• Nenhum resultado encontrado

[PDF] Top 20 Data Dissemination in Mobile Computing Environment

Has 10000 "Data Dissemination in Mobile Computing Environment" found on our website. Below are the top 20 most common "Data Dissemination in Mobile Computing Environment".

Data Dissemination in Mobile Computing Environment

Data Dissemination in Mobile Computing Environment

... for data scheduling is flat ...all data items are broadcast in a round robin ...every data item is the same, ...poor in terms of average access time when data access ... See full document

4

The Improvement and Performance of Mobile Environment using Both Cloud and Text Computing

The Improvement and Performance of Mobile Environment using Both Cloud and Text Computing

... ubiquitos mobile devices using both cloud and text ...technologies in small and large enterprise networks and on the ...process in any form of computing as we need to really share the ... See full document

7

Practical Isolated Searchable Encryption in a Trusted Computing Environment

Practical Isolated Searchable Encryption in a Trusted Computing Environment

... Cloud computing keeps growing, its users are aware and cite security guaran- tees as their main concern when adopting such services (Columbus, 2017a; Meeker, ...cause; in recent years, several cases of ... See full document

144

The Improvement and Performance of Mobile Environment Using Both Cloud and Text Computing

The Improvement and Performance of Mobile Environment Using Both Cloud and Text Computing

... fundamental data types in Text-Batch: table or indexed table (borrowed from database ...records in a 730 table follow the same schema, and each record may contain several fields ...other data ... See full document

7

An Application Model for Pervasive Computing

An Application Model for Pervasive Computing

... Specially, our vision can be summarized in the following precepts: 1. A device is a portal into an application/data space. 2. An application is a means by which a user performs a task.3. The ... See full document

5

Performance Evaluation of Smart Decision Support Systems on Healthcare

Performance Evaluation of Smart Decision Support Systems on Healthcare

... Ph.D. in CSE from SMVD University, Katra (J & K), India, and was a postdoctoral research fellow in Coventry University, Coventry, ...Professor in the Department of Computer Science and ... See full document

161

Ubiquitous computing approach for mobile health applications

Ubiquitous computing approach for mobile health applications

... Development Tools) plugin. The ADT is designed to include a powerful and integrated environment on Android applications. It extends the capabilities of Eclipse to quickly set up new Android projects, debug ... See full document

106

Service Oriented Sensor Networks for Mobile Computing

Service Oriented Sensor Networks for Mobile Computing

... resource-constrained mobile devices by powerful proxy ...Applications in the second category will be used on multiple platforms: a user will have a version of his/her favorite word processor executing on a ... See full document

7

Data Confidentiality in Mobile Ad hoc Networks

Data Confidentiality in Mobile Ad hoc Networks

... of mobile nodes that communicate over wireless links without any central control on a peer-to-peer ...own data and also their neighbours’ data by sending and receiving packets to and from other nodes ... See full document

12

How can virgin mobile differentiate itself by focusing on mobile data in collaboration with virgin mobile

How can virgin mobile differentiate itself by focusing on mobile data in collaboration with virgin mobile

... stakeholders in an organization – managers, customers, suppliers, academics and industry experts (Heidjen, ...component in order to understand what trends are likely to change the ...changes in ... See full document

45

Vehicle Assisted Data Delievery Technique To Control Data Dissemination In Vehicular AD - HOC Networks Vanets

Vehicle Assisted Data Delievery Technique To Control Data Dissemination In Vehicular AD - HOC Networks Vanets

... of mobile ad hoc network. In the case of the VANETs it is possible to strategically place assess point along the side of the road and in turn allow vehicles access the service available from the ... See full document

6

A BROADCAST BASED ROUTING PROTOCOL FOR INTER-CLUSTER DATA DISSEMINATION IN VEHICULAR COMMUNICATION

A BROADCAST BASED ROUTING PROTOCOL FOR INTER-CLUSTER DATA DISSEMINATION IN VEHICULAR COMMUNICATION

... Infrastructure based routing: Wu et al. (2013) proposed a moving direction and destination location based routing (MEDAL) algorithm, which takes the moving directions of vehicles and the destination location to select a ... See full document

8

Security Risk Assessment of Cloud Computing Services in a Networked Environment

Security Risk Assessment of Cloud Computing Services in a Networked Environment

... mitigation in their organizations ...Risks in the CC context that is based on six distinct risk dimensions grounded on an extensive literature review, Q-sorting, and expert ...of data collected from ... See full document

12

A Computing and Storage Server Infrastructure for a Mobile Application

A Computing and Storage Server Infrastructure for a Mobile Application

... the dissemination of smartphones, digital photography has become a highly acces- sible ...activity. In the past, film size limited the number of photos that could be taken, which made us choose our motives ... See full document

73

Securing Data Transfer in Cloud Environment

Securing Data Transfer in Cloud Environment

... provider, in turn, also needs to enforce strict security policies, which in turn requires additional trust in the ...be in place. Cloud computing can mean different things to different ... See full document

5

On Some Security Issues in Pervasive Computing - Light Weight Cryptography

On Some Security Issues in Pervasive Computing - Light Weight Cryptography

... paths in which we can resolve them, One deals with the network security and system security ...implemented in the architecture of the system so as to avoid such security risks and much more such protocols ... See full document

7

Distributed Computing in a Cloud of Mobile Phones

Distributed Computing in a Cloud of Mobile Phones

... method in Table ...the data to be pro- cessed, by obtaining the corresponding pre-processed DataItems, if they exist, or in case they do not, uses the preProcess method to pre process ...occurs ... See full document

110

Dynamic Channels: A New Methodology for Mobile Computing Applications

Dynamic Channels: A New Methodology for Mobile Computing Applications

... for mobile applications and information dissemination, provided that channel models are extended to capture mobility ...requirements. In addition, we outlined a systematic software development ... See full document

22

Distance Based Asynchronous Recovery Approach In Mobile Computing Environment

Distance Based Asynchronous Recovery Approach In Mobile Computing Environment

... of mobile hosts (MH), the task of logging is assigned to the mobile support stations ...the mobile hosts are routed through the mobile support stations, message logging by the mobile ... See full document

7

Context-Aware Personalization Environment for Mobile Computing

Context-Aware Personalization Environment for Mobile Computing

... but in reality a lot of different approaches were proposed with limited success and different ...acted in the described ...resulting in an increase in input, which also increases the level of ... See full document

122

Show all 10000 documents...