Sciweavers

175 search results - page 20 / 35
» Differentiated Services in the GPRS Wireless Access Environm...
Sort
View
PERCOM
2005
ACM
15 years 11 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
CONEXT
2008
ACM
15 years 1 months ago
Waiting-line auction for WiFi pricing
We model the relationship between a WLAN access point (AP) and a paying mobile station (MS) as a waiting-line auction [1] in which clients bids for transmission using the length o...
Tao Han, Liang Ma, Yuan'an Liu
CONEXT
2009
ACM
15 years 25 days ago
Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones
We consider the problem of providing ubiquitous yet affordable Internet connectivity to devices at home, at work, and on the move. In this context, we take advantage of two signif...
Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, ...
DOA
2001
132views more  DOA 2001»
15 years 1 months ago
Mobile RMI: Supporting Remote Access to Java Server Objects on Mobile Hosts
Java Remote Method Invocation (RMI) is a specification for building distributed object-oriented applications. RMI was designed primarily for use in conventional, wired computing e...
Tom Wall, Vinny Cahill
PDP
2003
IEEE
15 years 5 months ago
QoS-aware Accounting in Mobile Computing Scenarios
The enlarging market of portable devices and wireless networks stimulates the provisioning of mobilityenabled Internet services with differentiated levels of Quality of Service (Q...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi