Sciweavers

686 search results - page 87 / 138
» Supporting Mobile Users in Selecting Target Devices
Sort
View
EDOC
2002
IEEE
15 years 2 months ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
CSE
2009
IEEE
15 years 1 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
GIS
2007
ACM
15 years 10 months ago
Where were we: communities for sharing space-time trails
We consider trails to be a document type of growing importance, authored in abundance as locative technologies become embedded in mobile devices carried by billions of humans. As ...
Scott Counts, Marc Smith
HUC
1999
Springer
15 years 2 months ago
QoS and Context Awareness for Mobile Computing
Systems must provide for mobile applications to be aware of the context in which they are being used. This is necessary to permit adaptation to heterogeneity of hosts and networks...
Dan Chalmers, Morris Sloman
WISE
2003
Springer
15 years 3 months ago
Dynamic Virtual Storage Grid for Mobile Web Access
Advancement in wireless infrastructure for data access through third generation wireless and wi-fi technologies makes it possible to use mobile devices for various activities and ...
Harish Kammanahalli, Srividya Gopalan, V. Sridhar