Sciweavers

38 search results - page 3 / 8
» Exploiting Our Computational Surroundings for Better Mobile ...
Sort
View
AISC
2010
Springer
14 years 9 days ago
Notations Around the World: Census and Exploitation
Mathematical notations around the world are diverse. Not as much as requiring computing machines’ makers to adapt to each culture, but as much as to disorient a person landing on...
Paul Libbrecht
MOBISYS
2005
ACM
14 years 7 months ago
Improving TCP performance over wireless networks with collaborative multi-homed mobile hosts
Multi-homed mobile hosts situated in physical proximity may spontaneously team up to run high-bandwidth applications by pooling their low wireless wide-area network (WWAN) bandwid...
Kyu-Han Kim, Kang G. Shin
NDSS
2008
IEEE
14 years 1 months ago
Exploiting Opportunistic Scheduling in Cellular Data Networks
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu
ICDCSW
2002
IEEE
14 years 13 days ago
Peer-to-Peer for Collaborative Applications
Peer-to-peer systems recently captured the attention of practitioners and researchers as they provide an attractive alternative to client-server architectures. Peerto-peer enables...
Gianpaolo Cugola, Gian Pietro Picco
WICON
2008
13 years 9 months ago
Exploiting parallel networks using dynamic channel scheduling
Many researchers have been focusing on the outcomes and consequences of the rapid increase and proliferation of mobile wireless technologies. If it is not already the case, it wil...
Lara B. Deek, Kevin C. Almeroth, Mike P. Wittie, K...