Results 171 to 180 of about 80,052 (216)
Some of the next articles are maybe not open access.
A Middleware for Mobile Edge Computing
IEEE Cloud Computing, 2017Telecom operators have recently started to deploy massive computing and storage resources at the very edge of their access networks, hence evolving their infrastructures into large, distributed, and capillary computing environments, capable of placing applications very close to users and terminals and well-suited to effectively fulfill the challenging ...
Carrega A. +3 more
openaire +2 more sources
ACM SIGMOBILE Mobile Computing and Communications Review, 2010
In the inaugural issue of MC2R in April 1997 [24], I highlighted the seminal influence of mobility in computing. At that time, the goal of "information at your fingertips anywhere, anytime" was only a dream. Today, through relentless pursuit of innovations in wireless technology, energy-efficient portable hardware and adaptive software, we have largely
openaire +3 more sources
In the inaugural issue of MC2R in April 1997 [24], I highlighted the seminal influence of mobility in computing. At that time, the goal of "information at your fingertips anywhere, anytime" was only a dream. Today, through relentless pursuit of innovations in wireless technology, energy-efficient portable hardware and adaptive software, we have largely
openaire +3 more sources
A Notation and Logic for Mobile Computing
Formal Methods in System Design, 2002zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gruia-Catalin Roman, Peter J. McCann
openaire +2 more sources
Going mobile [mobile-computing networks]
IEEE Circuits and Devices Magazine, 1998Discusses virtual versus physical process-migration strategies in modeling mobile-computing networks. Both VPM and PPM play useful and effective roles in the modeling and simulation of real-world, mobile-computing networks. While PPM is a more accurate model of reality, by its very nature, VPM helps realize the modeling of networks with large numbers ...
Sumit Ghosh, Kwun Han
openaire +2 more sources
Teaching mobile computing and mobile security
2016 IEEE Frontiers in Education Conference (FIE), 2016Due to the popularity of mobile devices, it is important to teach mobile computing and security to students in colleges and universities. This paper describes eight course modules on mobile computing and security we developed that could be integrated into a computer science curriculum. These course modules were presented at a faculty workshop. Workshop
Xiaohong Yuan +10 more
openaire +2 more sources
Mobility: a VPN perspective [mobile computing]
The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002., 2004Mobile computing is becoming increasingly important due to the rise in the number of portable computers and the desire to have continuous network connectivity to the Internet irrespective of the physical location of the node. Mobile IP, the more popular global mobility solution, was designed to support mobility of a single host.
Ravi Pendse +3 more
openaire +2 more sources
Mobility in Membrane Computing [PDF]
Membrane computing is part of natural computing, being a rule-based formalism inspired by biological cells. The basic model of membrane computing is usually called transition membrane systems. When membrane systems are considered as computing devices, two main research directions are considered: their computational power in comparison with the ...
Bogdan Aman, Gabriel Ciobanu
openaire +1 more source
2011
The proliferation of the capable mobile devices has given the opportunity to utilize these devices for various purposes. The mobile devices being used as a Web portal is its short-term use as these devices have added many features and facility that does not only facilitate communication, but also adds to the huge computing power put together.
openaire +1 more source
The proliferation of the capable mobile devices has given the opportunity to utilize these devices for various purposes. The mobile devices being used as a Web portal is its short-term use as these devices have added many features and facility that does not only facilitate communication, but also adds to the huge computing power put together.
openaire +1 more source
Atomicity implementation in mobile computing
Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, 1999Distributed systems using mobile computing do not have the traditional ACID properties (Atomicity, Consistency, Isolation and Durability), and, therefore, consistency problems may occur. These problems may be managed by using semantic ACID properties, i.e.
openaire +3 more sources
Mobility Management in Mobile Computing and Networking Environments
2009This chapter analyzes and proposes some mobility management models and schemes by taking into account their capability to reduce search and location update costs in wireless mobile networks. The first model proposed is called the built-in memory model; it is based on the architecture of the IS-41 network and aims at reducing the home-location-register (
openaire +3 more sources

