2920, 2016. View at Publisher · View at Google Scholar
  9. K. Wu, H. Li, L. Wang et al., “HJam: attachment transmission in WLANs,” IEEE Transactions on Mobile Computing, vol. 12, no. 12, pp. 2334–2345, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. A. P. Oghuma, C. F. Libaque-Saenz, S. F. Wong, and Y. Chang, “An expectation-confirmation model of continuance intention to use mobile instant messaging,” Telematics and Informatics, vol. 33, no. 1, pp. 34–47, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. A. P. Oghuma, Y. Chang, C. F. Libaque-Saenz, M.-C. Park, and J. J. Rho, “Benefit-confirmation model for post-adoption behavior of mobile instant messaging applications: a comparative analysis of KakaoTalk and Joyn in Korea,” Telecommunications Policy, vol. 39, no. 8, pp. 658–677, 2015. View at Publisher · View at Google Scholar · View at Scopus
  12. S. O. Ogara, C. E. Koh, and V. R. Prybutok, “Investigating factors affecting social presence and user satisfaction with mobile instant messaging,” Computers in Human Behavior, vol. 36, pp. 453–459, 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. Y.-F. Kuo and S.-N. Yen, “Towards an understanding of the behavioral intention to use 3G mobile value-added services,” Computers in Human Behavior, vol. 25, no. 1, pp. 103–110, 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Hong, J. Y. L. Thong, and K. Y. Tam, “Understanding continued information technology usage behavior: a comparison of three models in the context of mobile internet,” Decision Support Systems, vol. 42, no. 3, pp. 1819–1834, 2006. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Chen, H. Jin, and S. Wu, “Minimizing inter-server communications by exploiting self-similarity in online social networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, pp. 1116–1130, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. C. Sun, Y. Wang, J. Zheng, and D. F. Hsu, “Feature fusion for mobile usage prediction using rank-score characteristics,” in Proceedings of the 12th IEEE International Conference on Cognitive Informatics and Cognitive Computing, (ICCI&CC '13), pp. 212–217, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Shin, J.-H. Hong, and A. K. Dey, “Understanding and prediction of mobile application usage for smart phones,” in Proceedings of the 14th International Conference on Ubiquitous Computing (UbiComp '12), pp. 173–182, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Ma, S. Wang, P. C. K. Hung, C.-H. Hsu, Q. Sun, and F. Yang, “A highly accurate prediction algorithm for unknown web service QoS values,” IEEE Transactions on Services Computing, vol. 9, no. 4, pp. 511–523, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. Y. Zou, J. Xiao, J. Han, K. Wu, Y. Li, and L. M. Ni, “GRfid: a device-free RFID-based gesture recognition system,” IEEE Transactions on Mobile Computing, vol. 16, no. 2, pp. 381–393, 2017. View at Publisher · View at Google Scholar
  20. K. Zhu, X. Zhang, B. Xiang, and L. Zhang, “Exploiting user context and network information for mobile application usage prediction,” in Proceedings of the 7th International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking (HOTPOST '15), pp. 25–30, Hangzhou, China, June 2015. View at Publisher · View at Google Scholar
  21. Z.-X. Liao, P.-R. Lei, T.-J. Shen, S. C. Li, and W. C. Peng, “Appnow: predicting usages of mobile applications on smart phones,” in Proceedings of the Conference on Technologies and Applications of Artificial Intelligence (TAAI '12), pp. 300–303, IEEE, Tainan, Taiwan, November 2012. View at Publisher · View at Google Scholar
