2013
DOI: 10.1145/2428556.2428573
|View full text |Cite
|
Sign up to set email alerts
|

Mobile social networking applications

Abstract: They deliver the right social service to the right user anytime, anyplace, without divulging personal data.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0
1

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(34 citation statements)
references
References 11 publications
0
33
0
1
Order By: Relevance
“…This class, named TestNearTweet, overloads two methods guiIn and guiOut that specifies how a virtual user provides input to the application and test output from the application. For the NearTweet application, input is performed by typing text in the input panel and pressing a button (lines 11-14), and output validation requires testing either the status panel (lines [22][23][24][25] or the output panel (lines [26][27][28][29]. Because the input and output places are parameterized by the T-Net graph, the tester methods receive an identifier (id for short) to differentiate in/out operations, and a parameter list of values to be used by the tester methods.…”
Section: T-net Specificationmentioning
confidence: 99%
See 1 more Smart Citation
“…This class, named TestNearTweet, overloads two methods guiIn and guiOut that specifies how a virtual user provides input to the application and test output from the application. For the NearTweet application, input is performed by typing text in the input panel and pressing a button (lines 11-14), and output validation requires testing either the status panel (lines [22][23][24][25] or the output panel (lines [26][27][28][29]. Because the input and output places are parameterized by the T-Net graph, the tester methods receive an identifier (id for short) to differentiate in/out operations, and a parameter list of values to be used by the tester methods.…”
Section: T-net Specificationmentioning
confidence: 99%
“…This capability has prompted new mobile applications that leverage occasional encounters of users in various social contexts, e.g., for mobile social networking [22,13,9], content sharing [15,12], mobile ad-hoc gaming [5,16], and more [19,21,31,24]. Specialized middleware [3, 32,25,18,7] has also been produced to facilitate the development of such applications.…”
Section: Introductionmentioning
confidence: 99%
“…Innentől egy-egy hely az ott jelenlévőkkel és az ott a zajló eseményekkel együtt címkézhető, az így keletkező információk helyhez kötötten termelődnek tovább, big data elemzéssel pedig visszacsatolhatók például egy szolgáltatás frissítéséhez. Minden lehetőséges előny mellett ezek a szolgáltatások komoly adatbiztonsági kér-déseket is felvetnek az interaktív kommunikációban (Jabeur, Zeadally, Saye 2013). Az e-részvételtől a mobil részvétel felé mozdul el az online jelenlét (de Reuver, Stein, Hampe 2013), ami számos jogi és morális kérdést vet fel.…”
Section: úJ Média éS a Valóságérzékelés Digitális Kiterjesztéseunclassified
“…Enterprises and Government Agencies Though in early stages, social networking technologies and mobile social applications are gaining wide adoption in enterprises and government agencies to engage with business partners, customers, prospects and the general public [6], [8], [9], [11], [13], [22], [23], [25], [28]- [30], [36], [38], [40], [41], [43], [46], [47], [49], [52], [53], [59], [69], [73], [82], [83], [92]. Gartner presents a full list of potential business applications of social software in its hype cycle report, such as social customer relationship management, social commerce, social shopping, social learning, social network payment, social business process management and social government management [40].…”
Section: Applications Of Social Networking Technologies Inmentioning
confidence: 99%
“…Conceptual model of enterprise application system, Social CRM System enabled by social networking and web 2.0 is given in [43]. Comprehensive surveys on mobile social networks and applications are conducted by N. Kayastha et al and N. Jabeur et al from the perspectives of application classifications, network architectures, and protocol design, privacy and trust control issues [30], [25].…”
Section: Applications Of Social Networking Technologies Inmentioning
confidence: 99%