Academic literature on the topic 'Mobile wireless computing networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile wireless computing networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile wireless computing networks"

1

Liu, Zhou-zhou, and Shi-ning Li. "Sensor-cloud data acquisition based on fog computation and adaptive block compressed sensing." International Journal of Distributed Sensor Networks 14, no. 9 (September 2018): 155014771880225. http://dx.doi.org/10.1177/1550147718802259.

Full text
Abstract:
The emergence of sensor-cloud system has completely changed the one-to-one service mode of traditional wireless sensor networks, and it greatly expands the application field of wireless sensor networks. As the high delay of large-scale data processing tasks in sensor-cloud, a sensor-cloud data acquisition scheme based on fog computing and adaptive block compressive sensing is proposed. First, the sensor-cloud framework based on fog computing is constructed, and the fog computing layer includes many wireless mobile nodes, which helps to realize the implementation of information transfer management between lower wireless sensor networks layer and upper cloud computing layer. Second, in order to further reduce network traffic and improve data processing efficiency, an adaptive block compressed sensing data acquisition strategy is proposed in the lower wireless sensor networks layer. By dynamically adjusting the size of the network block and building block measurement matrix, the implementation of sensor compressed sensing data acquisition is achieved; in order to further balance the lower wireless sensor networks’ node energy consumption, reduce the time delay of data processing task in fog computing layer, the mobile node data acquisition path planning strategy and multi-mobile nodes collaborative computing system are proposed. Through the introduction of the fitness value constraint transformation processing technique and parallel discrete elastic collision optimization algorithm, the efficient processing of the fog computing layer data is realized. Finally, the simulation results show that the sensor-cloud data acquisition scheme can effectively achieve large-scale sensor data efficient processing. Moreover, compared with cloud computing, the network traffic is reduced by 20% and network task delay is reduced by 12.8%–20.1%.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Xingzhu. "A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing." Wireless Communications and Mobile Computing 2022 (October 19, 2022): 1–12. http://dx.doi.org/10.1155/2022/1499736.

Full text
Abstract:
In order to improve the communication security of wireless mobile network, a collaborative intrusion detection method based on cloud computing is studied. The mobile terminal and the cloud computing platform are connected by the wireless mobile network. The cloud computing platform authentication server adopts a dual server and multifactor authentication scheme for mobile cloud computing to provide authentication services for mobile terminal users. The web server of the cloud computing platform uses the intrusion node detection protocol of the neighbor classification mechanism to provide a communication security protocol for users; Using the HMM algorithm, the intrusion detection module of the computing platform realizes the intrusion detection of wireless mobile network. Finally, using authentication service, security protocol, and intrusion detection module completes the cooperative detection of mobile network intrusion. The experimental results show that this method can realize the cooperative detection of wireless mobile network intrusion, and the detection accuracy is as high as 98%, which ensures the communication security of wireless mobile network.
APA, Harvard, Vancouver, ISO, and other styles
3

Jeong, Young-Sik, Jae Dong Lee, Jeong-Bae Lee, Jai-Jin Jung, and Jong Hyuk Park. "An Efficient and Securem-IPS Scheme of Mobile Devices for Human-Centric Computing." Journal of Applied Mathematics 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/198580.

Full text
Abstract:
Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs) are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS) is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. Them-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application ofm-IPS to the Internet of things (IoT), which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.
APA, Harvard, Vancouver, ISO, and other styles
4

Patalbansi, Vikram, and Dr G. Prasanna Laxmi. "Mobile Cloud Computing Cryptographic Scheme." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 19, 2021): 1148–57. http://dx.doi.org/10.51201/jusst/21/05394.

