Gotowa bibliografia na temat „Mobile wireless computing networks”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Mobile wireless computing networks”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Mobile wireless computing networks"
Liu, Zhou-zhou, i Shi-ning Li. "Sensor-cloud data acquisition based on fog computation and adaptive block compressed sensing". International Journal of Distributed Sensor Networks 14, nr 9 (wrzesień 2018): 155014771880225. http://dx.doi.org/10.1177/1550147718802259.
Pełny tekst źródłaWang, Xingzhu. "A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing". Wireless Communications and Mobile Computing 2022 (19.10.2022): 1–12. http://dx.doi.org/10.1155/2022/1499736.
Pełny tekst źródłaJeong, Young-Sik, Jae Dong Lee, Jeong-Bae Lee, Jai-Jin Jung i Jong Hyuk Park. "An Efficient and Securem-IPS Scheme of Mobile Devices for Human-Centric Computing". Journal of Applied Mathematics 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/198580.
Pełny tekst źródłaPatalbansi, Vikram, i Dr G. Prasanna Laxmi. "Mobile Cloud Computing Cryptographic Scheme". Journal of University of Shanghai for Science and Technology 23, nr 06 (19.06.2021): 1148–57. http://dx.doi.org/10.51201/jusst/21/05394.
Pełny tekst źródłaPaliwal, Rakesh, i Irfan Khan. "Design and Analysis of Soft Computing Based Improved Routing Protocol in WSN for Energy Efficiency and Lifetime Enhancement". International Journal on Recent and Innovation Trends in Computing and Communication 10, nr 3 (13.04.2022): 12–24. http://dx.doi.org/10.17762/ijritcc.v10i3.5521.
Pełny tekst źródłaOksiiuk, Oleksandr, i Vadym Krotov. "ANALYSIS AND CHOICE OF ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS BASED ON THE USE THE NEURAL NETWORK". Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 9, nr 1 (3.03.2019): 53–55. http://dx.doi.org/10.5604/01.3001.0013.0921.
Pełny tekst źródłaAlnezari, Amani S., i Nasser-Eddine Rikli. "Achieving Mobile Cloud Computing through Heterogeneous Wireless Networks". International Journal of Communications, Network and System Sciences 10, nr 06 (2017): 107–28. http://dx.doi.org/10.4236/ijcns.2017.106006.
Pełny tekst źródłaZhou, Liang, Honggang Wang i Yi Qian. "Research advance in wireless networks and mobile computing". Telecommunication Systems 60, nr 1 (21.11.2014): 1–2. http://dx.doi.org/10.1007/s11235-014-9916-1.
Pełny tekst źródłaBERENBRINK, PETRA, THOMAS FRIEDETZKY, JÁN MAŇUCH i LADISLAV STACHO. "(QUASI) SPANNERS FOR MOBILE AD HOC NETWORKS". Journal of Interconnection Networks 06, nr 02 (czerwiec 2005): 63–84. http://dx.doi.org/10.1142/s0219265905001320.
Pełny tekst źródłaBrooks, Tyson. "Authenticating Devices in Fog-mobile Edge Computing Environments through a Wireless Grid Resource Sharing Protocol". International Journal of UbiComp 13, nr 2 (30.04.2022): 1–17. http://dx.doi.org/10.5121/iju.2022.13201.
Pełny tekst źródłaRozprawy doktorskie na temat "Mobile wireless computing networks"
Datla, Dinesh. "Wireless Distributed Computing in Cloud Computing Networks". Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/51729.
Pełny tekst źródłaPh. D.
Yang, Zhimin. "Opportunistic Computing in Wireless Networks". The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1267743144.
Pełny tekst źródłaKang, Jong Hee. "Location-aware information access through wireless networks /". Thesis, Connect to this title online; UW restricted, 2006. http://hdl.handle.net/1773/6878.
Pełny tekst źródłaLi, Yue. "Edge computing-based access network selection for heterogeneous wireless networks". Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1S042/document.
Pełny tekst źródłaTelecommunication network has evolved from 1G to 4G in the past decades. One of the typical characteristics of the 4G network is the coexistence of heterogeneous radio access technologies, which offers end-users the capability to connect them and to switch between them with their mobile devices of the new generation. However, selecting the right network is not an easy task for mobile users since access network condition changes rapidly. Moreover, video streaming is becoming the major data service over the mobile network where content providers and network operators should cooperate to guarantee the quality of video delivery. In order to cope with this context, the thesis concerns the design of a novel approach for making an optimal network selection decision and architecture for improving the performance of adaptive streaming in the context of a heterogeneous network. Firstly, we introduce an analytical model (i.e. linear discrete-time system) to describe the network selection procedure considering one traffic class. Then, we consider the design of a selection strategy based on foundations from linear optimal control theory, with the objective to maximize network resource utilization while meeting the constraints of the supported services. Computer simulations with MATLAB are carried out to validate the efficiency of the proposed mechanism. Based on the same principal we extend this model with a general analytical model describing the network selection procedures in heterogeneous network environments with multiple traffic classes. The proposed model was, then, used to derive a scalable mechanism based on control theory, which allows not only to assist in steering dynamically the traffic to the most appropriate network access but also helps in blocking the residual traffic dynamically when the network is congested by adjusting dynamically the access probabilities. We discuss the advantages of a seamless integration with the ANDSF. A prototype is also implemented into ns-3. Simulation results sort out that the proposed scheme prevents the network congestion and demonstrates the effectiveness of the controller design, which can maximize the network resources allocation by converging the network workload to the targeted network occupancy. Thereafter, we focus on enhancing the performance of DASH in a mobile network environment for the users which has one access network. We introduce a novel architecture based on MEC. The proposed adaptation mechanism, running as an MEC service, can modify the manifest files in real time, responding to network congestion and dynamic demand, thus driving clients towards selecting more appropriate quality/bitrate video representations. We have developed a virtualized testbed to run the experiment with our proposed scheme. The simulation results demonstrate its QoE benefits compared to traditional, purely client-driven, bitrate adaptation approaches since our scheme notably improves both on the achieved MOS and on fairness in the face of congestion. Finally, we extend the proposed the MEC-based architecture to support the DASH service in a multi-access heterogeneous network in order to maximize the QoE and fairness of mobile users. In this scenario, our scheme should help users select both video quality and access network and we formulate it as an optimization problem. This optimization problem can be solved by IBM CPLEX tool. However, this tool is time-consuming and not scalable. Therefore, we introduce a heuristic algorithm to make a sub-optimal solution with less complexity. Then we implement a testbed to conduct the experiment and the result demonstrates that our proposed algorithm notably can achieve similar performance on overall achieved QoE and fairness with much more time-saving compared to the IBM CPLEX tool
Jayaram, Rajeev 1971. "Quality-of-Service Provisioning and Resource Reservation Mechanisms for Mobile Wireless Networks". Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc278542/.
Pełny tekst źródłaLong, Men Wu Chwan-Hwa. "Roaming authentication and end-to-end authentication in wireless security". Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/doctoral/LONG_MEN_56.pdf.
Pełny tekst źródłaSamii, Etienne. "Usability design for location based mobile services in wireless metropolitan networks". Hamburg Diplomica-Verl, 2006. http://d-nb.info/987370928/04.
Pełny tekst źródłaMahmoud, Qusay H. "Evolution of network computing paradigms : applications of mobile agents in wired and wireless networks". Thesis, Middlesex University, 2002. http://eprints.mdx.ac.uk/10745/.
Pełny tekst źródłaSanadhya, Shruti. "Ultra-mobile computing: adapting network protocol and algorithms for smartphones and tablets". Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/52959.
Pełny tekst źródłaKanter, Theo. "Adaptive Personal Mobile Communication, Service Architecture and Protocols". Doctoral thesis, KTH, Microelectronics and Information Technology, IMIT, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3273.
Pełny tekst źródłaKsiążki na temat "Mobile wireless computing networks"
Handbook of wireless networks and mobile computing. New York: Wiley, 2002.
Znajdź pełny tekst źródłaStojmenović, Ivan, red. Handbook of Wireless Networks and Mobile Computing. New York, USA: John Wiley & Sons, Inc., 2002. http://dx.doi.org/10.1002/0471224561.
Pełny tekst źródłaYang, Xiao, Li Jie i Pan Yi 1960-, red. Ad-Hoc and sensor networks: Wireless networks and mobile computing. New York: Nova Science, 2005.
Znajdź pełny tekst źródła1978-, Shatzkamer Kevin, i Wainner Scott, red. IP design for mobile networks. Indianapolis, Ind: Cisco Press, 2009.
Znajdź pełny tekst źródłaZvi, Ganz, i Wongthavarawat Kitti, red. Multimedia wireless networks: Technologies, standards, and QoS. Upper Saddle River, NJ: Prentice Hall PTR, 2004.
Znajdź pełny tekst źródłaAssociation, Information Resources Management. Mobile computing and wireless networks: Concepts, methodologies, tools, and applications. Hershey, PA: Information Science Reference, 2016.
Znajdź pełny tekst źródłaAssociation for Computing Machinery. Mobile networks and applications: MONET. Amsterdam, Netherlands: Baltzer Science Publishers, 1996.
Znajdź pełny tekst źródłaAzzedine, Boukerche, red. Handbook of algorithms for wireless and mobile networks and computing. Boca Raton, FL: Chapman & Hall/CRC, 2005.
Znajdź pełny tekst źródłaA, Ahmad Ashraf M., i Ibrahim Ismail Khalil, red. Multimedia transcoding in mobile and wireless networks. Hershey PA: Medical Information Science Reference, 2008.
Znajdź pełny tekst źródła1965-, Basagni Stefano, red. Mobile ad hoc networking. Hoboken, NJ: John Wiley, 2004.
Znajdź pełny tekst źródłaCzęści książek na temat "Mobile wireless computing networks"
Wang, Jingjing, i Chunxiao Jiang. "Mobile Edge Computing in FANET". W Wireless Networks, 197–287. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-8850-8_5.
Pełny tekst źródłaTang, Ming, i Vincent W. S. Wong. "Deep Reinforcement Learning for Mobile Edge Computing Systems". W Wireless Networks, 175–201. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98064-1_9.
Pełny tekst źródłaWu, Wen, Yujie Tang, Peng Yang, Weiting Zhang i Ning Zhang. "Collaborative Deep Neural Network Inference via Mobile Edge Computing". W Wireless Networks, 263–90. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98064-1_12.
Pełny tekst źródłaPeng, Kai, Yiwen Zhang, Xiaofei Wang, Xiaolong Xu, Xiuhua Li i Victor C. M. Leung. "Computation Offloading in Mobile Edge Computing". W Encyclopedia of Wireless Networks, 216–20. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_331.
Pełny tekst źródłaPeng, Kai, Yiwen Zhang, Xiaofei Wang, Xiaolong Xu, Xiuhua Li i Victor C. M. Leung. "Computation Offloading in Mobile Edge Computing". W Encyclopedia of Wireless Networks, 1–5. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_331-1.
Pełny tekst źródłaToh, C.-K. "Mobile Communications and Computing". W Wireless ATM and Ad-Hoc Networks, 1–15. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6307-5_1.
Pełny tekst źródłaKorpeoglu, Ibrahim, Pravin Bhagwat, Chatschik Bisdikian i Mahmoud Naghshineh. "Multiplexed serial wireless connectivity for palmtop computers". W Mobile Networks and Computing, 171–76. Providence, Rhode Island: American Mathematical Society, 2000. http://dx.doi.org/10.1090/dimacs/052/10.
Pełny tekst źródłaPrakash, Ravi, i Mukesh Singhal. "Impact of unidirectional links in wireless ad-hoc networks". W Mobile Networks and Computing, 281–91. Providence, Rhode Island: American Mathematical Society, 2000. http://dx.doi.org/10.1090/dimacs/052/17.
Pełny tekst źródłaShih, Yuan-Yao, Hung-Yu Wei i Ai-Chun Pang. "Fog Computing for Intelligent Mobile and IoT Networks". W Encyclopedia of Wireless Networks, 489–95. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_75.
Pełny tekst źródłaRen, Zhiyuan, Chen Chen i Jun Fu. "Mobile Edge Computing: Low Latency and High Reliability". W Encyclopedia of Wireless Networks, 873–77. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_84.
Pełny tekst źródłaStreszczenia konferencji na temat "Mobile wireless computing networks"
R Simpson, William. "Wireless Computing and it Ecosystems". W Fifth International Conference on Wireless & Mobile Networks. Academy & Industry Research Collaboration Center (AIRCC), 2013. http://dx.doi.org/10.5121/csit.2013.3705.
Pełny tekst źródłaAgrawal, Prathima, i David Famolari. "Mobile computing in next generation wireless networks". W the 3rd international workshop. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/313239.313277.
