Mobile Computing Handbook

The debut of small, inexpensive, yet powerful portable computers has coincided with the exponential growth of the Internet, making it possible to access computing resources and information at nearly any location at almost any time. This new trend, mobile computing, is poised to become the main techn...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Những tác giả chính: Ilyas, Mohammad, Mahgoub, Imad
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1421
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1421
record_format dspace
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description The debut of small, inexpensive, yet powerful portable computers has coincided with the exponential growth of the Internet, making it possible to access computing resources and information at nearly any location at almost any time. This new trend, mobile computing, is poised to become the main technology driver for a decade to come. There are many challenges that make mobile computing a hot research and development area. Researchers, engineers, and practitioners need a comprehensive resource and reference to aid them in their quest to make the potential of this technology a reality. Mobile Computing Handbook explores the benefits and challenges of the field, and includes the latest insight into the major topics of this emerging discipline. It provides, in 40 chapters written by industry experts, technical information about all aspects of mobile computing, from basic concepts to research-level material, with learned analysis of future directions. This handbook captures the present state of the field and serves as an invaluable source of reference material. Following an introduction and an overview of mobile applications, the book explores location management, location-based services, caching strategies, power management, performance and modeling, security and privacy, and many other subjects.
format Book
author Ilyas, Mohammad
Mahgoub, Imad
spellingShingle Ilyas, Mohammad
Mahgoub, Imad
Mobile Computing Handbook
author_facet Ilyas, Mohammad
Mahgoub, Imad
author_sort Ilyas, Mohammad
title Mobile Computing Handbook
title_short Mobile Computing Handbook
title_full Mobile Computing Handbook
title_fullStr Mobile Computing Handbook
title_full_unstemmed Mobile Computing Handbook
title_sort mobile computing handbook
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1421
_version_ 1757663266462498816
spelling oai:scholar.dlu.edu.vn:DLU123456789-14212009-12-02T07:20:57Z Mobile Computing Handbook Ilyas, Mohammad Mahgoub, Imad The debut of small, inexpensive, yet powerful portable computers has coincided with the exponential growth of the Internet, making it possible to access computing resources and information at nearly any location at almost any time. This new trend, mobile computing, is poised to become the main technology driver for a decade to come. There are many challenges that make mobile computing a hot research and development area. Researchers, engineers, and practitioners need a comprehensive resource and reference to aid them in their quest to make the potential of this technology a reality. Mobile Computing Handbook explores the benefits and challenges of the field, and includes the latest insight into the major topics of this emerging discipline. It provides, in 40 chapters written by industry experts, technical information about all aspects of mobile computing, from basic concepts to research-level material, with learned analysis of future directions. This handbook captures the present state of the field and serves as an invaluable source of reference material. Following an introduction and an overview of mobile applications, the book explores location management, location-based services, caching strategies, power management, performance and modeling, security and privacy, and many other subjects. INTRODUCTION AND APPLICATIONS OF MOBILE COMPUTING Wearable Computing Asim Smailagic and Daniel P. Siewiorek Developing Mobile Applications: A Lime Primer Gian Pietro Picco, Amy L. Murphy, and Gruia-Catalin Roman Pervasive Application Development: Approaches and Pitfalls Guruduth Banavar, Norman Cohen, Danny Soroker ISAM, Joining Context-Awareness and Mobility to Building Pervasive Applications Iara Augustin, Adenauer Corrêa Yamin, Jorge Luis Victória Barbosa, Luciano Cavalheiro da Silva, Rodrigo Araújo Real, Gustavo Frainer, Gerson Geraldo Honrich Cavalheiro, and Cláudio Fernando Resin Geyer Integrating Mobile Wireless Devices into the Computational Grid Thomas Phan, Lloyd Huang, Noel Ruiz, and Rajive Bagrodia Multimedia Messaging Service Syed A. Ahson LOCATION MANAGEMENT A Scheme for Nomadic Hosts Location Management Using DNS Ramandeep Singh Khurana, Hesham El-Rewini, and Imad Mahgoub Location Management Techniques for Mobile Computing Environments Riky Subrata and Albert Y. Zomaya Locating Mobile Objects Evaggelia Pitoura, George Samaras, and Georgia Kastidou Dependable Message Delivery to Mobile Units Amy L. Murphy, Gruia-Catalin Roman, and George Varghese LOCATION-BASED SERVICES Location-Dependent Query Processing in Mobile Computing Aye Yasemin Seydim, Margaret H. Dunham Simulation Models and Tool for Mobile Location-Dependent Information Access Uwe Kubach, Christian Becker, Illya Stepanov, and Jing Tian Context-Aware Mobile Computing Dr. Rittwik Jana and Dr. Yih-Farn Chen Mobile Agent Middlewares for Context-Aware Applications Paolo Bellavista, Dario Bottazzi, Antonio Corradi, Rebecca Montanari, Silvia Vecchi CACHING STRATEGIES Cache Management in Wireless and Mobile Computing Environments Yu Du and Sandeep K.S. Gupta Cache Invalidation Schemes in Mobile Environments Edward Chan, Joe C.H. Yuen, and Kam-Yiu Lam Hoarding in Mobile Computing Environments Yücel Saygin Power-Aware Cache Management in Mobile Environments Guohong Cao Energy Efficient Selective Cache Invalidation Kian-Lee Tan MOBILE AND AD HOC WIRELESS NETWORKS I Self-Policing Mobile Ad Hoc Networks Sonja Buchegger and Jean-Yves Le Boudec Securing Mobile Ad Hoc Networks Panagiotis Papadimitratos and Zygmunt J. Haas Ad Hoc Network Security Hao Yang, Haiyan Luo, Jiejun Kong, Fan Ye, Petros Zerfos, Songwu Lu, Lixia Zhang Modeling Distributed Applications for Mobile Ad Hoc Networks Using Attributed Task Graphs Prithwish Basu, Wang Ke, Thomas D.C. Little Medium Access Control Mechanisms in Mobile Ad Hoc Networks Chansu Yu, Ben Lee, Sridhar Kalubandi, and Myungchul Kim MOBILE AND AD HOC WIRELESS NETWORKS II Quality of Service Routing in Mobile Ad Hoc Networks: Past and Future Jamal N. Al-Karaki, Ahmed E. Kamal Issues in Scalable Clustered Network Architecture for Mobile Ad Hoc Networks Ben Lee, Chansu Yu, and Sangman Moh Routing and Mobility Management in Wireless Ad Hoc Networks Ravi Sankar Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation Wei Lou and Jie Wu Energy-Efficient Wireless Networks Ionut Cardei and Ding-Zhu Du POWER MANAGEMENT Power Management for Mobile Computers Thomas L. Martin, Daniel P. Siewiorek, Asim Smailagic, and Jolin Warren Power Awareness and Management Techniques Ahmed Abukmail and Abdelsalam (Sumi) Helal Adaptive Algorithmic Power Optimization for Multimedia Workload in Mobile Environments Luca Benini and Andrea Acquaviva Energy-Aware Web Caching over Hybrid Networks Françoise Sailhan and Valérie Issarny Transmitter Power Control in Wireless Computing Savvas Gitzenis and Nicholas Bambos PERFORMANCE AND MODELING A Survey on Mobile Transaction Models Abdelsalam Helal, Santosh Balakrishnan, Margaret Dunham, and Youzhong Liu Analytic Mobility Models of PCS Networks Chien-Hsing Wu Battery Power Management in Portable Devices Vinod Sharma and A. Chockalingam SECURITY AND PRIVACY ASPECTS Challenges in Wireless Security: A Case Study of 802.11 Nikita Borisov Security for Mobile Agents: Issues and Challenges Paolo Bellavista, Antonio Corradi, Corrado Federici, Rebecca Montanari, Daniela Tibaldi Security, Trust, and Privacy in Mobile Computing Environments Lalana Kagal, Jim Parker, Harry Chen, Anupam Joshi, and Tim Finin 2009-12-02T07:20:57Z 2009-12-02T07:20:57Z 2004 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1421 en application/rar CRC Press