Full text
Abstract:
The ubiquitous network like Mobile Cloud Computing (MCC) provides a high quality of wireless services depending upon the wireless communication system network security level. And so many researches are carried out by the researcher on security algorithms for wireless communication system constructed in different network reliability. In our proposed thesis paper, on a theoretical basis, we developed the theory of MCC Security Layer Protocol security system in which we used the cryptographic hash function SHA-256 to generate a private key for entities, RC5 encryption, and decryption algorithm, Temporal Key Integrity Protocol (TKIP) generating a dynamic sequential key and CRC-32 checksum to detecting the error in our packets. The MSLP uses the stored symmetric secret key calculated on the basis of the Diffie-Hellman Key sharing scheme to generate keystream for cryptography functions. The secret key stored in the device’s filesystem our database prior to the deployment on Mobile Cloud Computing and remains the same throughout the session of communication. These systems use the dynamic initialization vector to avoid reply attacks and message integrity code calculated on source and destination devices addresses and actual frame contents. In the proposed thesis paper we analyze the security measures at the MSLP level and before transmitting information over the mobile networks, the information is encrypted in the form of frames and at the physical layer, this frame converted into its equivalent radio signals.
APA, Harvard, Vancouver, ISO, and other styles
5

Paliwal, Rakesh, and Irfan Khan. "Design and Analysis of Soft Computing Based Improved Routing Protocol in WSN for Energy Efficiency and Lifetime Enhancement." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 3 (April 13, 2022): 12–24. http://dx.doi.org/10.17762/ijritcc.v10i3.5521.

Full text
Abstract:
Mobile wireless sensor networks have been developed as a result of recent advancements in wireless technologies. Sensors in the network are low-cost and have a short battery life, in addition to their mobility. They are more applicable in terms of the essential properties of these networks. These networks have a variety of uses, including search and rescue operations, health and environmental monitoring, and intelligent traffic management systems, among others. According to the application requirements, mobile wireless sensor nodes are energy limited equipment, so energy conservation is one of the most significant considerations in the design of these networks. Aside from the issues posed by sensor node mobility, we should also consider routing and dynamic clustering. According to studies, cluster models with configurable parameters have a substantial impact on reducing energy usage and extending the network's lifetime. As a result, the primary goal of this study is to describe and select a smart method for clustering in mobile wireless sensor networks utilizing evolutionary algorithms in order to extend the network's lifetime and ensure packet delivery accuracy. For grouping sensor nodes in this work, the Genetic Algorithm is applied initially, followed by Bacterial Conjugation. The simulation's results show a significant increase in clustering speed acceleration. The speed of the nodes is taken into account in the suggested approach for calibrating mobile wireless sensor nodes.
APA, Harvard, Vancouver, ISO, and other styles
6

Oksiiuk, Oleksandr, and Vadym Krotov. "ANALYSIS AND CHOICE OF ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS BASED ON THE USE THE NEURAL NETWORK." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 9, no. 1 (March 3, 2019): 53–55. http://dx.doi.org/10.5604/01.3001.0013.0921.

Full text
Abstract:
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into account the great potential offered by ad hoc networking. Ad hoc networks are wireless mobile networks that can operate without infrastructure and without centralized network management. In such networks, the wireless mobile nodes may dynamically enter the network as well as leave the network. Mobility and dynamic topology are the main characteristics of ad hoc networks. In the last years, the hundreds of new routing protocols were designed, that are used for the various scenarios of this design space. The routing features in wireless ad hoc networks are described. The corresponding routing protocols are reviewed. The paper proposes a method for selecting the preferred protocol wireless networks using the mathematical tools of neural networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Alnezari, Amani S., and Nasser-Eddine Rikli. "Achieving Mobile Cloud Computing through Heterogeneous Wireless Networks." International Journal of Communications, Network and System Sciences 10, no. 06 (2017): 107–28. http://dx.doi.org/10.4236/ijcns.2017.106006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Liang, Honggang Wang, and Yi Qian. "Research advance in wireless networks and mobile computing." Telecommunication Systems 60, no. 1 (November 21, 2014): 1–2. http://dx.doi.org/10.1007/s11235-014-9916-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

BERENBRINK, PETRA, THOMAS FRIEDETZKY, JÁN MAŇUCH, and LADISLAV STACHO. "(QUASI) SPANNERS FOR MOBILE AD HOC NETWORKS." Journal of Interconnection Networks 06, no. 02 (June 2005): 63–84. http://dx.doi.org/10.1142/s0219265905001320.