Pełny tekst źródłaAvvenuti, Marco, Paolo Corsini, Paolo Masci i Alessio Vecchio. "Opportunistic computing for wireless sensor networks". W 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems. IEEE, 2007. http://dx.doi.org/10.1109/mobhoc.2007.4428751.
Pełny tekst źródłaSelvaraju, Shunmuga Priyan, Ali Balador, Hossein Fotouhi, Maryam Vahabi i Mats Bjorkman. "Network Management in Heterogeneous IoT Networks". W 2021 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2021. http://dx.doi.org/10.1109/iwcmc51323.2021.9498801.
Pełny tekst źródłaKaur, Kirandeep, i Satinder Kaur. "A Brief Review of Energy Efficient Protocols in Mobile Ad hoc Networks". W International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.36.
Pełny tekst źródłaZhan, Jing, Huanguo Zhang, Liqiang Zhang i Mingdi Xu. "Trusted Computing Enabled System for Wireless Networks". W 2007 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2007. http://dx.doi.org/10.1109/wicom.2007.547.
Pełny tekst źródłaVu, Thuong Van, Thi Mai Trang Nguyen, Guy Pujolle i Nadia Boukhatem. "DODEX+: A new network coding scheme for mesh networks in mobile cloud computing". W 2014 Wireless Days (WD). IEEE, 2014. http://dx.doi.org/10.1109/wd.2014.7020796.
Pełny tekst źródłaDong, Xiaogang, Zheng Wan i Changshou Deng. "Optimization of Wireless Power Transfer for Wireless-Powered Mobile Edge Computing". W 2022 International Conference on Computer Communications and Networks (ICCCN). IEEE, 2022. http://dx.doi.org/10.1109/icccn54977.2022.9868924.
Pełny tekst źródłaFragouli, Christina. "Network Coding for Dynamically Changing Networks". W 2008 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2008. http://dx.doi.org/10.1109/iwcmc.2008.8.
Pełny tekst źródłaWang, Zhi, Bo Yu, Qi Chen i Chuanshan Gao. "Wireless Grid Computing over Mobile Ad-Hoc Networks with Mobile Agent". W 2005 First International Conference on Semantics, Knowledge and Grid. IEEE, 2005. http://dx.doi.org/10.1109/skg.2005.146.
Pełny tekst źródłaRaporty organizacyjne na temat "Mobile wireless computing networks"
Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, grudzień 2005. http://dx.doi.org/10.21236/ada442751.
Pełny tekst źródłaPursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2002. http://dx.doi.org/10.21236/ada404365.
Pełny tekst źródłaPursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2001. http://dx.doi.org/10.21236/ada390176.
Pełny tekst źródłaMichail, Anastassios, i Anthony Ephremides. Routing Algorithms in All-Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1997. http://dx.doi.org/10.21236/ada440810.
Pełny tekst źródłaBakshi, Bikram S., P. Krishna, N. H. Vaidya i D. K. Pradhan. Providing Seamless Communications in Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1995. http://dx.doi.org/10.21236/ada637094.
Pełny tekst źródłaSivalingam, Krishna M. Energy Efficient Network Protocols for Wireless and Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, listopad 2001. http://dx.doi.org/10.21236/ada400626.
Pełny tekst źródłaGoldsby, Michael E., Michael M. Johnson, Dominique Marie Kilman, Neal Robert Bierbaum, Helen Y. Chen, Heidi R. Ammerlahn, Rose P. Tsang i David M. Nicol. Robust message routing for mobile (wireless) ad hoc networks. Office of Scientific and Technical Information (OSTI), styczeń 2004. http://dx.doi.org/10.2172/918216.
Pełny tekst źródłaYeh, Edmund M. Connectivity and Resilience in Large-Scale Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, wrzesień 2012. http://dx.doi.org/10.21236/ada577083.
Pełny tekst źródłaRoy, Sumit. Telecommunication Networks for Mobile & Distributed Communications/Computing. Fort Belvoir, VA: Defense Technical Information Center, grudzień 2001. http://dx.doi.org/10.21236/ada418978.
Pełny tekst źródłaMuchnik, Ilya B., William M. Pottenger i Nikita I. Lytkin. Anomaly Detection by Reasoning from Evidence in Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2008. http://dx.doi.org/10.21236/ada501011.
Pełny tekst źródła