Dmitry Namiot
Moscow State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dmitry Namiot.
arXiv: Networking and Internet Architecture | 2013
Dmitry Namiot; Manfred Sneps-Sneppe
Many of modern location-based services are often based on an area or place as opposed to an accurate determination of the precise location. Geofencing approach is based on the observation that users move from one place to another and then stay at that place for a while. These places can be, for example, commercial properties, homes, office centers and so on. As per geofencing approach they could be described (defined) as some geographic areas bounded by polygons. It assumes users simply move from fence to fence and stay inside fences for a while. In this article we replace geo-based boundaries with network proximity rules. This new approach let us effectively deploy indoor location based services and provide a significant energy saving for mobile devices comparing with the traditional methods.
wired/wireless internet communications | 2013
Manfred Sneps-Sneppe; Dmitry Namiot
This paper describes a new approach to local messaging. Our application combines passive monitoring for smart phones and cloud based messaging for mobile OS (operational system). Passive monitoring can determine the location of mobile subscribers (mobile phones, actually) without the active participation of the users. Mobile users do not need to mark own location on social networks (check-in), they do not need to run on their phones the location track applications. In the same time, Cloud Messaging allows interested parties to directly deliver their information to mobile users who find themselves near a selected point. This is the main content of the service - how to combine the monitoring and notifications.
NEW2AN'11/ruSMART'11 Proceedings of the 11th international conference and 4th international conference on Smart spaces and next generation wired/wireless networking | 2011
Dmitry Namiot; Manfred Sneps-Sneppe
This paper describes a new mobile service: customized check-ins. This service lets any business provide a customized form for mobile users that allow them mark (describe) business-related events in the social networks. So instead of the traditional check-ins models, introduced by the communication services, this service introduces business-oriented check-ins. For the business this service introduces a new way for advertising in the social networks. And this advertising model does not require any intermediate service. For the consumers this service introduces a way for exchanging access to the own social graph for some benefits (e.g. gifts, discounts, coupons etc.).
NEW2AN | 2012
Manfred Sneps-Sneppe; Dmitry Namiot
In this paper we describe the current state of open APIs for M2M applications as well as some possible changes and extensions. Our article based on open standards ETSI is going to provide for the rapidly growing M2M market. An open specification, presented as an Application Programming Interface (OpenAPI), provides applications with a rich framework of core network capabilities upon which to build services while encapsulating the underlying communication protocols. OpenAPI is a portable platform for services that may be replicated and ported between different execution environments and hardware platforms. We would like to discuss the possible extensions for ETSI proposals that, by our opinion, let keep telecom development inline with the modern approaches in the web development domain.
next generation mobile applications, services and technologies | 2011
Dmitry Namiot; Manfred Schneps-Schneppe
this paper describes a new model for proactive messages delivery to mobile phones. SpotEx application can use any Wi-Fi access point as presence sensor that could activate delivery for some user-generated messages right to mobile phones. The key idea is how to associate some user-defined messages and Wi-Fi access points. As a result we can build rule-based expert system that describes delivery of user-defined messages depending on visibility of Wi-Fi hotspots.
Archive | 2012
Dmitry Namiot; Manfred Sneps-Sneppe
This paper describes a new model for sharing location info without revealing identity to third party servers. We can describe it as a safe location sharing. Proposed approach splits location info and identity information. Service operates with a special kind of distributed data store, where identity info is always local. It eliminates one of the main concerns with location-based systems – privacy. This article describes a model itself as well as its implementation in the form of HTML5 mobile web application.
International Journal of Space-Based and Situated Computing | 2013
Dmitry Namiot; Manfred Sneps-Sneppe
This paper describes a new approach for using wireless sensors on mobile phones for integrating data from social networks. We describe existing models for integrating sensors and social networks, as well as propose a new practical approach for social context-aware data discovery that uses mobile phone as proximity sensor. Our concept uses new model for location-related statuses (check-ins) based on network proximity rules. And an appropriate mobile service (context-aware browser client for social networks) can present that information to mobile subscribers. As the potential use-cases for the proposed approach we can mention all projects related to hyper-local news data. For example, proximity marketing, Smart City news, indoor information delivery, etc.
arXiv: Databases | 2013
Dmitry Namiot; Manfred Sneps-Sneppe
This paper describes an algorithm for discovery of convoys in database with proximity log. Traditionally, discovery of convoys covers trajectories databases. This paper presents a model for context-aware browsing application based on the network proximity. Our model uses mobile phone as proximity sensor and proximity data replaces location information. As per our concept, any existing or even especially created wireless network node could be used as presence sensor that can discover access to some dynamic or user-generated content. Content revelation in this model depends on rules based on the proximity. Discovery of convoys in historical users logs provides a new class of rules for delivering local content to mobile subscribers.
WiFlex'13 Proceedings of the First international conference on Wireless Access Flexibility | 2013
Manfred Sneps-Sneppe; Dmitry Namiot
This paper introduces a new way of delivering local messages to mobile subscribers. Our application presents a mashup from passive monitoring for smart phones and cloud-based messaging for mobile operational systems. Passive monitoring can detect the presence of mobile phones without active participation from the users. It does not require prior calibration, nor does it require mobile users to mark their own location on social networks (like traditional check-ins). Mobile users do not need to run location track applications on their phones the. At the same time, a production-based expert system built around cloud messaging allows interested parties to directly deliver their custom information to mobile users in proximity.
Automatic Control and Computer Sciences | 2013
Dmitry Namiot; M. Shneps-Shneppe
This paper is devoted to location-based mobile services. The movement (trajectory) data extraction from logs related to network proximity is considered. Usually, this type of pattern extraction (search) relates to trajectory databases containing geoposition information. We consider a model of context-aware computing (a context-aware browser) based on network proximity. A mobile phone is considered as a proximity sensor. The geoposition information is replaced with the network proximity. Any existing or specially created network node can be regarded as a sensor of presence that provides access to dynamically determined network content. The disclosure of the content depends on the set of rules describing the conditions of network’s proximity. An algorithm is given for calculating the trajectories in mobile networks based on information about the network’s proximity.