Full text
Abstract:
We introduce a notion of t-quasi-spanner as an alternative to classical t-spanners. Our motivation for quasi-spanner comes from a problem of computing a sparse backbone for ad hoc wireless networks with fixed transmission ranges. We study computational complexity of the problem of computing sparsest quasi-spanner. Then we concentrate on the case t = 2 and give a distributed algorithm for computing a 2-quasi-spanner with linear number of edges. Finally, we give a modification of our algorithm which performs well on a class of random ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Brooks, Tyson. "Authenticating Devices in Fog-mobile Edge Computing Environments through a Wireless Grid Resource Sharing Protocol." International Journal of UbiComp 13, no. 2 (April 30, 2022): 1–17. http://dx.doi.org/10.5121/iju.2022.13201.

Full text
Abstract:
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the widespread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the level of security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud network through a wireless grid authentication process. The purpose of this article is to begin to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors depending on their capability to handle five primary functions: management of identification [ID] and presence, permissions management, data transferability, application-programming interface [API] and security.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Mobile wireless computing networks"

1

Datla, Dinesh. "Wireless Distributed Computing in Cloud Computing Networks." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/51729.

Full text
Abstract:
The explosion in growth of smart wireless devices has increased the ubiquitous presence of computational resources and location-based data. This new reality of numerous wireless devices capable of collecting, sharing, and processing information, makes possible an avenue for new enhanced applications. Multiple radio nodes with diverse functionalities can form a wireless cloud computing network (WCCN) and collaborate on executing complex applications using wireless distributed computing (WDC). Such a dynamically composed virtual cloud environment can offer services and resources hosted by individual nodes for consumption by user applications. This dissertation proposes an architectural framework for WCCNs and presents the different phases of its development, namely, development of a mathematical system model of WCCNs, simulation analysis of the performance benefits offered by WCCNs, design of decision-making mechanisms in the architecture, and development of a prototype to validate the proposed architecture. The dissertation presents a system model that captures power consumption, energy consumption, and latency experienced by computational and communication activities in a typical WCCN. In addition, it derives a stochastic model of the response time experienced by a user application when executed in a WCCN. Decision-making and resource allocation play a critical role in the proposed architecture. Two adaptive algorithms are presented, namely, a workload allocation algorithm and a task allocation - scheduling algorithm. The proposed algorithms are analyzed for power efficiency, energy efficiency, and improvement in the execution time of user applications that are achieved by workload distribution. Experimental results gathered from a software-defined radio network prototype of the proposed architecture validate the theoretical analysis and show that it is possible to achieve 80 % improvement in execution time with the help of just three nodes in the network.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Zhimin. "Opportunistic Computing in Wireless Networks." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1267743144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kang, Jong Hee. "Location-aware information access through wireless networks /." Thesis, Connect to this title online; UW restricted, 2006. http://hdl.handle.net/1773/6878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Yue. "Edge computing-based access network selection for heterogeneous wireless networks." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1S042/document.

