Sciweavers

1030 search results - page 162 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
EUSAI
2004
Springer
15 years 3 months ago
QoS Provision Using Dual RF Modules in Wireless LAN
With the rapid growth of emerging demand and deployment of wireless LAN (WLAN), much of traffic including multimedia traffic is forced to travel over WLAN. Since the legacy IEEE 80...
Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Kyunghun...
PERCOM
2008
ACM
15 years 9 months ago
MAGIC Broker: A Middleware Toolkit for Interactive Public Displays
Large screen displays are being increasingly deployed in public areas for advertising, entertainment, and information display. Recently we have witnessed increasing interest in su...
Aiman Erbad, Michael Blackstock, Adrian Friday, Ro...
81
Voted
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 4 months ago
Study of Best-Effort VoIP Handovers between WLAN and EVDO Networks
The IEEE 802.11 based Wireless LANs (WLANs) have emerged as a viable technology for supporting real-time applications such as Voice over IP (VoIP). Even the Personal Digital Assist...
Amit P. Jardosh, Rajeev Koodli, Tat Chan
ECIS
2001
14 years 11 months ago
Evaluating WAP News Sites: The Webqual/m Approach
This paper reports on the evaluation of wireless Internet news sites using the WebQual/m instrument. From initial application in the domain of traditional Internet Web sites, the ...
Stuart J. Barnes, Kenny Liu, Richard T. Vidgen
AUTONOMICS
2008
ACM
14 years 11 months ago
Building multicast trees in ad-hoc networks
Multicast trees are used in a variety of applications, such as publish/subscribe systems or content distribution networks. Existing algorithms for ad-hoc networks typically produc...
Raphaël Kummer, Peter G. Kropf, Pascal Felber