  22. Z.-X. Liao, Y.-C. Pan, W.-C. Peng, and P.-R. Lei, “On mining mobile apps usage behavior for predicting apps usage in smartphones,” in Proceedings of the 22nd ACM International Conference on Information and Knowledge Management (CIKM '13), pp. 609–618, ACM, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Xu, “The application of ARIMA model in Chinese mobile user prediction,” in Proceedings of the IEEE International Conference on Granular Computing (GrC '10), pp. 586–591, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. I. Kloumann, L. Adamic, J. Kleinberg, and S. Wu, “The lifecycles of apps in a social ecosystem,” in Proceedings of the 24th International Conference on World Wide Web (WWW '15), pp. 581–591, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. Y. Zhang, X. Sun, and W. Baowei, “Efficient algorithm for k-barrier coverage based on integer linear programming,” China Communications, vol. 13, no. 7, pp. 16–23, 2016. View at Publisher · View at Google Scholar
  26. Y. Zheng, B. Jeon, D. Xu, Q. M. J. Wu, and H. Zhang, “Image segmentation by generalized hierarchical fuzzy C-means algorithm,” Journal of Intelligent and Fuzzy Systems, vol. 28, no. 2, pp. 961–973, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. Q. Wang, M. He, M. Du, S. S. Chow, R. W. Lai, and Q. Zou, “Searchable encryption over feature-rich data,” IEEE Transactions on Dependable and Secure Computing, 2016. View at Publisher · View at Google Scholar
  29. Y. Wang, K. Wu, and L. M. Ni, “Wifall: device-free fall detection by wireless networks,” IEEE Transactions on Mobile Computing, vol. 16, no. 2, pp. 581–594, 2017. View at Google Scholar
  30. M. R. Haddad, H. Baazaoui, D. Ziou, and H. Ben Ghezala, “A predictive model for recurrent consumption behavior: an application on phone calls,” Knowledge-Based Systems, vol. 64, pp. 32–43, 2014. View at Publisher · View at Google Scholar · View at Scopus
  31. I. Valera and M. Gomez-Rodriguez, “Modeling adoption and usage of competing products,” in Proceedings of the IEEE International Conference on Data Mining Series (ICDM '15), pp. 409–418, Atlantic City, NJ, USA, 2015.
  32. F. Zhang, H. Chen, and H. Jin, “Piggyback game: efficient event stream dissemination in Online Social Network systems,” in Proceedings of the IEEE 24th International Conference on Network Protocols (ICNP '16), pp. 1–10, Singapore, November 2016. View at Publisher · View at Google Scholar
  33. L. Wang, Z. Zhou, and W. Wu, “Game theory-based model for maximizing SSP utility in cognitive radio networks,” Computer Communications, vol. 86, pp. 29–39, 2016. View at Publisher · View at Google Scholar · View at Scopus
  34. Q. Zhao, “Data acquisition and simulation of natural phenomena,” Science China Information Sciences, vol. 54, no. 4, pp. 683–716, 2011. View at Publisher · View at Google Scholar · View at Scopus
  35. P. D. Taylor and L. B. Jonker, “Evolutionarily stable strategies and game dynamics,” Mathematical Biosciences, vol. 40, no. 1-2, pp. 145–156, 1978. View at Publisher · View at Google Scholar · View at MathSciNet
  36. S. Goyal, H. Heidari, and M. Kearns, “Competitive contagion in networks,” Games and Economic Behavior, 2014. View at Publisher · View at Google Scholar · View at Scopus
  37. B. Gu and V. S. Sheng, “A robust regularization path algorithm for ν-support vector classification,” IEEE Transactions on Neural Networks and Learning Systems, pp. 1–8, 2016. View at Publisher · View at Google Scholar · View at Scopus
  38. X. Wen, L. Shao, Y. Xue, and W. Fang, “A rapid learning algorithm for vehicle classification,” Information Sciences, vol. 295, pp. 395–406, 2015. View at Publisher · View at Google Scholar
  39. Z. Fu, X. Sun, S. Ji, and G. Xie, “Towards efficient content-aware search over encrypted outsourced data in cloud,” in Proceedings of the 35th Annual IEEE International Conference on Computer Communications (INFOCOM '16), pp. 1–9, IEEE, San Francisco, Calif, USA, April 2016. View at Publisher · View at Google Scholar · View at Scopus
  40. Y. Chen, C. Hao, W. Wu, and E. Wu, “Robust dense reconstruction by range merging based on confidence estimation,” Science China Information Sciences, vol. 59, no. 9, Article ID 092103, 11 pages, 2016. View at Publisher · View at Google Scholar · View at Scopus
  41. H. Li, K. Wu, Q. Zhang, and L. M. Ni, “CUTS: improving channel utilization in both time and spatial domain in WLANs,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp. 1413–1423, 2014. View at Publisher · View at Google Scholar · View at Scopus