Full text
Abstract:
Au cours de ces dernières décennies, les réseaux de télécommunications mobiles ont évolué de la 1G à la 4G. La 4G permet la coexistence de différents réseaux d'accès. Ainsi, les utilisateurs ont la capacité de se connecter à un réseau hétérogène, constitué de plusieurs réseaux d'accès. Toutefois, la sélection du réseau approprié n'est pas une tâche facile pour les utilisateurs mobiles puisque les conditions de chaque réseau d'accès changent rapidement. Par ailleurs, en termes d'usage, le streaming vidéo devient le service principal de transfert de données sur les réseaux mobiles, ce qui amène les fournisseurs de contenu et les opérateurs de réseau à coopérer pour garantir la qualité de la diffusion. Dans ce contexte, la thèse propose la conception d'une approche novatrice pour la prise de décision optimale de sélection de réseau et une architecture améliorant les performances des services de streaming adaptatif dans un réseau hétérogène. En premier lieu, nous introduisons un modèle analytique décrivant la procédure de sélection de réseau en ne considérant déjà qu'une seule classe de trafic. Nous concevons ensuite une stratégie de sélection basée sur des fondements de la théorie du contrôle optimal linéaire. Des simulations sous MATLAB sont effectuées pour valider l'efficacité du mécanisme proposé. Sur ce même principe, nous étendons ce modèle avec un modèle analytique général décrivant les procédures de sélection de réseau dans des environnements de réseaux hétérogènes avec de multiples classes de trafic. Le modèle proposé est ensuite utilisé pour dériver un mécanisme adaptatif basé sur la théorie du contrôle, qui permet non seulement d'aider à piloter dynamiquement le trafic vers l'accès réseau le plus approprié mais aussi de bloquer dynamiquement le trafic résiduel lorsque le réseau est congestionné en ajustant les probabilités d'accès optimales. Nous discutons aussi les avantages d'une intégration transparente du mécanisme proposé avec l'ANDSF, solution fonctionnelle normalisée pour la sélection de réseau. Un prototype est également implémenté dans ns-3. En second lieu, nous nous concentrons sur l'amélioration des performances de DASH pour les utilisateurs mobiles dans un environnement de réseau d'accès 4G uniquement. Nous introduisons une nouvelle architecture basée sur l'utilisation de serveurs distribués en périphérie de réseau suivant le standard MEC. Le mécanisme d'adaptation proposé, fonctionnant en tant que service MEC, peut modifier les fichiers de manifeste en temps réel, en réponse à la congestion du réseau et à la demande dynamique de flux de streaming. Ces modifications conduisent ainsi les clients à sélectionner des représentations vidéo de débit / qualité plus appropriées. Nous avons développé une plateforme de test virtualisée pour l'expérimentation de notre proposition. Les résultats ainsi obtenus démontrent ses avantages en terme de QoE comparés aux approches d'adaptation traditionnelles, purement pilotées par les clients, car notre approche améliore non seulement le MOS mais aussi l'équité face à la congestion. Enfin, nous étendons l'architecture proposée basée sur MEC pour supporter le service de streaming adaptatif DASH dans un réseau hétérogène multi-accès afin de maximiser la QoE et l'équité des utilisateurs mobiles. Dans ce scénario, notre mécanisme doit aider les utilisateurs à sélectionner la qualité vidéo et le réseau et nous le formulons comme un problème d'optimisation. Ce problème d'optimisation peut être résolu par l'outil IBM CPLEX, mais cela prend du temps et ne peut être envisagé à grande échelle. Par conséquent, nous introduisons une heuristique pour aborder la solution optimale avec moins de complexité. Ensuite, nous mettons en œuvre une expérimentation sur notre plateforme de tests. Le résultat démontre que, par rapport à l'outil IBM CPLEX, notre algorithme permet d'obtenir des performances similaires sur la QoE globale et l'équité, avec un gain de temps significatif
Telecommunication network has evolved from 1G to 4G in the past decades. One of the typical characteristics of the 4G network is the coexistence of heterogeneous radio access technologies, which offers end-users the capability to connect them and to switch between them with their mobile devices of the new generation. However, selecting the right network is not an easy task for mobile users since access network condition changes rapidly. Moreover, video streaming is becoming the major data service over the mobile network where content providers and network operators should cooperate to guarantee the quality of video delivery. In order to cope with this context, the thesis concerns the design of a novel approach for making an optimal network selection decision and architecture for improving the performance of adaptive streaming in the context of a heterogeneous network. Firstly, we introduce an analytical model (i.e. linear discrete-time system) to describe the network selection procedure considering one traffic class. Then, we consider the design of a selection strategy based on foundations from linear optimal control theory, with the objective to maximize network resource utilization while meeting the constraints of the supported services. Computer simulations with MATLAB are carried out to validate the efficiency of the proposed mechanism. Based on the same principal we extend this model with a general analytical model describing the network selection procedures in heterogeneous network environments with multiple traffic classes. The proposed model was, then, used to derive a scalable mechanism based on control theory, which allows not only to assist in steering dynamically the traffic to the most appropriate network access but also helps in blocking the residual traffic dynamically when the network is congested by adjusting dynamically the access probabilities. We discuss the advantages of a seamless integration with the ANDSF. A prototype is also implemented into ns-3. Simulation results sort out that the proposed scheme prevents the network congestion and demonstrates the effectiveness of the controller design, which can maximize the network resources allocation by converging the network workload to the targeted network occupancy. Thereafter, we focus on enhancing the performance of DASH in a mobile network environment for the users which has one access network. We introduce a novel architecture based on MEC. The proposed adaptation mechanism, running as an MEC service, can modify the manifest files in real time, responding to network congestion and dynamic demand, thus driving clients towards selecting more appropriate quality/bitrate video representations. We have developed a virtualized testbed to run the experiment with our proposed scheme. The simulation results demonstrate its QoE benefits compared to traditional, purely client-driven, bitrate adaptation approaches since our scheme notably improves both on the achieved MOS and on fairness in the face of congestion. Finally, we extend the proposed the MEC-based architecture to support the DASH service in a multi-access heterogeneous network in order to maximize the QoE and fairness of mobile users. In this scenario, our scheme should help users select both video quality and access network and we formulate it as an optimization problem. This optimization problem can be solved by IBM CPLEX tool. However, this tool is time-consuming and not scalable. Therefore, we introduce a heuristic algorithm to make a sub-optimal solution with less complexity. Then we implement a testbed to conduct the experiment and the result demonstrates that our proposed algorithm notably can achieve similar performance on overall achieved QoE and fairness with much more time-saving compared to the IBM CPLEX tool
APA, Harvard, Vancouver, ISO, and other styles
5

