Artículos de revistas sobre el tema "Wireless computing"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Wireless computing.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Wireless computing".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Li, Fan, Jinyuan Chen y Zhiying Wang. "Wireless MapReduce Distributed Computing". IEEE Transactions on Information Theory 65, n.º 10 (octubre de 2019): 6101–14. http://dx.doi.org/10.1109/tit.2019.2924621.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Goel, Shipra. "Grid Computing integrated with Mobile computing wireless devices". International Journal of Mobile Network Communications & Telematics 1, n.º 2 (31 de diciembre de 2011): 39–48. http://dx.doi.org/10.5121/ijmnct.2011.1203.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

WAKAMIYA, Naoki. "Neural Computing on Wireless Networks". IEICE ESS Fundamentals Review 14, n.º 4 (1 de abril de 2021): 308–17. http://dx.doi.org/10.1587/essfr.14.4_308.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Manvi, Sunilkumar S. y Mahantesh N. Birje. "Wireless Grid Computing: A Survey". IETE Journal of Education 50, n.º 3 (septiembre de 2009): 119–31. http://dx.doi.org/10.1080/09747338.2009.10876059.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Master, Neal, Aditya Dua, Dimitrios Tsamis, Jatinder Pal Singh y Nicholas Bambos. "Adaptive Prefetching in Wireless Computing". IEEE Transactions on Wireless Communications 15, n.º 5 (mayo de 2016): 3296–310. http://dx.doi.org/10.1109/twc.2016.2519882.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Lefor, Alan T. y Maarten K. Lefor. "Wireless computing in health care". Current Surgery 60, n.º 4 (julio de 2003): 477–79. http://dx.doi.org/10.1016/s0149-7944(03)00087-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Schumny, Harald. "Bluetooth, wireless mobile computing, eBooks". Computer Standards & Interfaces 24, n.º 3 (julio de 2002): 189–91. http://dx.doi.org/10.1016/s0920-5489(02)00033-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Patton, Janice K. "Wireless Computing in the Library". Community & Junior College Libraries 10, n.º 3 (marzo de 2002): 11–16. http://dx.doi.org/10.1300/j107v10n03_03.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Rhyu, Sunkyung y SangYeob Oh. "ICT-Based Wireless Personal Computing". Wireless Personal Communications 93, n.º 1 (23 de enero de 2017): 1–5. http://dx.doi.org/10.1007/s11277-017-3955-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Wang, Xingzhu. "A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing". Wireless Communications and Mobile Computing 2022 (19 de octubre de 2022): 1–12. http://dx.doi.org/10.1155/2022/1499736.

