Sciweavers

1030 search results - page 162 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
129
Voted
EUSAI
2004
Springer
15 years 9 months ago
QoS Provision Using Dual RF Modules in Wireless LAN
With the rapid growth of emerging demand and deployment of wireless LAN (WLAN), much of traffic including multimedia traffic is forced to travel over WLAN. Since the legacy IEEE 80...
Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Kyunghun...
128
Voted
PERCOM
2008
ACM
16 years 3 months ago
MAGIC Broker: A Middleware Toolkit for Interactive Public Displays
Large screen displays are being increasingly deployed in public areas for advertising, entertainment, and information display. Recently we have witnessed increasing interest in su...
Aiman Erbad, Michael Blackstock, Adrian Friday, Ro...
130
Voted
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 10 months ago
Study of Best-Effort VoIP Handovers between WLAN and EVDO Networks
The IEEE 802.11 based Wireless LANs (WLANs) have emerged as a viable technology for supporting real-time applications such as Voice over IP (VoIP). Even the Personal Digital Assist...
Amit P. Jardosh, Rajeev Koodli, Tat Chan
121
Voted
ECIS
2001
15 years 5 months ago
Evaluating WAP News Sites: The Webqual/m Approach
This paper reports on the evaluation of wireless Internet news sites using the WebQual/m instrument. From initial application in the domain of traditional Internet Web sites, the ...
Stuart J. Barnes, Kenny Liu, Richard T. Vidgen
150
Voted
AUTONOMICS
2008
ACM
15 years 5 months ago
Building multicast trees in ad-hoc networks
Multicast trees are used in a variety of applications, such as publish/subscribe systems or content distribution networks. Existing algorithms for ad-hoc networks typically produc...
Raphaël Kummer, Peter G. Kropf, Pascal Felber