Jayaram, Rajeev 1971. "Quality-of-Service Provisioning and Resource Reservation Mechanisms for Mobile Wireless Networks." Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc278542/.

Full text
Abstract:
In this thesis, a framework for Quality of Service provisioning in next generation wireless access networks is proposed. The framework aims at providing a differentiated service treatment to real-time (delay-sensitive) and non-real-time (delay-tolerant) multimedia traffic flows at the link layer. Novel techniques such as bandwidth compaction, channel reservation, and channel degradation are proposed. Using these techniques, we develop a call admission control algorithm and a call control block as part of the QoS framework. The performance of the framework is captured through analytical modeling and simulation experiments. By analytical modeling, the average carried traffic and the worst case buffer requirements for real-time and non-real-time calls are estimated. Simulation results show a 21% improvement in call admission probability of real-time calls, and a 17% improvement for non-real-time calls, when bandwidth compaction is employed. The channel reservation technique shows a 12% improvement in call admission probability in comparison with another proposed scheme in the literature.
APA, Harvard, Vancouver, ISO, and other styles
6

Long, Men Wu Chwan-Hwa. "Roaming authentication and end-to-end authentication in wireless security." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/doctoral/LONG_MEN_56.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Samii, Etienne. "Usability design for location based mobile services in wireless metropolitan networks." Hamburg Diplomica-Verl, 2006. http://d-nb.info/987370928/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mahmoud, Qusay H. "Evolution of network computing paradigms : applications of mobile agents in wired and wireless networks." Thesis, Middlesex University, 2002. http://eprints.mdx.ac.uk/10745/.