Texto completo
Resumen
In order to improve the communication security of wireless mobile network, a collaborative intrusion detection method based on cloud computing is studied. The mobile terminal and the cloud computing platform are connected by the wireless mobile network. The cloud computing platform authentication server adopts a dual server and multifactor authentication scheme for mobile cloud computing to provide authentication services for mobile terminal users. The web server of the cloud computing platform uses the intrusion node detection protocol of the neighbor classification mechanism to provide a communication security protocol for users; Using the HMM algorithm, the intrusion detection module of the computing platform realizes the intrusion detection of wireless mobile network. Finally, using authentication service, security protocol, and intrusion detection module completes the cooperative detection of mobile network intrusion. The experimental results show that this method can realize the cooperative detection of wireless mobile network intrusion, and the detection accuracy is as high as 98%, which ensures the communication security of wireless mobile network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Feng, Hao, Jaime Llorca, Antonia M. Tulino y Andreas F. Molisch. "Optimal Control of Wireless Computing Networks". IEEE Transactions on Wireless Communications 17, n.º 12 (diciembre de 2018): 8283–98. http://dx.doi.org/10.1109/twc.2018.2875740.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Satoh, I. "Software testing for wireless mobile computing". IEEE Wireless Communications 11, n.º 5 (octubre de 2004): 58–64. http://dx.doi.org/10.1109/mwc.2004.1351682.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Duchamp, Daniel. "Systems Software for Wireless Mobile Computing". ACM SIGOPS Operating Systems Review 26, n.º 2 (abril de 1992): 10. http://dx.doi.org/10.1145/142111.964563.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Bahli, Bouchaib y Younes Benslimane. "An exploration of wireless computing risks". Information Management & Computer Security 12, n.º 3 (julio de 2004): 245–54. http://dx.doi.org/10.1108/09685220410542606.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Duchamp, D., S. K. Feiner y G. Q. Maguire. "Software technology for wireless mobile computing". IEEE Network 5, n.º 6 (noviembre de 1991): 12–18. http://dx.doi.org/10.1109/65.103804.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Periola, Ayodele A. y Olabisi E. Falowo. "Hybrid wireless aided volunteer computing paradigm". Wireless Networks 26, n.º 7 (24 de junio de 2020): 5355–69. http://dx.doi.org/10.1007/s11276-020-02395-z.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Kakalik, John S. y Marie A. Wright. "Privacy and Security in Wireless Computing". Network Security 2000, n.º 12 (diciembre de 2000): 12–15. http://dx.doi.org/10.1016/s1353-4858(00)12018-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Papageorgiou, Apostolos. "Service-oriented computing with wireless participants". ACM SIGMultimedia Records 4, n.º 2 (24 de julio de 2012): 9–10. http://dx.doi.org/10.1145/2350204.2350211.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Shaheen, Javed Ahmad. "Mobile Computing: Wireless Networking Security Issues". International Journal of Grid and Distributed Computing 9, n.º 10 (31 de octubre de 2016): 273–82. http://dx.doi.org/10.14257/ijgdc.2016.9.10.24.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Ahuja, Sanjay P. y Jack R. Myers. "A Survey on Wireless Grid Computing". Journal of Supercomputing 37, n.º 1 (julio de 2006): 3–21. http://dx.doi.org/10.1007/s11227-006-3845-z.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Wu, Xintao, Jie Gan, Shiyong Chen, Xu Zhao y Yucheng Wu. "Optimization Strategy of Task Offloading with Wireless and Computing Resource Management in Mobile Edge Computing". Wireless Communications and Mobile Computing 2021 (11 de noviembre de 2021): 1–11. http://dx.doi.org/10.1155/2021/8288836.

Texto completo
Resumen
Mobile edge computing (MEC) provides user equipment (UE) with computing capability through wireless networks to improve the quality of experience (QoE). The scenario with multiple base stations and multiple mobile users is modeled and analyzed. The optimization strategy of task offloading with wireless and computing resource management (TOWCRM) in mobile edge computing is considered. A resource allocation algorithm based on an improved graph coloring method is used to allocate wireless resource blocks (RBs). The optimal solution of computing resource is obtained by using KKT conditions. To improve the system utility, a semi-distributed TOWCRM strategy is proposed to obtain the task offloading decision. Theoretical simulations under different system parameters are executed, and the proposed semi-distributed TOWCRM strategy can be completed with finite iterations. Simulation results have verified the effectiveness of the proposed algorithm.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Liu, Zhou-zhou y Shi-ning Li. "Sensor-cloud data acquisition based on fog computation and adaptive block compressed sensing". International Journal of Distributed Sensor Networks 14, n.º 9 (septiembre de 2018): 155014771880225. http://dx.doi.org/10.1177/1550147718802259.

Texto completo
Resumen
The emergence of sensor-cloud system has completely changed the one-to-one service mode of traditional wireless sensor networks, and it greatly expands the application field of wireless sensor networks. As the high delay of large-scale data processing tasks in sensor-cloud, a sensor-cloud data acquisition scheme based on fog computing and adaptive block compressive sensing is proposed. First, the sensor-cloud framework based on fog computing is constructed, and the fog computing layer includes many wireless mobile nodes, which helps to realize the implementation of information transfer management between lower wireless sensor networks layer and upper cloud computing layer. Second, in order to further reduce network traffic and improve data processing efficiency, an adaptive block compressed sensing data acquisition strategy is proposed in the lower wireless sensor networks layer. By dynamically adjusting the size of the network block and building block measurement matrix, the implementation of sensor compressed sensing data acquisition is achieved; in order to further balance the lower wireless sensor networks’ node energy consumption, reduce the time delay of data processing task in fog computing layer, the mobile node data acquisition path planning strategy and multi-mobile nodes collaborative computing system are proposed. Through the introduction of the fitness value constraint transformation processing technique and parallel discrete elastic collision optimization algorithm, the efficient processing of the fog computing layer data is realized. Finally, the simulation results show that the sensor-cloud data acquisition scheme can effectively achieve large-scale sensor data efficient processing. Moreover, compared with cloud computing, the network traffic is reduced by 20% and network task delay is reduced by 12.8%–20.1%.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Liu, Jie y Li Zhu. "Joint Resource Allocation Optimization of Wireless Sensor Network Based on Edge Computing". Complexity 2021 (29 de marzo de 2021): 1–11. http://dx.doi.org/10.1155/2021/5556651.

