Results 1 to 10 of about 684,644 (338)
Mobile Computing, Mobile Networks [PDF]
The development of small and powerful computing devices and wireless, mobile communication systems offer a great variety of new applications. The design and analysis of efficient and robust mobile networks impose new challenges, which necessitate a complementary use of technology and algorithms.
Friedhelm Meyer auf der Heide+3 more
openalex +2 more sources
Distributed and Mobile Computing [PDF]
Of course we are still some way from achieving this ideal, and it is still easier and cheaper to compute in the conventional manner at a desktop using only the data, software, and hardware present in the workstation. Wireless communication is still more expensive, and more constrained by bandwidth, at least in those areas of the developed world that ...
Michael F. Goodchild+3 more
openalex +2 more sources
>Quality-time-complexity universal intelligence measurement [PDF]
Purpose - With development of machine learning techniques, the artificial intelligence systems such as crowd networks are becoming more and more autonomous and smart. Therefore, there is a growing demand to develop a universal intelligence measurement so
Wen Ji+5 more
doaj +3 more sources
UbiMeta: A Ubiquitous Operating System Model for Metaverse
The metaverse signifies the amalgamation of virtual and tangible realms through human-computer interaction. The seamless integration of human, cyber, and environments within ubiquitous computing plays a pivotal role in fully harnessing the metaverse’s ...
Yiqiang Chen+10 more
doaj +1 more source
Mobile Computational Photography: A Tour [PDF]
The first mobile camera phone was sold only 20 years ago, when taking pictures with one's phone was an oddity, and sharing pictures online was unheard of. Today, the smartphone is more camera than phone. How did this happen? This transformation was enabled by advances in computational photography—the science and engineering of making great images from
Peyman Milanfar+3 more
openaire +4 more sources
Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing.
Dustin M. Mink+6 more
doaj +1 more source
Permission delegation in access control provides the subject with a second method to obtain object permissions in addition to permission granting. It is especially applicable when the owner and manager of the object are inconsistent. With the development
Jinshan Shi, Ru Li, Wenhan Hou
doaj +1 more source
Collaborative Mobile-To-Mobile Computation Offloading [PDF]
It is common practice for mobile devices to offload computationally heavy tasks off to a cloud, which has greater computational resources. In this paper, we consider an environment in which computational offloading is made among collaborative mobile devices.We call such an environment a mobile device cloud (MDC).
Mohammad Abu Snober+4 more
openaire +3 more sources
Smart Contract-Based Trusted Content Retrieval Mechanism for NDN
Named Data Networking (NDN) is a new clean-slate architecture for the future Internet. Efficient content retrieval is the original intention of NDN design. The content retrieval process driven by content consumers in NDN includes the following challenges,
Tingting Song+4 more
doaj +1 more source
Statistical Multiplexing Gain Analysis of Processing Resources in Centralized Radio Access Networks
The next generation of wireless networks faces the challenges of the explosion of mobile data traffic, the associated power consumption, and operation cost.
Zongshuai Zhang+7 more
doaj +1 more source