Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-15 of 15
Keywords: Computer networks
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Autonomous broadcast pruning in wireless ad hoc networks using coverage estimation
Available to Purchase
International Journal of Pervasive Computing and Communications (2009) 5 (4): 411–427.
Published: 20 November 2009
... Computer networks Wireless Algorithmic languages The rapid advance of wireless communication technology and the proliferation of portable computing devices have made mobile computing possible. The wireless mobile ad hoc network is one possibility to satisfy the growing enthusiasm toward...
Journal Articles
Design and evaluation of a security architecture for ad hoc networks
Available to Purchase
International Journal of Pervasive Computing and Communications (2009) 5 (4): 448–475.
Published: 20 November 2009
...D.A. Agarwal; D.A. Tran; Yarvis; Daniel Kraft; Marc Bechler; Hans‐Joachim Hof; Frank Pählke; Lars Wolf Purpose Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes...
Journal Articles
Performance characteristics of location‐based group membership and data consistency algorithms in mobile ad hoc networks
Available to Purchase
International Journal of Pervasive Computing and Communications (2009) 5 (4): 497–516.
Published: 20 November 2009
... for most mobile hosts, then the size can be small to optimize performance. Mobile communication systems Computer networks Performance testing Many applications operate in mobile ad hoc networking environments that have no fixed connectivity infrastructure. Many of these applications...
Journal Articles
Understanding and avoiding interaction‐based instability in pervasive computing environments
Available to Purchase
International Journal of Pervasive Computing and Communications (2009) 5 (2): 163–186.
Published: 26 June 2009
... is the motivation driving this research. Victor Zamudio can be contacted at: vic.zamudio@ieee.org © Emerald Group Publishing Limited 2009 Computer networks Intelligent networks Intelligent agents One vision for the future is that people will inhabit high‐tech environments in which services...
Journal Articles
A multi‐hop mobility management protocol for heterogeneous wireless networks: OTHER ARTICLE
Available to Purchase
International Journal of Pervasive Computing and Communications (2009) 5 (2): 187–207.
Published: 26 June 2009
... with minimum overhead. This scheme is independent of the routing protocol used in a multi‐hop network. Abraham George can be contacted at: aageorgee@gmail.com © Emerald Group Publishing Limited 2009 Computer networks Mobile communication systems Wireless The wide spread use of wireless...
Journal Articles
Expanding mobile ad hoc grids with wired grid resources
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (4): 354–370.
Published: 21 November 2008
... 2008 Computer networks Wireless Mobile communication systems An initiator queries collaborators about their contextual information by disseminating (flooding) DICHOTOMY discovery requests throughout the wireless network. Collaborators reply to these requests according to their current...
Journal Articles
An OSA service capability server for mobile services
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (3): 268–278.
Published: 05 September 2008
...)), are supported by SCs (Figure 3 (c)) that interact with the mobile core network. In OSA, the AS issues requests to the SCS. Two methods for processing request are provided by the OSA SCS. © Emerald Group Publishing Limited 2008 Communication technologies Computer networks Mobile communication...
Journal Articles
An improved efficient performance design with multiple channels and bandwidth allocation strategy for mobile ad hoc networks
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (3): 279–298.
Published: 05 September 2008
..., when a mobile node waits for the backoff time in the contention period, the data sub‐channel may still send data signals to improve the throughput; that is, it uses the bandwidth of the control channel to wait for the backoff time. Mobile communication systems Computer networks Bandwidths...
Journal Articles
An efficient wireless network discovery scheme for heterogeneous access environments
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (1): 50–60.
Published: 04 April 2008
... information to their mobile clients in the network. The broadcasted information includes the following: Sherali Zeadally can be contacted at: szeadally@udc.edu © Emerald Group Publishing Limited 2008 Wireless Computer networks Future generation wireless networks are envisioned...
Journal Articles
A cross‐layer design for heterogeneous routing in wireless mesh networks
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (1): 40–49.
Published: 04 April 2008
... schemes, the key‐chain scheme and the group entry and exit register (GEER) scheme. The key‐chain scheme slightly modifies basic layer‐2 linking for wireless ad hoc and infrastructure LANs. GEER is a centralized scheme. Computer networks Meshes Wireless Recently, the connection...
Journal Articles
Forming a context‐sensitive web of trust by relying on sentimentally like‐minded
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (1): 92–109.
Published: 04 April 2008
... regarding a technical gadget (X, Y), the camera (Y) as well as the mobile phone (X) does influence this opinion because being a subset of the inquired. Consequently, the object (X, Y) consists of the combined distinct subsets. Computer networks Trust The need of trust in networks indulging...
Journal Articles
LooM: An anonymity quantification method in pervasive computing environments
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (1): 110–123.
Published: 04 April 2008
..., and Pi+ (Pi−) is the proportion of positive (negative) examples in F belonging to class i. The relationship between H0 and HF is shown in Figure 2 . © Emerald Group Publishing Limited 2008 Computer...
Journal Articles
HoNeY: leveraging the MHP to provide HOme NEtwork interoperabilitY
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (1): 77–91.
Published: 04 April 2008
... © Emerald Group Publishing Limited 2008 Wireless Computer networks Home networks are just about to enter millions of private homes. Although they are mainly used to share printers and broadband connections among different computers, they will soon become the preferred way...
Journal Articles
FBSR: feedback‐based secure routing protocol for wireless sensor networks
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (1): 61–76.
Published: 04 April 2008
... that FBSR is not only reliable but also energy efficient. Originality/value The paper introduces a novel routing scheme for wireless sensor networks. Zhen Cao can be contacted at: caozhen@infosec.pku.edu.cn © Emerald Group Publishing Limited 2008 Wireless Computer networks...
Journal Articles
Ubiquitous content formulations for real‐time information communications
Available to Purchase
International Journal of Pervasive Computing and Communications (2008) 4 (1): 124–140.
Published: 04 April 2008
... processes easily. K.L. Eddie Law can be contacted at: eddie@ee.ryerson.ca © Emerald Group Publishing Limited 2008 Wireless Computer networks Mobile communication systems Portable wireless devices are widely deployed and used nowadays. More and more people are actively involved...