Texto completo
Resumen
Resource allocation has always been a key technology in wireless sensor networks (WSN), but most of the traditional resource allocation algorithms are based on single interface networks. The emergence and development of multi-interface and multichannel networks solve many bottleneck problems of single interface and single channel networks, it also brings new opportunities to the development of wireless sensor networks, but the multi-interface and multichannel technology not only improves the performance of wireless sensor networks but also brings great challenges to the resource allocation of wireless sensor networks. Edge computing changes the traditional centralized cloud computing processing method into a method that reduces computing storage capacity to the edge of the network and faces users and terminals. Realize the advantages of lower latency, higher bandwidth, and fast response. Therefore, this paper proposes a joint optimization algorithm of resource allocation based on edge computing. We establish a wireless sensor allocation model and then propose our algorithm model combined with the advantages of edge computing. Compared with the traditional allocation algorithm (PCOA, MCMH, and TDMA), it can further improve the resource utilization, reduce the network energy consumption, increase network capacity, and reduce the complexity of the schemes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Ceballos, Henry Zárate y Jorge Eduardo Ortiz Triviño. "S.O.V.O.R.A.: A Distributed Wireless Operating System". Information 11, n.º 12 (14 de diciembre de 2020): 581. http://dx.doi.org/10.3390/info11120581.

Texto completo
Resumen
Due to the growth of users and linked devices in networks, there is an emerging need for dynamic solutions to control and manage computing and network resources. This document proposes a Distributed Wireless Operative System on a Mobile Ad-hoc Network (MANET) to manage and control computing resources in relation to several virtual resources linked in a wireless network. This prototype has two elements: a local agent that works on each physical node to manage the computing resources (e.g., virtual resources and distributed applications) and an orchestrator agent that monitors, manages, and deploys policies on each physical node. These elements arrange the local and global computing resources to provide a quality service to the users of the Ad-hoc cluster. The proposed S.O.V.O.R.A. model (Operating Virtualized System oriented to Ad-hoc networks) defines primitives, commands, virtual structures, and modules to operate as a distributed wireless operating system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Hatti, Daneshwari I. y Ashok V. Sutagundar. "Nature Inspired Computing for Wireless Networks Applications". International Journal of Applied Evolutionary Computation 10, n.º 1 (enero de 2019): 1–29. http://dx.doi.org/10.4018/ijaec.2019010101.

Texto completo
Resumen
Nature inspired computing (NIC) is a computing paradigm inspired by the attractive behavior of nature. NIC has influenced the researchers to perform optimization in many approaches using physics/chemistry-based algorithms and biology-based algorithms. Physics/chemistry-based algorithms include the water cycle, a galaxy base, or gravitational-based algorithms. Biology-based algorithms, namely bio-inspired and swarm intelligence-related algorithms are discussed with their importance in the field of wireless networks. A wireless network such as MANET's, VANET, AdHoc, and IoT are playing a vital role in all sectors. Some of the issues such as finding the optimal path in routing, clustering, dynamic allocation of motes, energy and lifetime of the network pertaining to a wireless network can be solved using an NIC approach. Algorithms derived by the inspiration from nature are discussed briefly in this article.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Liu, Chuanyi y Xiaoyong Li. "Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks". Sensors 20, n.º 6 (12 de marzo de 2020): 1592. http://dx.doi.org/10.3390/s20061592.

