11,108 Hits in 3.5 sec

Page 41 of The Journal of Information and Image Management Vol. 17, Issue 8 [page]

1984 The Journal of Information and Image Management  
Bretford Manufacturing, Inc. has developed the MTT-2 Mobile Terminal Table for CRT terminals with separate key- boards.  ...  Designed for microfilming of engineering drawings and records, the cameras offer infinitely variable reduction ratios from 6 to 36X, with preselected stops at 6, 8, 12, 16, 20, 24 and 30X.  ... 

The Importance of Adaptive Applications in Mobile Wireless Networks

Michael Neophytou, Kyriakos Stavrou, Vasos Vassiliou, Andreas Pitsillides
2006 2006 International Conference on Software in Telecommunications and Computer Networks  
In this paper, we illustrate the importance of applications' adaptability and QoS awareness in mobile wireless networks.  ...  We utilize a "Mobile QoS Adaptation" strategy aiming to deal with the inconsistencies arising from mobility events in a wireless mobile environment.  ...  of interest during our study is the variable user density in each environment and the distribution percentage of each call type in a given user population.  ... 
doi:10.1109/softcom.2006.329727 fatcat:52ggvljfgngeznx335pheyih74

Development of a Smart Home Control System Based on Mobile Internet Technology

Yu Chunjiang
2016 International Journal of Smart Home  
With the rapid development of mobile internet technology and the continuous improvement of our living standard, our demands for smart home are also increasing.  ...  At last we develop Pad and smart phone software. The system has multiple functions like monitor house, open and close curtains automatically, give an alarm, etc.  ...  Pad Software Development After the software of Pad login in, there is a button that can connect to smart terminal via Bluetooth.  ... 
doi:10.14257/ijsh.2016.10.3.28 fatcat:gpmbmj36pjf55frapusewf5vci

Predictable, Lightweight Management Agents [chapter]

Jonathan T. Moore, Jessica Kornblum Moore, Scott Nettles
2002 Lecture Notes in Computer Science  
In this paper we present an active, or programmable, packet system, SNAP (Safe and Nimble Active Packets) that can be used to provide flexible, lightweight network management with predictable resource  ...  SNAP is efficient enough to support both centralized polling and mobile agent approaches; furthermore, its resource predictability prevents malicious or erroneous agents from running amok in the network  ...  If mobile agents are such a panacea for distributed management, why do they not appear more frequently in actual management systems?  ... 
doi:10.1007/3-540-36199-5_9 fatcat:7lxvglpolbdrhcizfqhnv5tyza

Performance assertions for mobile devices

Raimondas Lencevicius, Edu Metz
2006 Proceedings of the 2006 international symposium on Software testing and analysis - ISSTA'06  
This paper presents the implementation and application of the performance assertions in mobile device software.  ...  When applying performance assertions for such systems, we have discovered and resolved a number of issues in assertion specification, matching, and evaluation that were unresolved in previous research.  ...  This number may be calculated only somewhere inside the file manager system. In assertions that occur in the same process, such information can be stored in global variables or objects.  ... 
doi:10.1145/1146238.1146264 dblp:conf/issta/LenceviciusM06 fatcat:btbcwydt3fbdxepkoo5xr66ute

A Trustworthy Mobile Agent Infrastructure for Network Management

Alexandros Koliousis, Joseph Sventek
2007 2007 10th IFIP/IEEE International Symposium on Integrated Network Management  
Despite several advantages inherent in mobile-agentbased approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a  ...  Furthermore, security for distributed management is a major concern; agent-based management systems inherit the security risks of mobile agents.  ...  CONCLUSIONS AND FUTURE WORK Mobile agents have introduced a powerful software paradigm, able to perform complex management tasks while addressing issues of scalability and flexibility in distributed network  ... 
doi:10.1109/inm.2007.374803 dblp:conf/im/KoliousisS07 fatcat:rhqadkf4szfkvkyahbm2a2uby4

Towards a Cognitive Handoff for the Future Internet: Model-driven Methodology and Taxonomy of Scenarios [article]

Francisco A. Gonzalez-Horta, Rogerio A. Enriquez-Caldera, Juan M. Ramirez-Cortes, Jorge Martinez-Carballido, Eldamira Buenfil-Alpuche
2011 arXiv   pre-print
But, the development of cognitive handoffs is a challenging task that has not been properly addressed in the literature.  ...  We applied the proposed methodology and obtained the following results: (i) a correspondence between handoff purposes and quantitative environment information, (ii) a novel taxonomy of handoff mobility  ...  of possible mobility scenarios is infinite.  ... 
arXiv:1102.2291v1 fatcat:cdhpwww5brf3pdc4wlbdhyjup4

QoP and QoS Policy Cognizant Module Composition

Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia
2010 2010 IEEE International Symposium on Policies for Distributed Systems and Networks  
Component-based software engineering is generally recognized as one of the best methods to develop, deploy, and manage increasingly complex software systems.  ...  In this paper, we introduce a framework that enables individual software components to specify their requires-provides interfaces in a policy dependent way.  ...  and a mobile phone located in iraq .  ... 
doi:10.1109/policy.2010.16 dblp:conf/policy/SeymerSWJ10 fatcat:paltncalabdfnp6ljrfvt2a3ai

Verification of Embedded Software: Problems and Perspectives [chapter]

Patrick Cousot, Radhia Cousot
2001 Lecture Notes in Computer Science  
Such embedded software is often safety-critical, so that a software failure might create a safety hazard in the equipment and put human life in danger.  ...  However in the area of embedded software, errors are hardly tolerable.  ...  through reachability), parts of the software (such as elementary loops in basic functions) must be proved to effectively terminate.  ... 
doi:10.1007/3-540-45449-7_8 fatcat:3esnfv76hfarbbv5n7ry7epr4u

Theory and Implementation of an Adaptive Middleware for Ubiquitous Computing Systems

Jingtao Sun, Ichiro Satoh
2016 Journal of Information Processing  
It supports general-purpose software components and the relocation of the components according to policies described in the language.  ...  The system introduces the relocation of software components to define functions between computers as a basic mechanism for adaptation on ubiquitous computing.  ...  There have been several techniques to relocate software components between computers, e.g, mobile agents, code mobility, and remote evaluation [21] .  ... 
doi:10.2197/ipsjjip.24.878 fatcat:4w6qog7225da7jjluzrq6osl4y

Robust Self-stabilizing Clustering Algorithm [chapter]

Colette Johnen, Le Huy Nguyen
2006 Lecture Notes in Computer Science  
Mobile routers may move randomly; thus, the network's topology may change rapidly and unpredictably. Such network cannot rely on centralized and organized network management.  ...  In addition, a cluster is required to obey to certain constraints that are used for network management, routing methods, resource allocation, etc.  ...  Thus, the clustering management with GDMAC requires less overhead than the clustering management with DMAC in highly mobile environment.  ... 
doi:10.1007/11945529_29 fatcat:2cpkb6l5pfcw3lit6vcfbdmwhu

Location Polling Algorithm for Alerting Service Based on Location [chapter]

Byung-Ik Ahn, Sung-Bong Yang, Heui-Chae Jin, Jin-Yul Lee
2005 Lecture Notes in Computer Science  
Location Alerting Service is a push service that informs users whether predefined conditions be satisfied based on periodic acquisitions of location data from mobile terminals for several purposes such  ...  Polling the location of terminal is one of the basic functional requirements of this service.  ...  If there is a gradual increase in the use of location-based service and the necessity of alerting service, AlertPoint method seems efficient in managing the system and the network load.  ... 
doi:10.1007/11599289_10 fatcat:onxsgr26vbef7d3ndsg3a5tegq

Mobile databases

Guy Bernard, Pascal Molli, Philippe Pucheral, Claudia Roncancio, Patricia Serrano-Alvarado, Patrick Valduriez, Jalel Ben-othman, Luc Bouganim, Gérôme Canals, Sophie Chabridon, Bruno Defude, Jean Ferrié (+2 others)
2004 SIGMOD record  
This paper reports on the main results of a specific action on mobile databases conducted by CNRS in France from  ...  As stated in the introduction, the mobility context imposes strong hardware and software constraints.  ...  By analyzing the data management requirements of mobile applications under the strong hardware and software constraints introduced by the computing environment, we identified a number of research directions  ... 
doi:10.1145/1024694.1024708 fatcat:hlc4utswi5f6dkbgdbo4mumk3q

Basic research in computer science and software engineering at SKLCS

Jian Zhang, Wenhui Zhang, Naijun Zhan, Yidong Shen, Haiming Chen, Yunquan Zhang, Yongji Wang, Enhua Wu, Hongan Wang, Xueyang Zhu
2008 Frontiers of Computer Science in China  
The State Key Laboratory of Computer Science (SKLCS) is committed to basic research in computer science and software engineering.  ...  This paper describes these topics in some detail and summarizes some results obtained in recent years.  ...  N Termination of logic programs For a program in any computer language, in addition to having to be correct logically, it should also terminate in a finite amount of time.  ... 
doi:10.1007/s11704-008-0001-3 fatcat:zgeczciftbc47o5atyg27ingvi

An Approach for Intelligent Database Maintenance of HLR and VLR Databases

N. Mallikharjuna Rao
2012 International Journal of Engineering and Technology  
In mobility management basically is performed by two databases, HLR database and VLR database.  ...  A mobile user moves anywhere in mobile networks from one LA to another LA in networks, so location registration for call tracking is always needed.  ...  Several approaches have been suggested in the literature for the location management in mobile networks [2] .  ... 
doi:10.7763/ijet.2012.v4.426 fatcat:4airo3b4rrcspojjp4vb6t6puy
« Previous Showing results 1 — 15 out of 11,108 results