Skip to Main Content
Keywords: Computer networks
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
International Journal of Pervasive Computing and Communications (2009) 5 (4): 411–427.
Published: 20 November 2009
... Computer networks Wireless Algorithmic languages The rapid advance of wireless communication technology and the proliferation of portable computing devices have made mobile computing possible. The wireless mobile ad hoc network is one possibility to satisfy the growing enthusiasm toward...
Journal Articles
International Journal of Pervasive Computing and Communications (2009) 5 (4): 448–475.
Published: 20 November 2009
...D.A. Agarwal; D.A. Tran; Yarvis; Daniel Kraft; Marc Bechler; Hans‐Joachim Hof; Frank Pählke; Lars Wolf Purpose Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes...
Journal Articles
Journal Articles
International Journal of Pervasive Computing and Communications (2009) 5 (2): 163–186.
Published: 26 June 2009
... is the motivation driving this research. Victor Zamudio can be contacted at: vic.zamudio@ieee.org © Emerald Group Publishing Limited 2009 Computer networks Intelligent networks Intelligent agents One vision for the future is that people will inhabit high‐tech environments in which services...
Journal Articles
International Journal of Pervasive Computing and Communications (2009) 5 (2): 187–207.
Published: 26 June 2009
... with minimum overhead. This scheme is independent of the routing protocol used in a multi‐hop network. Abraham George can be contacted at: aageorgee@gmail.com © Emerald Group Publishing Limited 2009 Computer networks Mobile communication systems Wireless The wide spread use of wireless...
Journal Articles
International Journal of Pervasive Computing and Communications (2008) 4 (4): 354–370.
Published: 21 November 2008
... 2008 Computer networks Wireless Mobile communication systems An initiator queries collaborators about their contextual information by disseminating (flooding) DICHOTOMY discovery requests throughout the wireless network. Collaborators reply to these requests according to their current...
Journal Articles
International Journal of Pervasive Computing and Communications (2008) 4 (3): 268–278.
Published: 05 September 2008
...)), are supported by SCs (Figure 3 (c)) that interact with the mobile core network. In OSA, the AS issues requests to the SCS. Two methods for processing request are provided by the OSA SCS. © Emerald Group Publishing Limited 2008 Communication technologies Computer networks Mobile communication...
Journal Articles
Journal Articles
International Journal of Pervasive Computing and Communications (2008) 4 (1): 50–60.
Published: 04 April 2008
... information to their mobile clients in the network. The broadcasted information includes the following: Sherali Zeadally can be contacted at: szeadally@udc.edu © Emerald Group Publishing Limited 2008 Wireless Computer networks Future generation wireless networks are envisioned...
Journal Articles
International Journal of Pervasive Computing and Communications (2008) 4 (1): 40–49.
Published: 04 April 2008
... schemes, the key‐chain scheme and the group entry and exit register (GEER) scheme. The key‐chain scheme slightly modifies basic layer‐2 linking for wireless ad hoc and infrastructure LANs. GEER is a centralized scheme. Computer networks Meshes Wireless Recently, the connection...
Journal Articles
International Journal of Pervasive Computing and Communications (2008) 4 (1): 92–109.
Published: 04 April 2008
... regarding a technical gadget (X, Y), the camera (Y) as well as the mobile phone (X) does influence this opinion because being a subset of the inquired. Consequently, the object (X, Y) consists of the combined distinct subsets. Computer networks Trust The need of trust in networks indulging...
Journal Articles
Journal Articles
International Journal of Pervasive Computing and Communications (2008) 4 (1): 77–91.
Published: 04 April 2008
... © Emerald Group Publishing Limited 2008 Wireless Computer networks Home networks are just about to enter millions of private homes. Although they are mainly used to share printers and broadband connections among different computers, they will soon become the preferred way...
Journal Articles
International Journal of Pervasive Computing and Communications (2008) 4 (1): 61–76.
Published: 04 April 2008
... that FBSR is not only reliable but also energy efficient. Originality/value The paper introduces a novel routing scheme for wireless sensor networks. Zhen Cao can be contacted at: caozhen@infosec.pku.edu.cn © Emerald Group Publishing Limited 2008 Wireless Computer networks...
Journal Articles
International Journal of Pervasive Computing and Communications (2008) 4 (1): 124–140.
Published: 04 April 2008
... processes easily. K.L. Eddie Law can be contacted at: eddie@ee.ryerson.ca © Emerald Group Publishing Limited 2008 Wireless Computer networks Mobile communication systems Portable wireless devices are widely deployed and used nowadays. More and more people are actively involved...

or Create an Account

Close Modal
Close Modal