Texto completo
Resumen
The trust computing mechanism has an increasing role in the cooperative work of wireless sensor networks. However, the computing speed, resource overhead, and anti-collaborative attack ability of a trust mechanism itself are three key challenging issues for any open and resource-constrained wireless sensor networks. In this study, we propose a fast, resource-saving, and anti-collaborative attack trust computing scheme (FRAT) based on across-validation mechanism for clustered wireless sensor networks. First, according to the inherent relationship among three network entities (which are made up of three types of network nodes, namely base stations, cluster heads, and cluster members), we propose the cross-validation mechanism, which is effective and reliable against collaborative attacks caused by malicious nodes. Then, we adopt a fast and resource-saving trust computing scheme for cooperation between between cluster heads or cluster members. This scheme is suitable for wireless sensor networks because it facilitates resource-saving. Through theoretical analysis and experiments, the feasibility and effectiveness of the trust computing scheme proposed in this study are verified.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Hawkes, Mark y Claver Hategekimana. "Impacts of Mobile Computing on Student Learning in the University: A Comparison of Course Assessment Data". Journal of Educational Technology Systems 38, n.º 1 (septiembre de 2009): 63–74. http://dx.doi.org/10.2190/et.38.1.g.

Texto completo
Resumen
This study focuses on the impact of wireless, mobile computing tools on student assessment outcomes. In a campus-wide wireless, mobile computing environment at an upper Midwest university, an empirical analysis is applied to understand the relationship between student performance and Tablet PC use. An experimental/control group comparison of mobile computing enabled learning outcomes in selected courses showed that the integration of wireless technology and highly functional computing tools did not have a negative effect on student assessment results. Out of the four courses evaluated, none of the revealed test scores were statistically different between non-using and mobile computer using groups, indicating no negative impacts of the introduction of ubiquitous technology into the classroom. A freshman-level college math course showed statistically significantly positive differences in course assessment scores when mobile computing was implemented over the same timeline. Results are discussed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Kumar, Sunil, Kashyap Kambhatla, Fei Hu, Mark Lifson y Yang Xiao. "Ubiquitous Computing for Remote Cardiac Patient Monitoring: A Survey". International Journal of Telemedicine and Applications 2008 (2008): 1–19. http://dx.doi.org/10.1155/2008/459185.

Texto completo
Resumen
New wireless technologies, such as wireless LAN and sensor networks, for telecardiology purposes give new possibilities for monitoring vital parameters with wearable biomedical sensors, and give patients the freedom to be mobile and still be under continuous monitoring and thereby better quality of patient care. This paper will detail the architecture and quality-of-service (QoS) characteristics in integrated wireless telecardiology platforms. It will also discuss the current promising hardware/software platforms for wireless cardiac monitoring. The design methodology and challenges are provided for realistic implementation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Lei, Wen Li, Xin Cheng Ren y Yan Hu Fan. "Research of Mine Wireless Video Monitoring Sub-Station Based on WIFI". Applied Mechanics and Materials 214 (noviembre de 2012): 605–9. http://dx.doi.org/10.4028/www.scientific.net/amm.214.605.

Texto completo
Resumen
With the development of country's attention to safe production of mine, electronic technology and network technology begin to get widespread application in the mine exploration and monitoring. It has been brought forward a new method of mine wireless video monitoring sub-station based on WIFI wireless network technology, it send the collected video data to the ground monitoring equipment through wireless video capture terminals and wireless access point AP which has been installing in the mine tunnel, with a router connected to the cloud computing platform that enables remote monitoring terminal access, and it can intelligently analyze, search, data mining and other complex calculations by using of super-computing ability of cloud computing , in order to achieve the monitoring of mine production site.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Dong, Xiaogang, Zheng Wan, Changshou Deng, Wenying Wen y Yuxuan Luo. "Intelligent Time Allocation for Wireless Power Transfer in Wireless-Powered Mobile Edge Computing". Wireless Communications and Mobile Computing 2022 (24 de agosto de 2022): 1–13. http://dx.doi.org/10.1155/2022/6722848.

