Sciweavers

512 search results - page 22 / 103
» Pervasive data access in wireless and mobile computing envir...
Sort
View
ISICT
2003
14 years 11 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
ICECCS
2008
IEEE
183views Hardware» more  ICECCS 2008»
15 years 4 months ago
Ambient Intelligence Applications: Introducing the Campus Framework
A challenge for pervasive computing is the seamless integration of computer support with users’ activities in a very dynamic setting, with deep human and resource mobility. Port...
Amal El Fallah-Seghrouchni, Karin Breitman, Nicola...
SELMAS
2004
Springer
15 years 3 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
AINA
2008
IEEE
15 years 4 months ago
Dynamic Cache Invalidation Scheme in IR-Based Wireless Environments
Traditional cache invalidation schemes are not suitable to be employed in wireless environments due to the affections of mobility, energy consumption, and limited bandwidth. Cache ...
Yeim-Kuan Chang, Yi-Wei Ting, Tai-Hong Lin
94
Voted
PERCOM
2006
ACM
15 years 9 months ago
Context-aware Provision of Advanced Internet Services
The pervasive and mobile computing scenario is characterized by the high heterogeneity of devices used to access services, and by frequent changes in the user's context. In t...
Raffaella Grieco, Delfina Malandrino, Francesca Ma...