Sciweavers

1532 search results - page 252 / 307
» Embodied mobile agents
Sort
View
COCOA
2010
Springer
13 years 7 months ago
Time Optimal Algorithms for Black Hole Search in Rings
In a network environments supporting mobile entities (called robots or agents), a black hole is harmful site that destroys any incoming entity without leaving any visible trace. Th...
Balasingham Balamohan, Paola Flocchini, Ali Miri, ...
ISCC
2002
IEEE
111views Communications» more  ISCC 2002»
14 years 1 months ago
How to support Internet-based distribution of video on demand to portable devices
The increasing diffusion of mobile computing and of portable devices with wireless connectivity identifies new challenging scenarios for service provisioning. The access from devi...
Paolo Bellavista, Antonio Corradi
HT
2000
ACM
14 years 1 months ago
The travails of visually impaired web travellers
This paper proposes the inclusion of travel and mobility in the usability metrics of web design. Hypertext design and usability has traditionally concentrated upon navigation and/...
Carole A. Goble, Simon Harper, Robert Stevens
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 11 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
JNCA
2007
108views more  JNCA 2007»
13 years 8 months ago
Delivering adaptivity through context-awareness
Developing applications and deploying services for mobile users raises a number of issues and challenges that must be successfully addressed before the era of truly ubiquitous com...
Michael J. O'Grady, Gregory M. P. O'Hare, C. Donag...