Texto completo
Resumen
Wireless-powered mobile edge computing is a new network computing paradigm that combines with the advantages of wireless power transfer and mobile edge computing. When the harvest-then-offload protocol is adopted in this network, the time of wireless power transfer has a significant impact on system performance. If the time is too short, the user cannot harvest enough energy. If it is too long, the user will not have enough time to complete the task offloading. Both result in many of user tasks being discarded. To address this problem, DEWPT, a differential evolution-based optimization scheme for wireless power transfer time, is proposed in this paper. DEWPT is designed with a hybrid mutation operator and a perturbation-based binomial crossover operator. The hybrid mutation operator combines the benefits of two mutation operators with distinct characteristics, so that DEWPT not only has a strong exploration ability but also can quickly converge. Meanwhile, the perturbation-based binomial crossover operator improves DEWPT’s ability to exploit local space. These two improvements effectively enhance DEWPT’s optimization performance, which is beneficial to find the optimal time for wireless power transfer. Furthermore, to improve the optimization efficiency, micro-population is introduced into DEWPT. Finally, the computation completion ratio maximization model is used to validate the performance of DEWPT in the wireless-powered mobile edge computing network with multiple edge servers. Numerical results show that the computation offloading scheme integrating with DEWPT can achieve a higher computation completion rate than three benchmark schemes, and is competitive in complexity. This demonstrates that DEWPT is an effective time allocation scheme for wireless power transfer.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Liu, Ji. "Optimization and Management in Order to Drive Targeted Networking Memory Database". Applied Mechanics and Materials 727-728 (enero de 2015): 965–68. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.965.

Texto completo
Resumen
In today's vehicle networking system architecture is mainly composed of four parts: sensor networks, wireless communication networks, cloud computing platforms and vehicle terminal. Wireless sensor network is responsible for the front of the real-time collection of traffic information, a wireless communication network to send information to the backend of the cloud computing platform, cloud computing platform to handle a large number of vehicles to collect real-time information from the front, and finally sends the information to the end user. In this thesis, this car networking research background, analyze vehicle networking system architecture consisting of performance indicators for each part of the system recognize cloud platform for large data processing efficiency as well as room for improvement. Then put forward the traditional computing platform I / O disk database with in-memory database to replace the cloud to enhance cloud computing platform for large data processing efficiency.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Han, Songyue, Dawei Ma, Chao Kang, Wei Huang, Chaoying Lin y Chunyuan Tian. "Optimization of Mobile Edge Computing Offloading Model for Distributed Wireless Sensor Devices". Journal of Sensors 2022 (28 de febrero de 2022): 1–9. http://dx.doi.org/10.1155/2022/9047737.