Full text
Abstract:
The World Wide Web (or Web for short) is the largest client-server computing system commonly available, which is used through its widely accepted universal client (the Web browser) that uses a standard communication protocol known as the HyperText Transfer Protocol (HTTP) to display information described in the HyperText Markup Language (HTML). The current Web computing model allows the execution of server-side applications such as Servlets and client-side applications such as Applets. However, it offers limited support for another model of network computing where users would be able to use remote, and perhaps more powerful, machines for their computing needs. The client-server model enables anyone with a Web-enabled device ranging from desktop computers to cellular telephones, to retrieve information from the Web. In today's information society, however, users are overwhelmed by the information with which they are confronted on a daily basis. For subscribers of mobile wireless data services, this may present a problem. Wireless handheld devices, such as cellular telephones are connected via wireless networks that suffer from low bandwidth and have a greater tendency for network errors. In addition, wireless connections can be lost or degraded by mobility. Therefore, there a need for entities that act on behalf of users to simplify the tasks of discovering and managing network computing resources. It has been said that software agents are a solution in search of a problem. Mobile agents, however, are inherently distributed in nature, and therefore they represent a natural view of a distributed system. They provide an ideal mechanism for implementing complex systems, and they are well suited for applications that are communicationscentric such as Web-based network computing. Another attractive area of mobile agents is processing data over unreliable networks (such as wireless networks). In such an environment, the low reliability network can be used to transfer agents rather than a chunk. of data. The agent can travel to the nodes of the network, collect or process information without the risk of network disconnection, then return home. The publications of this doctorate by published works report on research undertaken in the area of distributed systems with emphasis on network computing paradigms, Web-based distributed computing, and the applications of mobile agents in Web-based distributed computing and wireless computing. The contributions of this collection of related papers can be summarized in four points. First, I have shown how to extend the Web to include computing resources; to illustrate the feasibility of my approach I have constructed a proof of concept implementation. Second, a mobile agent-based approach to Web-based distributed computing, that harness the power of the Web as a computing resource, has been proposed and a system has been prototyped. This, however, means that users will be able to use remote machines to execute their code, but this introduces a security risk. I need to make sure that malicious users cannot harm the remote system. For this, a security policy design pattern for mobile Java code has been developed. Third, a mediator-based approach to wireless client/server computing has been proposed and guidelines for implementing it have been published. This approach allows access to Internet services and distributed object systems from resource-constraint handheld wireless devices such as cellular telephones. Fourth and finally, a mobile agent-based approach to the Wireless Internet has been designed and implemented. In this approach, remote mobile agents can be accessed and used from wireless handheld devices. Handheld wireless devices will benefit greatly from this approach since it overcomes wireless network limitations such as low bandwidth and disconnection, and enhances the functionality of services by being able to operate without constant user input.
APA, Harvard, Vancouver, ISO, and other styles
9

Sanadhya, Shruti. "Ultra-mobile computing: adapting network protocol and algorithms for smartphones and tablets." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/52959.

Full text
Abstract:
Smartphones and tablets have been growing in popularity. These ultra mobile devices bring in new challenges for efficient network operations because of their mobility, resource constraints and richness of features. There is thus an increasing need to adapt network protocols to these devices and the traffic demands on wireless service providers. This dissertation focuses on identifying design limitations in existing network protocols when operating in ultra mobile environments and developing algorithmic solutions for the same. Our work comprises of three components. The first component identifies the shortcomings of TCP flow control algorithm when operating on resource constrained smartphones and tablets. We then propose an Adaptive Flow Control (AFC) algorithm for TCP that relies not just on the available buffer space but also on the application read-rate at the receiver. The second component of this work looks at network deduplication for mobile devices. With traditional network deduplication (dedup), the dedup source uses only the portion of the cache at the dedup destination that it is aware of. We argue in this work that in a mobile environment, the dedup destination (say the mobile) could have accumulated a much larger cache than what the current dedup source is aware of. In this context, we propose Asymmetric caching, a solution which allows the dedup destination to selectively feedback appropriate portions of its cache to the dedup source with the intent of improving the redundancy elimination efficiency. The third and final component focuses on leveraging network heterogeneity for prefetching on mobile devices. Our analysis of browser history of 24 iPhone users show that URLs do not repeat exactly. Users do show a lot of repetition in the domains they visit but not the particular URL. Additionally, mobile users access web content over diverse network technologies: WiFi and cellular (3G/4G). While data is unlimited over WiFi, users typically have monthly limits on data over the cellular network. In this context, we propose Precog, an action-based prefetching solution to reduce cellular data footprint on smartphones and tablets.
APA, Harvard, Vancouver, ISO, and other styles
10

Kanter, Theo. "Adaptive Personal Mobile Communication, Service Architecture and Protocols." Doctoral thesis, KTH, Microelectronics and Information Technology, IMIT, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3273.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Mobile wireless computing networks"

1

Handbook of wireless networks and mobile computing. New York: Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stojmenović, Ivan, ed. Handbook of Wireless Networks and Mobile Computing. New York, USA: John Wiley & Sons, Inc., 2002. http://dx.doi.org/10.1002/0471224561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Xiao, Li Jie, and Pan Yi 1960-, eds. Ad-Hoc and sensor networks: Wireless networks and mobile computing. New York: Nova Science, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1978-, Shatzkamer Kevin, and Wainner Scott, eds. IP design for mobile networks. Indianapolis, Ind: Cisco Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zvi, Ganz, and Wongthavarawat Kitti, eds. Multimedia wireless networks: Technologies, standards, and QoS. Upper Saddle River, NJ: Prentice Hall PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Association, Information Resources Management. Mobile computing and wireless networks: Concepts, methodologies, tools, and applications. Hershey, PA: Information Science Reference, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Association for Computing Machinery. Mobile networks and applications: MONET. Amsterdam, Netherlands: Baltzer Science Publishers, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Azzedine, Boukerche, ed. Handbook of algorithms for wireless and mobile networks and computing. Boca Raton, FL: Chapman & Hall/CRC, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A, Ahmad Ashraf M., and Ibrahim Ismail Khalil, eds. Multimedia transcoding in mobile and wireless networks. Hershey PA: Medical Information Science Reference, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1965-, Basagni Stefano, ed. Mobile ad hoc networking. Hoboken, NJ: John Wiley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Mobile wireless computing networks"

1

Wang, Jingjing, and Chunxiao Jiang. "Mobile Edge Computing in FANET." In Wireless Networks, 197–287. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-8850-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tang, Ming, and Vincent W. S. Wong. "Deep Reinforcement Learning for Mobile Edge Computing Systems." In Wireless Networks, 175–201. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98064-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Wen, Yujie Tang, Peng Yang, Weiting Zhang, and Ning Zhang. "Collaborative Deep Neural Network Inference via Mobile Edge Computing." In Wireless Networks, 263–90. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98064-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Peng, Kai, Yiwen Zhang, Xiaofei Wang, Xiaolong Xu, Xiuhua Li, and Victor C. M. Leung. "Computation Offloading in Mobile Edge Computing." In Encyclopedia of Wireless Networks, 216–20. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Peng, Kai, Yiwen Zhang, Xiaofei Wang, Xiaolong Xu, Xiuhua Li, and Victor C. M. Leung. "Computation Offloading in Mobile Edge Computing." In Encyclopedia of Wireless Networks, 1–5. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_331-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Toh, C.-K. "Mobile Communications and Computing." In Wireless ATM and Ad-Hoc Networks, 1–15. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6307-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Korpeoglu, Ibrahim, Pravin Bhagwat, Chatschik Bisdikian, and Mahmoud Naghshineh. "Multiplexed serial wireless connectivity for palmtop computers." In Mobile Networks and Computing, 171–76. Providence, Rhode Island: American Mathematical Society, 2000. http://dx.doi.org/10.1090/dimacs/052/10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prakash, Ravi, and Mukesh Singhal. "Impact of unidirectional links in wireless ad-hoc networks." In Mobile Networks and Computing, 281–91. Providence, Rhode Island: American Mathematical Society, 2000. http://dx.doi.org/10.1090/dimacs/052/17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shih, Yuan-Yao, Hung-Yu Wei, and Ai-Chun Pang. "Fog Computing for Intelligent Mobile and IoT Networks." In Encyclopedia of Wireless Networks, 489–95. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ren, Zhiyuan, Chen Chen, and Jun Fu. "Mobile Edge Computing: Low Latency and High Reliability." In Encyclopedia of Wireless Networks, 873–77. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mobile wireless computing networks"

