Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Mobile Computing"

ADD TO MY LIST
 
Usability Aspects in Pervasive Computing: Needs and Challenges

Author(s): Abdul Wahab Muzaffar | Farooque Azam | Hina Anwar | Ali Saeed Khan
Security Agents: A Mobile Agent Based Trust Model for Cloud Computing

Author(s): Priyank Singh Hada | Ranjita Singh | Mukul Manmohan
Mobile Node Localization in Cellular Networks

Author(s): Yasir Malik | Kishwer Abdul Khaliq | Bessam Abdulrazak | Usman Tariq
IMPACT OF VARIABLE TRANSMISSION RANGE ON MANET PERFORMANCE

Author(s): C.K Nagpal | Maninder Kaur | Shailender Gupta | Bharat Bhushan
A Dynamic Approach for Anomaly Detection in AODV

Author(s): P.VIGNESHWARAN | R. DHANASEKARAN
ROUTING PROTOCOL BEHAVIOUR WITH MULTIPLE CLUSTER HEAD GATEWAY IN MOBILE AD HOC NETWORK

Author(s): Ashish Bagwari | Pankaj Joshi | Vikas Rathi | Vikram Singh Soni
ANALYSIS OF MOBILE AGENT

Author(s): Prakash V. Rajguru | Dr. Sushant B. Deshmukh
Challenging Issues and Limitations of Mobile Computing

Author(s): Deepak G | Dr. Pradeep B S
Application Based Detection Technique for Secure Mobile Ad-hoc Network

Author(s): Kamini Maheshwar | Sapna Bagde | Deshraj Ahirwar
Stepper Motor Controller using XC9572 CPLD through Mobile As a Remote

Author(s): Mohini Ratna Chaurasia | Nitin Naiyar
Water Pressure Loss Analysis of Mobile Machine for Fire Fighting Purpose

Author(s): CheeFai Tan | Ranjit Singh Sarban Singh | Mohd. Rizal Alkahari
Black Hole Detection in MANET Using AODV Routing Protocol

Author(s): Govind Sharma | Manish Gupta
Design of DAODV MANET Routing Protocol

Author(s): G. Ilanchezhiapandian | Dr.P.Sheik Abdul Khader
Method for Reading Sensors and Controlling Actuators Using Audio Interfaces of Mobile Devices

Author(s): Rafael V. Aroca | Aquiles F. Burlamaqui | Luiz M. G. Gonçalves
POWER – AWARE ROUTING IN MANET USING RANDOMIZED CASTING

Author(s): B.Siva kumar | K.Tharani | S.venkatasen
A HYBRID WIRELESS NETWORK MODEL FOR POST DISASTER RELIEF OPERATIONS

Author(s): SK Dwivedi | NK Shukla | Sudhakar Pandey
Data Dissemination in Mobile Computing Environment

Author(s): S. Krishna Mohan Rao | Dr A. Venugopal Reddy
A Mobile Transaction System for Open Networks

Author(s): R. B. Patel | Anu
A Global Mobility Management Scheme for Reducing Overall Handover Latency in IP based VANETs

Author(s): Muhammad Nawaz Khan | Ishtiaq Wahid | Gulzar Mehmood
Frame work for Adaptive Mobile Interface: An Overview

Author(s): Kishor H. Walse | Rajiv V. Dharaskar | V. M. Thakare
Mobile Viruses

Author(s): Pranav R Shah | Yash Shah | Saurabh Madan
Interfacing of Sensor Network to Communication Network for Disaster Management

Author(s): Sanjay Patel | O. P. Vyas | Hansa Mehra
Analysis of Secure Mobile Agent System

Author(s): Rajesh Shrivastava | Pooja Mehta (Gahoi)
Achieving Identity-Based Cryptography in a Personal Digital Assistant Device

Author(s): L. Martínez-Ramos | L. López-García | F. Rodríguez-Henríquez
An Integrated Testbed for Cooperative Perception with Heterogeneous Mobile and Static Sensors

Author(s): Adrián Jiménez-González | José Ramiro Martínez-de Dios | Aníbal Ollero
Evaluation Of Scheduling And Load Balancing Techniques In Mobile Grid Architecture

Author(s): Debabrata Singh | Sandeep Nanda | Sarbeswara Hota | Manas Kumar Nanda
Establishing Security for Group Communication in Multicast Environment

Author(s): B.V.S.S.R.S.Sastry | K.Akshitha | M.V.Vijaya Saradhi
SCRUTINIZING THE VIDEO AND VIDEO RETRIEVAL CONCEPT

Author(s): M. Nazimuzzaman | Himadri S. Saha | Md. Imdadul Islam | M. R. Amin
Video Compression Algorithm Based on Frame Difference Approaches

Author(s): MuzhirShaban Al-Ani | Talal Ali Hammouri
Detection of Rogue Base Station Using MATLAB

Author(s): Ramanpreet Singh | Sukhwinder Singh
A Query-Based SMS Translation in Information Access System

Author(s): Ademola O. Adesina | Kehinde K. Agbele | Nureni A. Azeez | Ademola P. Abidoye
Generic Model to Send Secure Alerts for Utility Companies

Author(s): Galván–Bobadilla I. | Santos–Domínguez M. | Perez–Díaz J.A.
Autonomous Multicamera Tracking on Embedded Smart Cameras

Author(s): Quaritsch Markus | Kreuzthaler Markus | Rinner Bernhard | Bischof Horst | Strobl Bernhard
Broadcasted Location-Aware Data Cache for Vehicular Application

Author(s): Sato Kenya | Koita Takahiro | Fukuda Akira
A mobile and portable trusted computing platform

Author(s): Nepal Surya | Zic John | Liu Dongxi | Jang Julian
Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network

Author(s): Friedlander David | Griffin Christopher | Jacobson Noah | Phoha Shashi | Brooks Richard R
Improving SCTP Performance by Jitter-Based Congestion Control over Wired-Wireless Networks

Author(s): Chen Jyh-Ming | Chu Ching-Hsiang | Wu EricHsiao-Kuang | Tsai Meng-Feng | Wang Jian-Ren
Titan: An Enabling Framework for Activity-Aware "Pervasive Apps" in Opportunistic Personal Area Networks

Author(s): Roggen Daniel | Lombriser Clemens | Rossi Mirco | Tröster Gerhard
A Secure and Robust Connectivity Architecture for Smart Devices and Applications

Author(s): Shon Taeshik | Han Kyusuk | Park JamesJ(Jonghyuk) | Jeong Young-Sik | Lee YangSun
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs

Author(s): Conti Mauro | Di Pietro Roberto | Mancini LuigiV | Mei Alessandro
Mobile Agent-Based Directed Diffusion in Wireless Sensor Networks

Author(s): Chen Min | Kwon Taekyoung | Yuan Yong | Choi Yanghee | Leung Victor CM
Building Flexible Manufacturing Systems Based on Peer-Its

Author(s): Ferscha A | Hechinger M | dos Santos Rocha M | Mayrhofer R | Zeidler A | Riener A | Franz M
MACD-Based Motion Detection Approach in Heterogeneous Networks

Author(s): Chen Yung-Mu | Chung Tein-Yaw | Lai Ming-Yen | Hsu Chih-Hung
Evaluation of Different Power Saving Techniques for MBMS Services

Author(s): Alexiou Antonios | Bouras Christos | Kokkinos Vasileios
CS-DRM: A Cloud-Based SIM DRM Scheme for Mobile Internet

Author(s): Wang Chaokun | Zou Peng | Liu Zhang | Wang Jianmin
Exploring a Hybrid of Geospatial Semantic Information in Ubiquitous Computing Environments

Author(s): Raghda Fouad | Mohamed Hashem | Nagwa Badr | Hanaa Talha
Effect of GSM Phone Radiation on Human Pulse Rate (Heartbeat Rate)

Author(s): A. A. Ayeni | K.T. Braimoh | O. B. Ayeni
Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad-hoc Mobile Networks

Author(s): K Ranganath | L.Naveen Kumar | Y.V.Sreevani
Intelligent Widget Reconfiguration for Mobile Phones

Author(s): Peter K.K. Loh | C.T. Lau | B.H. Chan
Analysis on DNA based Cryptography to Secure Data Transmission

Author(s): S.Jeevidha | Dr.M.S.Saleem Basha | Dr.P.Dhavachelvan
MODELS AND SOLUTIONS FOR THE IMPLEMENTATION OF DISTRIBUTED SYSTEMS

Author(s): Ghencea Adrian | Vatuiu Teodora | Tarca Naiana
A Low-Energy Fast Cyber Foraging Mechanism For Mobile Devices

Author(s): Somayeh Kafaie | Omid Kashefi | Mohsen Sharifi
A Novel Combined SLAM Based on RBPF-SLAM and EIF-SLAM for Mobile System Sensing in a Large Scale Environment

Author(s): Bo He | Shujing Zhang | Tianhong Yan | Tao Zhang | Yan Liang | Hongjin Zhang
Challenges for Mobile Wireless Devices for Next Generation in Pervasive Computing

Author(s): DR. Sanjay Sharma | Pushpinder Singh Patheja | Akhilesh A. Waoo
Mobile SMS Classification: An Application of Text Classification

Author(s): Deepshikha Patel | Monika Bhatnagar
Trusted Mobile Nodes Access Scheme under Wireless Networks

Author(s): Lina Sun | Guiran Chang | Dawei Sun | Lizhong Jin | Jiandong Chen | Xingwei Wang
An Enhanced Secured Dynamic Source Routing Protocol for MANETS

Author(s): G.Lavanya | A. Ebenezer Jeyakumar
CELL PHONE ACCIDENT AVOIDANCE SYSTEM WHILE DRIVING

Author(s): H. ABDUL SHABEER | R.S.D.WAHIDABANU
An Enhanced Authentication Mechanism for IEEE 802.16(e) Mobile Wimax

Author(s): Deepak Kumar Mehto | Rajesh Srivastava
Query Management for Efficient Data Access in Wireless Environment

Author(s): Seema Verma | Rakhee | Savita Kumari
ENHANCED MULTIPATH ROUTING WITH CONGESTION AVOIDANCE FOR 802.11E BASED MOBILE ADHOC NETWORKS

Author(s): Sujatha.P.Terdal | V.D.Mytri | A.Damodaram | Uday.S.B
Guest Editorial

Author(s): Richard Chbeir | Youakim Badr
Guest Editorial

Author(s): Mohammad Al-Rousan | Wei Li | Ahmed Al-Dubai
A Lightweight Model for Mobile Peer-to-Peer File Sharing Systems

Author(s): George Stephan | Badieh Traboulsi | Rabih Dbouk | Sanaa Sharafeddine
Guest Editorial

Author(s): Neeraj Kumar Nehra | Pranay Chaudhuri
A Framework of Transferring Mobile Services with Agent Based Middleware

Author(s): Weidong Zhao | Haifeng Wu | Weihui Dai | Wenjuan Wang | Guangxue Yue
Guest Editorial

Author(s): Tianlong Gu | Shenghui Liu
Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing

Author(s): Jian Yang | Haihang Wang | Jian Wang | Chengxiang Tan | Dingguo Yu
Guest Editorial

Author(s): Mohammad S. Obaidat | José Luis (Sevi) Sevillano
Mobile Platform and Secure Access Approach of UMTS Terminal Based on Trusted Computing

Author(s): Yingyou Wen | Xuena Peng | Shuyi Chen | Hong Zhao
Broadcasting Data Items with Time Constraints Based on On-Demand Multichannel in Ubiquitous Environments

Author(s): Ding-Jung Chiang | Chien-Liang Chen | Chi-Yi Lin | Timothy K. Shih
Guest Editorial

Author(s): Salim Zabir | Jemal H. Abawajy | Farid Ahmed | Joarder Kamruzaman | Mohammad Ataul Karim
Guest Editorial

Author(s): Hsing-Chung Chen | Franz I.S. Ko | Yung-Chen Chou | Shyan-Ming Yuan | Yaw-Chung Chen | Chin-Chen Chang | Jyh-Horng Wen | Shiuh-Jeng Wang | Yuh-Ren Tsai | Keh-Ming Lu
Guest Editorial

Author(s): Shiguo Lian | Zhu Li | Stefanos Gritzalis | Xi Chen
A Location-Aware Vertical Handoff Algorithm for Hybrid Networks

Author(s): Abolfazl Mehbodniya | Sonia Aïssa | Jalil Chitizadeh
An adaptive low-power LDPC decoder using SNR estimation

Author(s): Park Joo-Yul | Chung Ki-Seok
A Comprehensive Study of the Behavior of Different TCP Variants using Multistate Error Model in Cellular Mobile Environment

Author(s): S. M. Hasan Sazzad Iqbal | Md. Amran Siddiqui | Shaiful Alam Chowdhury | Md. Rounok Salehin
Content Based Video Retrieval using Mobile Agent

Author(s): Sheenam Malhotra | Rajwinder Singh | Sangeeta Gupta | C. Rama Krishna
Mobile Governance - An Indian Perspective

Author(s): ponasanapalli sree sudha
Enhanced-Location-Dependent Caching and Replacement Strategies in Mobile Environment

Author(s): Kahkashan Tabassum | Mahmood Quadri Syed | Avula Damodaram
The Design of Ubiquitous Learning System with Embedded Ganglia Agent

Author(s): Fu-Chien Kao | Chia-Chun Hung | Ting-Hao Huang
Virtual Energy-Efficient Encryption and Keying (VEEEK) for Wireless Sensor Networks

Author(s): K. Ravi Chythanya | S.P.Anandaraj. | S. Padmaja
Weighted Centroid Correction Localization in Cellular Systems

Author(s): Rong-Zheng Li | Xin-Long Luo | Jia-Ru Lin
Risk Assessment of Authentication Protocol: Kerberos

Author(s): Pathan Mohd. Shafi | Abdul sattar | P. chenna Reddy
Selected Problems on Mobile Agent Communication

Author(s): Yinka A. Adekunle | Sola S. Maitanmi
Smart Learning Services Based on Smart Cloud Computing

Author(s): Svetlana Kim | Su-Mi Song | Yong-Ik Yoon
Cache Based Distributed Query Processing in Mobile Ad hoc Networks

Author(s): T. P. Andamuthu | P. Balasubramanie
Why do you need a reservation system?      Affiliate Program