Texto completo
Resumen
The development and popularization of mobile Internet and wireless communication technology have spawned a large number of computation-intensive and delay-intensive applications. Limited computing resources and existing technologies cannot meet the performance requirements of new applications. Mobile edge computing technology can use wireless communication technology to offload data to be stored and computing tasks to the nearby assistant or edge server with idle resources. Based on the data offloading of distributed wireless sensor device to device communication, the architecture is designed and the basic framework of distributed mobile edge computing is constructed. To solve the problem of high mobile cloud computing technology, the offloading model of optimized mobile edge computing was proposed, and the stability and convergence of the proposed algorithm were proved. Finally, the system performance of the proposed algorithm is verified by simulation. The results show that the proposed algorithm can converge within a finite number of steps. Compared with other benchmark schemes, the proposed algorithm has better performance in reducing system energy consumption, reducing moving edge response delay and system total delay.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Zha, Yukun, Hui Zhi y Xiaotong Fang. "Cooperative computing schemes in wireless sensor networks". IET Communications 14, n.º 21 (diciembre de 2020): 3784–90. http://dx.doi.org/10.1049/iet-com.2019.1162.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Fan, Lisheng, Junhui Zhao, George K. Karagiannidis y Rose Qingyang Hu. "Edge Caching and Computing for Wireless Networks". Wireless Communications and Mobile Computing 2022 (21 de abril de 2022): 1–2. http://dx.doi.org/10.1155/2022/9756304.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Park, Chongmyung, Chungsan Lee, Youngtae Jo y Inbum Jung. "Distributed Computing Models for Wireless Sensor Networks". Journal of KIISE 41, n.º 11 (15 de noviembre de 2014): 958–66. http://dx.doi.org/10.5626/jok.2014.41.11.958.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Li, Songze, Qian Yu, Mohammad Ali Maddah-Ali y A. Salman Avestimehr. "A Scalable Framework for Wireless Distributed Computing". IEEE/ACM Transactions on Networking 25, n.º 5 (octubre de 2017): 2643–54. http://dx.doi.org/10.1109/tnet.2017.2702605.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Makoond, B., S. Khaddaj, D. CC Ong, R. Oudrhiri y M. Tunnicliffe. "Distributed Computing Techniques for Wireless Messaging Systems". Journal of Algorithms & Computational Technology 2, n.º 3 (septiembre de 2008): 429–46. http://dx.doi.org/10.1260/174830108785302823.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Wang, Kun, Yunqi Wang, Xiaoxuan Hu, Yanfei Sun, Der-Jiunn Deng, Alexey Vinel y Yan Zhang. "Wireless Big Data Computing in Smart Grid". IEEE Wireless Communications 24, n.º 2 (abril de 2017): 58–64. http://dx.doi.org/10.1109/mwc.2017.1600256wc.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Lorenz, Pascal, Sofiane Hamrioui y Abbas Jamalipour. "Guest Editorial: Next Generation Wireless Computing Systems". IEEE Transactions on Emerging Topics in Computing 6, n.º 4 (1 de octubre de 2018): 551–52. http://dx.doi.org/10.1109/tetc.2018.2872298.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Hu, Xiaoyan, Kai-Kit Wong y Kun Yang. "Wireless Powered Cooperation-Assisted Mobile Edge Computing". IEEE Transactions on Wireless Communications 17, n.º 4 (abril de 2018): 2375–88. http://dx.doi.org/10.1109/twc.2018.2794345.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Sarma, E. y Pillai Pillai. "Soft Computing for Robust Secure Wireless Reception". Defence Science Journal 59, n.º 5 (24 de septiembre de 2009): 517–23. http://dx.doi.org/10.14429/dsj.59.1554.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Imielinski, Tomasz y B. R. Badrinath. "Mobile wireless computing: challenges in data management". Communications of the ACM 37, n.º 10 (octubre de 1994): 18–28. http://dx.doi.org/10.1145/194313.194317.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Alfaqawi, Mohammed, Mohamed Hadi Habaebi, Md Rafiqul Islam y Mohammad Umar Siddiqi. "Energy Harvesting Network With Wireless Distributed Computing". IEEE Systems Journal 13, n.º 3 (septiembre de 2019): 2605–16. http://dx.doi.org/10.1109/jsyst.2019.2893248.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Kenyeres, M., J. Kenyeres y V. Skorpil. "Split Distributed Computing in Wireless Sensor Networks". Radioengineering 24, n.º 3 (15 de septiembre de 2015): 749–56. http://dx.doi.org/10.13164/re.2015.0749.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Drew, Wilfred (Bill). "Wireless networks: new meaning to ubiquitous computing". Journal of Academic Librarianship 29, n.º 2 (febrero de 2003): 102–6. http://dx.doi.org/10.1016/s0099-1333(02)00420-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Datla, Dinesh, Haris I. Volos, S. M. Hasan, Jeffrey H. Reed y Tamal Bose. "Wireless distributed computing in cognitive radio networks". Ad Hoc Networks 10, n.º 5 (julio de 2012): 845–57. http://dx.doi.org/10.1016/j.adhoc.2011.04.002.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Li, Feng, Shibo He, Jun Luo, Mohan Gurusamy y Junshan Zhang. "Editorial: Green computing in Wireless Sensor Networks". Computer Networks 150 (febrero de 2019): 266–68. http://dx.doi.org/10.1016/j.comnet.2018.11.007.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Schiller, J. "Review: Mobile Commerce and Wireless Computing Systems". Computer Journal 47, n.º 2 (1 de febrero de 2004): 272–73. http://dx.doi.org/10.1093/comjnl/47.2.272.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Hills, A. "Wireless Andrew [mobile computing for university campus]". IEEE Spectrum 36, n.º 6 (junio de 1999): 49–53. http://dx.doi.org/10.1109/6.769269.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Chien, Charles, Sean Nazareth, Paul Lettieri, Stephen Molloy, Brian Schoner, Walter A. Boring IV, Joey Chen, Christopher Deng, William H. Mangione-Smith y Rajeev Jain. "An integrated testbed for wireless multimedia computing". Journal of VLSI signal processing systems for signal, image and video technology 13, n.º 2-3 (agosto de 1996): 105–24. http://dx.doi.org/10.1007/bf01130401.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía