Sciweavers

MOBICOM
1997
ACM
13 years 8 months ago
Web Browsing in a Wireless Environment: Disconnected and Asynchronous Operation in ARTour Web Express
In a previous paper [elided], we described ARTour Web Express, a software system that makes it possible to run World Wide Web applications over wide-area wireless networks. Our ea...
Henry Chang, Carl D. Tait, Norman H. Cohen, Moshe ...
MOBICOM
1997
ACM
13 years 8 months ago
Dynamic Network Reconfiguration Support for Mobile Computers
Hot swapping technology combined with pervasive heterogeneous networks empowers mobile laptop users to select the best network device for their current environment. Unfortunately,...
Jon Inouye, Jim Binkley, Jonathan Walpole
MOBICOM
1997
ACM
13 years 9 months ago
A Public-Key Based Secure Mobile IP
John Zao, Stephen T. Kent, Joshua Gahm, Gregory Tr...
MOBICOM
1997
ACM
13 years 9 months ago
Reliable Broadcast in Mobile Multihop Packet Networks
We describe a reliable broadcast protocol for mobile multihop packet radio networks. The reliable broadcast service ensures that all the hosts in a group deliver the same set of m...
Elena Pagani, Gian Paolo Rossi
MOBICOM
1997
ACM
13 years 9 months ago
Composable ad-hoc Mobile Services for Universal Interaction
This paperintroduces the notion of “universalinteraction,” allowing a device to adapt its functionality to exploit services it discovers as it moves into a new environment. Us...
Todd D. Hodes, Randy H. Katz, Edouard Servan-Schre...
MOBICOM
1997
ACM
13 years 9 months ago
Log-Time Algorithms for Scheduling Single and Multiple Channel Data Broadcast
With the increasing popularity of portable wireless computers, mechanisms to efficiently transmit information to such clients are of significant interest. The environmentundercons...
Sohail Hameed, Nitin H. Vaidya
MOBICOM
1997
ACM
13 years 9 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail