The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
Filters
Page 41 of The Journal of Information and Image Management Vol. 17, Issue 8
[page]
1984
The Journal of Information and Image Management
Bretford Manufacturing, Inc. has developed the MTT-2 Mobile Terminal Table for CRT terminals with separate key- boards. ...
Designed for microfilming of engineering drawings and records, the cameras offer infinitely variable reduction ratios from 6 to 36X, with preselected stops at 6, 8, 12, 16, 20, 24 and 30X. ...
The Importance of Adaptive Applications in Mobile Wireless Networks
2006
2006 International Conference on Software in Telecommunications and Computer Networks
In this paper, we illustrate the importance of applications' adaptability and QoS awareness in mobile wireless networks. ...
We utilize a "Mobile QoS Adaptation" strategy aiming to deal with the inconsistencies arising from mobility events in a wireless mobile environment. ...
of interest during our study is the variable user density in each environment and the distribution percentage of each call type in a given user population. ...
doi:10.1109/softcom.2006.329727
fatcat:52ggvljfgngeznx335pheyih74
Development of a Smart Home Control System Based on Mobile Internet Technology
2016
International Journal of Smart Home
With the rapid development of mobile internet technology and the continuous improvement of our living standard, our demands for smart home are also increasing. ...
At last we develop Pad and smart phone software. The system has multiple functions like monitor house, open and close curtains automatically, give an alarm, etc. ...
Pad Software Development After the software of Pad login in, there is a button that can connect to smart terminal via Bluetooth. ...
doi:10.14257/ijsh.2016.10.3.28
fatcat:gpmbmj36pjf55frapusewf5vci
Predictable, Lightweight Management Agents
[chapter]
2002
Lecture Notes in Computer Science
In this paper we present an active, or programmable, packet system, SNAP (Safe and Nimble Active Packets) that can be used to provide flexible, lightweight network management with predictable resource ...
SNAP is efficient enough to support both centralized polling and mobile agent approaches; furthermore, its resource predictability prevents malicious or erroneous agents from running amok in the network ...
If mobile agents are such a panacea for distributed management, why do they not appear more frequently in actual management systems? ...
doi:10.1007/3-540-36199-5_9
fatcat:7lxvglpolbdrhcizfqhnv5tyza
Performance assertions for mobile devices
2006
Proceedings of the 2006 international symposium on Software testing and analysis - ISSTA'06
This paper presents the implementation and application of the performance assertions in mobile device software. ...
When applying performance assertions for such systems, we have discovered and resolved a number of issues in assertion specification, matching, and evaluation that were unresolved in previous research. ...
This number may be calculated only somewhere inside the file manager system. In assertions that occur in the same process, such information can be stored in global variables or objects. ...
doi:10.1145/1146238.1146264
dblp:conf/issta/LenceviciusM06
fatcat:btbcwydt3fbdxepkoo5xr66ute
A Trustworthy Mobile Agent Infrastructure for Network Management
2007
2007 10th IFIP/IEEE International Symposium on Integrated Network Management
Despite several advantages inherent in mobile-agentbased approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a ...
Furthermore, security for distributed management is a major concern; agent-based management systems inherit the security risks of mobile agents. ...
CONCLUSIONS AND FUTURE WORK Mobile agents have introduced a powerful software paradigm, able to perform complex management tasks while addressing issues of scalability and flexibility in distributed network ...
doi:10.1109/inm.2007.374803
dblp:conf/im/KoliousisS07
fatcat:rhqadkf4szfkvkyahbm2a2uby4
Towards a Cognitive Handoff for the Future Internet: Model-driven Methodology and Taxonomy of Scenarios
[article]
2011
arXiv
pre-print
But, the development of cognitive handoffs is a challenging task that has not been properly addressed in the literature. ...
We applied the proposed methodology and obtained the following results: (i) a correspondence between handoff purposes and quantitative environment information, (ii) a novel taxonomy of handoff mobility ...
of possible mobility scenarios is infinite. ...
arXiv:1102.2291v1
fatcat:cdhpwww5brf3pdc4wlbdhyjup4
QoP and QoS Policy Cognizant Module Composition
2010
2010 IEEE International Symposium on Policies for Distributed Systems and Networks
Component-based software engineering is generally recognized as one of the best methods to develop, deploy, and manage increasingly complex software systems. ...
In this paper, we introduce a framework that enables individual software components to specify their requires-provides interfaces in a policy dependent way. ...
and a mobile phone located in iraq . ...
doi:10.1109/policy.2010.16
dblp:conf/policy/SeymerSWJ10
fatcat:paltncalabdfnp6ljrfvt2a3ai
Verification of Embedded Software: Problems and Perspectives
[chapter]
2001
Lecture Notes in Computer Science
Such embedded software is often safety-critical, so that a software failure might create a safety hazard in the equipment and put human life in danger. ...
However in the area of embedded software, errors are hardly tolerable. ...
through reachability), parts of the software (such as elementary loops in basic functions) must be proved to effectively terminate. ...
doi:10.1007/3-540-45449-7_8
fatcat:3esnfv76hfarbbv5n7ry7epr4u
Theory and Implementation of an Adaptive Middleware for Ubiquitous Computing Systems
2016
Journal of Information Processing
It supports general-purpose software components and the relocation of the components according to policies described in the language. ...
The system introduces the relocation of software components to define functions between computers as a basic mechanism for adaptation on ubiquitous computing. ...
There have been several techniques to relocate software components between computers, e.g, mobile agents, code mobility, and remote evaluation [21] . ...
doi:10.2197/ipsjjip.24.878
fatcat:4w6qog7225da7jjluzrq6osl4y
Robust Self-stabilizing Clustering Algorithm
[chapter]
2006
Lecture Notes in Computer Science
Mobile routers may move randomly; thus, the network's topology may change rapidly and unpredictably. Such network cannot rely on centralized and organized network management. ...
In addition, a cluster is required to obey to certain constraints that are used for network management, routing methods, resource allocation, etc. ...
Thus, the clustering management with GDMAC requires less overhead than the clustering management with DMAC in highly mobile environment. ...
doi:10.1007/11945529_29
fatcat:2cpkb6l5pfcw3lit6vcfbdmwhu
Location Polling Algorithm for Alerting Service Based on Location
[chapter]
2005
Lecture Notes in Computer Science
Location Alerting Service is a push service that informs users whether predefined conditions be satisfied based on periodic acquisitions of location data from mobile terminals for several purposes such ...
Polling the location of terminal is one of the basic functional requirements of this service. ...
If there is a gradual increase in the use of location-based service and the necessity of alerting service, AlertPoint method seems efficient in managing the system and the network load. ...
doi:10.1007/11599289_10
fatcat:onxsgr26vbef7d3ndsg3a5tegq
Mobile databases
2004
SIGMOD record
This paper reports on the main results of a specific action on mobile databases conducted by CNRS in France from ...
As stated in the introduction, the mobility context imposes strong hardware and software constraints. ...
By analyzing the data management requirements of mobile applications under the strong hardware and software constraints introduced by the computing environment, we identified a number of research directions ...
doi:10.1145/1024694.1024708
fatcat:hlc4utswi5f6dkbgdbo4mumk3q
Basic research in computer science and software engineering at SKLCS
2008
Frontiers of Computer Science in China
The State Key Laboratory of Computer Science (SKLCS) is committed to basic research in computer science and software engineering. ...
This paper describes these topics in some detail and summarizes some results obtained in recent years. ...
N Termination of logic programs For a program in any computer language, in addition to having to be correct logically, it should also terminate in a finite amount of time. ...
doi:10.1007/s11704-008-0001-3
fatcat:zgeczciftbc47o5atyg27ingvi
An Approach for Intelligent Database Maintenance of HLR and VLR Databases
2012
International Journal of Engineering and Technology
In mobility management basically is performed by two databases, HLR database and VLR database. ...
A mobile user moves anywhere in mobile networks from one LA to another LA in networks, so location registration for call tracking is always needed. ...
Several approaches have been suggested in the literature for the location management in mobile networks [2] . ...
doi:10.7763/ijet.2012.v4.426
fatcat:4airo3b4rrcspojjp4vb6t6puy
« Previous
Showing results 1 — 15 out of 11,108 results