1

R Simpson, William. "Wireless Computing and it Ecosystems." In Fifth International Conference on Wireless & Mobile Networks. Academy & Industry Research Collaboration Center (AIRCC), 2013. http://dx.doi.org/10.5121/csit.2013.3705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Agrawal, Prathima, and David Famolari. "Mobile computing in next generation wireless networks." In the 3rd international workshop. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/313239.313277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Avvenuti, Marco, Paolo Corsini, Paolo Masci, and Alessio Vecchio. "Opportunistic computing for wireless sensor networks." In 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems. IEEE, 2007. http://dx.doi.org/10.1109/mobhoc.2007.4428751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Selvaraju, Shunmuga Priyan, Ali Balador, Hossein Fotouhi, Maryam Vahabi, and Mats Bjorkman. "Network Management in Heterogeneous IoT Networks." In 2021 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2021. http://dx.doi.org/10.1109/iwcmc51323.2021.9498801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaur, Kirandeep, and Satinder Kaur. "A Brief Review of Energy Efficient Protocols in Mobile Ad hoc Networks." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.36.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) is an assemblage of multi-hop wireless mobile nodes that communicate with each other without centralized control and established infrastructure. Energy efficient routing is not merely concerned about less power consumption, it also deals with increasing the time duration in which any network maintains certain performance level. Therefore, power management becomes an essential issue. Considering this, various authors have designed and developed different techniques to enhance the energy efficiency of mobile networks. This paper focuses on the comparative study of different developments and modifications that have been carried out in this field in past decades. It also highlights how these modifications have helped to enhance the network lifetime.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhan, Jing, Huanguo Zhang, Liqiang Zhang, and Mingdi Xu. "Trusted Computing Enabled System for Wireless Networks." In 2007 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2007. http://dx.doi.org/10.1109/wicom.2007.547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vu, Thuong Van, Thi Mai Trang Nguyen, Guy Pujolle, and Nadia Boukhatem. "DODEX+: A new network coding scheme for mesh networks in mobile cloud computing." In 2014 Wireless Days (WD). IEEE, 2014. http://dx.doi.org/10.1109/wd.2014.7020796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dong, Xiaogang, Zheng Wan, and Changshou Deng. "Optimization of Wireless Power Transfer for Wireless-Powered Mobile Edge Computing." In 2022 International Conference on Computer Communications and Networks (ICCCN). IEEE, 2022. http://dx.doi.org/10.1109/icccn54977.2022.9868924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fragouli, Christina. "Network Coding for Dynamically Changing Networks." In 2008 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2008. http://dx.doi.org/10.1109/iwcmc.2008.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Zhi, Bo Yu, Qi Chen, and Chuanshan Gao. "Wireless Grid Computing over Mobile Ad-Hoc Networks with Mobile Agent." In 2005 First International Conference on Semantics, Knowledge and Grid. IEEE, 2005. http://dx.doi.org/10.1109/skg.2005.146.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Mobile wireless computing networks"

1

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, December 2005. http://dx.doi.org/10.21236/ada442751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada404365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2001. http://dx.doi.org/10.21236/ada390176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Michail, Anastassios, and Anthony Ephremides. Routing Algorithms in All-Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, January 1997. http://dx.doi.org/10.21236/ada440810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bakshi, Bikram S., P. Krishna, N. H. Vaidya, and D. K. Pradhan. Providing Seamless Communications in Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, April 1995. http://dx.doi.org/10.21236/ada637094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sivalingam, Krishna M. Energy Efficient Network Protocols for Wireless and Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, November 2001. http://dx.doi.org/10.21236/ada400626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Goldsby, Michael E., Michael M. Johnson, Dominique Marie Kilman, Neal Robert Bierbaum, Helen Y. Chen, Heidi R. Ammerlahn, Rose P. Tsang, and David M. Nicol. Robust message routing for mobile (wireless) ad hoc networks. Office of Scientific and Technical Information (OSTI), January 2004. http://dx.doi.org/10.2172/918216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yeh, Edmund M. Connectivity and Resilience in Large-Scale Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, September 2012. http://dx.doi.org/10.21236/ada577083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Roy, Sumit. Telecommunication Networks for Mobile & Distributed Communications/Computing. Fort Belvoir, VA: Defense Technical Information Center, December 2001. http://dx.doi.org/10.21236/ada418978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Muchnik, Ilya B., William M. Pottenger, and Nikita I. Lytkin. Anomaly Detection by Reasoning from Evidence in Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, August 2008. http://dx.doi.org/10.21236/ada501011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography