Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2017
IoTVar to transparently handle interactions between applications and IoT platforms
- Clément Courtais,
- Chantal Taconet,
- Denis Conan,
- Sophie Chabridon,
- Porfírio Gomes,
- Everton Cavalcante,
- Thaís Batista
M4IoT '17: Proceedings of the 4th Workshop on Middleware and Applications for the Internet of ThingsPages 7–10https://doi.org/10.1145/3152141.3152390The Internet of Things (IoT) paradigm enables the development of new kinds of mass market applications that benefit from environment data collected by sensors. Because of the huge number of objects encompassed by the IoT, their impermanence and their ...
- research-articleNovember 2015
A Load Management Algorithm For Wireless Mesh Networks
IPAC '15: Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced CommunicationArticle No.: 46, Pages 1–6https://doi.org/10.1145/2816839.2816875The WMN (Wireless Mesh Network) is a new emerging technology that can render the field of industrial network more efficient and profitable. Due to its versatility that allows a flexible configuration, this kind of network is commonly considered as a ...
- research-articleDecember 2012
Citywide mobile internet access using dense urban WiFi coverage
UrbaNe '12: Proceedings of the first workshop on Urban networkingPages 31–36https://doi.org/10.1145/2413236.2413244We investigate if it is feasible to use the WiFi coverage in urban areas for mobile Internet access and which type of applications can benefit from the Internet access provided by the already deployed WiFi Access Points (APs). Nowadays, most smartphones ...
- research-articleOctober 2012
Near real-time medical data dissemination in m-Health
MEDES '12: Proceedings of the International Conference on Management of Emergent Digital EcoSystemsPages 67–74https://doi.org/10.1145/2457276.2457290The health sector is one of the primary beneficiaries of the smartphone and tablet boom. These devices are employed by the healthcare professionals to facilitate varying forms of healthcare delivery known as m-Health. But more specifically, these ...
- research-articleDecember 2011
A viable upload acceleration service for mobile devices
CoNEXT '11 Student: Proceedings of The ACM CoNEXT Student WorkshopArticle No.: 9, Pages 1–2https://doi.org/10.1145/2079327.2079336As smart phones and mobile devices are proliferating, the traffic volume generated by them is growing drastically these days [1]. Due to these devices are often connected to WiFi access points (APs) for the first/last mile accesses to the Internet, WiFI ...
- ArticleJuly 2011
Improving access control for mobile consumers of services by use of context and trust within the call-stack
UMAP'11: Proceedings of the 19th international conference on Advances in User ModelingPages 256–267https://doi.org/10.1007/978-3-642-28509-7_24Access control is a key issue in the deployment of systems within corporations. To comply with legal and business requirements and to prevent unauthorized access, the identification and authentication of all users is required. This is typically achieved ...
- ArticleDecember 2007
Constructing Efficient Cache Invalidation Schemes in Mobile Environments
SITIS '07: Proceedings of the 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based SystemPages 281–288https://doi.org/10.1109/SITIS.2007.133Cache invalidation is an effective approach to maintaining data consistency between the server and mobile clients in a mobile environment. This paper presents two new cache invalidation schemes which are designed according to the real situations and are ...
- articleSeptember 2004
Content adaptivity in wireless web access
International Journal of Mobile Communications (IJMC), Volume 2, Issue 3Pages 260–270https://doi.org/10.1504/IJMC.2004.005164While the demand for wireless access to web-based systems increases, it becomes apparent that the design of most systems does not support the use of small screen end-devices such as PDAs or mobile phones. However, enabling wireless access should not ...
- articleNovember 2003
Video transmission adaptation on mobile devices
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 49, Issue 10-11Pages 475–484https://doi.org/10.1016/S1383-7621(03)00091-2The development of multimedia streaming over wireless network is facing a lot of challenges. Taking into account mobility and highly variable bandwidth are the two major ones. Using scalable video content can solve the variable bandwidth problem only if ...
- ArticleDecember 2000
Real-time transaction processing with partial validation at mobile clients
RTCSA '00: Proceedings of the Seventh International Conference on Real-Time Systems and ApplicationsPage 473Conventional concurrency control protocols are inapplicable in mobile computing environments due to a number of constraints of wireless communication. In this paper, we design a protocol for processing mobile transactions. The protocol can detect data ...
- ArticleSeptember 2000
An Adaptive AVI-Based Cache Invalidation Scheme for Mobile Computing Systems
DEXA '00: Proceedings of the 11th International Workshop on Database and Expert Systems ApplicationsPage 155In a mobile computing system, caching data items at the mobile clients is important to reduce the data access delay in an unreliable and low bandwidth mobile network. However, efficient methods must be used to ensure the coherence between the cached ...
- ArticleMay 1997
The Role of Trace Modulation in Building Mobile Computing Systems
We put forth the view that trace modulation is an indispensable technique for building and evaluating mobile computing systems. The essence of our solution is transparent, real-time, trace-driven emulation of a target network. Although conceptually ...
- ArticleAugust 1996
Handling Multimedia Data for Mobile Computers
Abstract: Mobile clients have unusual needs for sending and receiving multimedia data. The traditional client/server paradigm does not take into account variable network conditions; thus traditional client/server applications have no capability of ...