Sciweavers

1030 search results - page 184 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
ISCC
2006
IEEE
109views Communications» more  ISCC 2006»
15 years 3 months ago
Priority Oriented Adaptive Polling for wireless LANs
Today’s wireless LANs require efficient integration of multimedia and traditional data traffic. Multimedia network applications are time-bounded and have stricter QoS demands. T...
T. D. Lagkas, Georgios I. Papadimitriou, Petros Ni...
ICWMC
2006
IEEE
15 years 3 months ago
Power Characterization of a Bluetooth-based Wireless Node for Ubiquitous Computing
Abstract— Ubiquitous computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To furt...
Juan-Carlos Cano, José-Manuel Cano, Eva Gon...
IM
1997
14 years 11 months ago
The Hollowman: An Innovative ATM Control Architecture
The current implementation of out-of-band control in ATM networks inhibits their successful exploitation. The confusion in signalling protocols between application services and th...
Sean Rooney
MHCI
2009
Springer
15 years 2 months ago
Glancephone: an exploration of human expression
In this paper, we describe the design and ethnographic study of a phone developed so as to allow people to glance at each other, rather than simply message or voice call. Glanceph...
Richard H. R. Harper, Stuart Taylor
PERCOM
2010
ACM
15 years 1 months ago
Adaptive deployment for pervasive data gathering in connectivity-challenged environments
—Some current and future pervasive data driven applications must operate in ”extreme” environments where endto-end connectivity cannot be guaranteed at all times. In fact, it...
Tahiry Razafindralambo, Nathalie Mitton, Aline Car...