Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
In our current connected wireless world, mobile devices are enabled to use various networking facilities. Although this enables mobile users to communicate any time and any place, ...
New challenging deployment scenarios are accommodating portable devices with limited and heterogeneous capabilities that roam among wireless access localities during service provis...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
In a multidatabase environment with mobile computers involved, the nature of computing is such that the user may not wait for the submitted global transaction to complete before d...
This paper examines the location traces of 489 users of a location sharing social network for relationships between the users' mobility patterns and structural properties of ...
Justin Cranshaw, Eran Toch, Jason I. Hong, Aniket ...