Mobile Computing Handbook

ISBN: 9780849319716 出版年:2004 页码:1,068 CRC Press

知识网络
知识图谱网络
内容简介

INTRODUCTION AND APPLICATIONS OF MOBILE COMPUTING Wearable Computing,A. Smailagic and D.P. Siewiorek Developing Mobile Applications: A Lime Primer,G.P. Picco, A.L. Murphy, and G.-C. Roman Pervasive Application Development: Approaches and Pitfalls,G. Banavar, N. Cohen, and D. Soroker ISAM, Joining Context-Awareness and Mobility to Building Pervasive Applications,I. Augustin, A. Correa Yamin, J.L. Victoria Barbosa, L. Cavalheiro da Silva, R. Araujo Real, G. Frainer, G.G. Honrich Cavalheiro, and C.F. Resin Geyer Integrating Mobile Wireless Devices into the Computational Grid,T. Phan, L. Huang, N. Ruiz, and R. Bagrodia Multimedia Messaging Service, S.A. Ahson LOCATION MANAGEMENT A Scheme for Nomadic Hosts Location Management Using DNS,R.S. Khurana, H. El-Rewini, and I. Mahgoub Location Management Techniques for Mobile Computing Environments,R. Subrata and A.Y. Zomaya Locating Mobile Objects,E. Pitoura, G. Samaras, and G. Kastidou Dependable Message Delivery to Mobile Units,A.L. Murphy, G.-C. Roman, and G. Varghese LOCATION-BASED SERVICES Location-Dependent Query Processing in Mobile Computing, A.Y. Seydim and M. H. Dunham Simulation Models and Tool for Mobile Location-Dependent Information Access, U. Kubach, C. Becker, I. Stepanov, and J. Tian Context-Aware Mobile Computing, Dr. R. Jana and Dr. Y.-F. Chen Mobile Agent Middlewares for Context-Aware Applications, P. Bellavista, D. Bottazzi, A. Corradi, R. Montanari, and S. Vecchi CACHING STRATEGIES Cache Management in Wireless and Mobile Computing Environments. Y. Du and S.K.S. Gupta Cache Invalidation Schemes in Mobile Environments, E. Chan, J.C.H. Yuen, and K.-Y. Lam Hoarding in Mobile Computing Environments, Y. Saygin Power-Aware Cache Management in Mobile Environments, G. Cao Energy Efficient Selective Cache Invalidation, K.-L. Tan MOBILE AND AD HOC WIRELESS NETWORKS I Self-Policing Mobile Ad Hoc Networks, S. Buchegger and J.-Y.s Le Boudec Securing Mobile Ad Hoc Networks, P. Papadimitratos and Z.J. Haas Ad Hoc Network Security, H. Yang, H. Luo, J. Kong, F. Ye, P. Zerfos, S. Lu, and L. Zhang Modeling Distributed Applications for Mobile Ad Hoc Networks Using Attributed Task Graphs, P. Basu, W. Ke, and T.D.C. Little Medium Access Control Mechanisms in Mobile Ad Hoc Networks,C. Yu, B. Lee, S. Kalubandi, and M. Kim MOBILE AND AD HOC WIRELESS NETWORKS II Quality of Service Routing in Mobile Ad Hoc Networks: Past and Future, J.N. Al-Karaki and A.E. Kamal Issues in Scalable Clustered Network Architecture for Mobile Ad Hoc Networks, B. Lee, C. Yu, and S. Moh Routing and Mobility Management in Wireless Ad Hoc Networks, R. Sankar Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation, W. Lou and J. Wu Energy-Efficient Wireless Networks, I. Cardei and D.-Z. Du POWER MANAGEMENT Power Management for Mobile Computers, T.L. Martin, D.P. Siewiorek, A. Smailagic, and J. Warren Power Awareness and Management Techniques, A. Abukmail and A. (Sumi) Helal Adaptive Algorithmic Power Optimization for Multimedia Workload in Mobile Environments, L. Benini and A. Acquaviva Energy-Aware Web Caching over Hybrid Networks, F. Sailhan and V. Issarny Transmitter Power Control in Wireless Computing, S. Gitzenis and N. Bambos PERFORMANCE AND MODELING A Survey on Mobile Transaction Models, A. Helal, S. Balakrishnan, M. Dunham, and Y. Liu Analytic Mobility Models of PCS Networks, C.-H. Wu Battery Power Management in Portable Devices, V. Sharma and A. Chockalingam SECURITY AND PRIVACY ASPECTS Challenges in Wireless Security: A Case Study of 802.11, N. Borisov Security for Mobile Agents: Issues and Challenges, P. Bellavista, A. Corradi, C. Federici, R. Montanari, and D. Tibaldi Security, Trust, and Privacy in Mobile Computing Environments, L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin

Amazon评论 {{comment.person}}

{{comment.content}}

作品图片
推荐图书