• Nenhum resultado encontrado

[PDF] Top 20 Distance Based Asynchronous Recovery Approach In Mobile Computing Environment

Has 10000 "Distance Based Asynchronous Recovery Approach In Mobile Computing Environment" found on our website. Below are the top 20 most common "Distance Based Asynchronous Recovery Approach In Mobile Computing Environment".

Distance Based Asynchronous Recovery Approach In Mobile Computing Environment

Distance Based Asynchronous Recovery Approach In Mobile Computing Environment

... a mobile computing environment with a network consisting of stationary and mobile ...A mobile host can change its location and network connection while computations are being ...the ... See full document

7

Adaptive algorithm for mobile user positioning based on environment estimation

Adaptive algorithm for mobile user positioning based on environment estimation

... users in cellular radio networks, based on the RSS ...RSS in different environments is very difficult, which is caused by different propagation ...Therefore, in the positioning process ... See full document

12

Distributed Computing in a Cloud of Mobile Phones

Distributed Computing in a Cloud of Mobile Phones

... Fog Computing, Mobile Edge Cloud Computing is an idea/concept for which it is difficult to find an unanimous definition, or even a coherent definition among different papers, mainly because it is an ... See full document

110

Data Dissemination in Mobile Computing Environment

Data Dissemination in Mobile Computing Environment

... by mobile clients, thereby adding demand on the scarce uplink bandwidth and consuming more battery power on mobile clients; ii) if the uplink channel is congested, the access latency will become extremely ... See full document

4

Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts

Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts

... algorithm based on movement-based secure checkpointing and logging for mobile computing system is proposed ...The recovery scheme proposed here combines independent checkpointing and ... See full document

17

The potential of PMC and contextualization-enabler technologies

The potential of PMC and contextualization-enabler technologies

... 2011). In pursuit of this goal has been, in many countries, produced legislation in the sense of that inclusion, having been created several working groups , technical and scientific ... See full document

5

A Mobile Healthcare Solution for Ambient Assisted Living Environments

A Mobile Healthcare Solution for Ambient Assisted Living Environments

... but, in this case, the watch performed well because it did not present any problems of flexibility, ergonomics, or discomfort resulting from time extended handling and ...communication in BlueRobin Rx Mode ... See full document

131

Real-time human body detection and tracking for augmented reality mobile applications

Real-time human body detection and tracking for augmented reality mobile applications

... Cut approach. In step (a) is given a seed (bounding box) with four categories: sure foreground, sure background, prob- able foreground and probable ...difference in pixel ...result. In ... See full document

75

Comparative Study of 3G and 4G in Mobile Technology

Comparative Study of 3G and 4G in Mobile Technology

... is in the existence of compliant ...of mobile phone companies are quick to dub their technologies as 4G, such as LTE, WiMax, and UMB, none of these are actually compliant to the specifications set forth by ... See full document

8

Practical Isolated Searchable Encryption in a Trusted Computing Environment

Practical Isolated Searchable Encryption in a Trusted Computing Environment

... I am also deeply grateful to João Leitão, whose advice and friendship were also essen- tial to me, both as a person and as a researcher. I am indebted to all my colleagues and friends at the NOVA LINCS Computer Systems ... See full document

144

The Improvement and Performance of Mobile Environment Using Both Cloud and Text Computing

The Improvement and Performance of Mobile Environment Using Both Cloud and Text Computing

... types in Text-Batch: table or indexed table (borrowed from database ...records in a 730 table follow the same schema, and each record may contain several fields ... See full document

7

An Application Model for Pervasive Computing

An Application Model for Pervasive Computing

... The programming model must allow for the description of abstract user interfaces and abstract services. The structure of the program should be described in terms of tasks and subtasks. The relationship among the ... See full document

5

The Improvement and Performance of Mobile Environment using Both Cloud and Text Computing

The Improvement and Performance of Mobile Environment using Both Cloud and Text Computing

... protocol in a distributed environment, by utilizing a novel striping ...Cloud Computing or utility computing, the omnipresent power of high-speed internet connections and linkages to ... See full document

7

Congestion Control in VANET Using Threshold Based Distance Metric with Time Synchronization Approach

Congestion Control in VANET Using Threshold Based Distance Metric with Time Synchronization Approach

... 7KHREMHFWLYHRIWKHSURSRVHGVFKHPHLVWRPLQLPL]HWKHFKDQQHOFRQJHVWLRQDQGWRUHYRNHPLVEHKDYLQJYHKLFOHV IURP 9$1(7 7KH VFKHPH LQ >@ DLPV IRU WKH UHGXFWLRQ RI FKDQQHO FRQJHVWLRQ 7KH 9$1(7 LQ WKD[r] ... See full document

4

A Hybrid Approach for Scheduling and Replication based on Multi-criteria Decision Method in Grid Computing

A Hybrid Approach for Scheduling and Replication based on Multi-criteria Decision Method in Grid Computing

... second approach (see Figure ...proposed approach in general improve the system performance and scalability and this is mainly due to the strategic placement of replicas created using methods for ... See full document

9

On Some Security Issues in Pervasive Computing - Light Weight Cryptography

On Some Security Issues in Pervasive Computing - Light Weight Cryptography

... security. In a pervasive space where there is no central control and the users are also not ...predetermined. Mobile users expect to access locally hosted resources and services anytime and anywhere, ... See full document

7

SPATIO-TEXTUAL SIMILARITY JOIN

SPATIO-TEXTUAL SIMILARITY JOIN

... . In order to support spatial queries such as “find all objects which intersect a given window”, spatial access methods cluster objects on disks according to their spatial location in ...together in ... See full document

9

Cost Optimization of Cloud Computing Services in a Networked Environment

Cost Optimization of Cloud Computing Services in a Networked Environment

... customers, in order to be more ...takes in consideration cloud bursting as a third option of the two costing ...anomalies in consumer ...fixed-prices-bias in which consumers prefer a fixed ... See full document

10

Velocity-based movement modeling for individual and population level inference.

Velocity-based movement modeling for individual and population level inference.

... conclusions based on the posterior number of partitions K, as this parameter can be sensitive to model departures ...shown in our simulation study (Text S2), but if the true response to a covariate is not ... See full document

17

Implementing and Managing framework for PaaS in Cloud Computing

Implementing and Managing framework for PaaS in Cloud Computing

... Cloud computing yet, however, practitioners are designing and implementing some application examples such as Google App Engine, IBM blue Cloud, Amazon EC2 and Microsoft ...work in this area, many people ... See full document

6

Show all 10000 documents...