Data-Centric Collaboration for Wired and Wireless Platforms

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data-Centric Collaboration for Wired and Wireless Platforms

With the proliferation of mobile computing devices there is an increasing demand for applications supporting collaboration among users working in the field and in the office. A key component for collaboration in this domain is sharing and manipulation of information using very different devices and communications. We propose a novel, data-centric collaboration paradigm, where each user can obta...

متن کامل

Adaptive Collaboration for Wired and Wireless Platforms

Expanding the Internet’s reach with wireless links and mobile terminals establishes an infrastructure that permits not only individual roaming but also, potentially, interactive collaboration in a more complex workspace. The classic example is an expert using a 3D CAD model on a workstation to collaborate with someone in the field using a handheld device. The possibilities for collaboration wil...

متن کامل

Adaptive video highlights for wired and wireless platforms

Many new applications such as pervasive healthcare, pervasive infotainment and pervasive training, require relevant video segments (i.e. video highlights) to be delivered to a variety of devices operating under both wired and wireless platforms. This brings in a requirement of (i) a way to describe the content as well as the environment such as device and network in which it is to be delivered,...

متن کامل

Study of Wired and Wireless Data Transmissions

i ___________________________________________________________________________________________________

متن کامل

Integrating Wired and Wireless IDS Data

The types of attacks that target wired networks and those that target wireless networks are very different. Wireless attacks may span the protocol spectrum from physical denial of service to upper layer attacks against many of the authentication protocols. Wired networks have exposures at the physical layer as well but the biggest risks are from threats that operate at the network layer and abo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computing and Information Technology

سال: 2002

ISSN: 1330-1136,1846-3908

DOI: 10.2498/cit.2002.03.01