Multi-Device to Multi-Device (MD2MD) Content-Centric Networking Based on Multi-RAT Device
نویسندگان
چکیده
منابع مشابه
Multi-Device to Multi-Device (MD2MD) Content-Centric Networking Based on Multi-RAT Device
This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD) content-centric networking (CCN) environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requir...
متن کاملIssues on Multi-Device Multi-Player Gaming
The current advances in mobile technology, has made it possible for traditional pc games to be ported to the mobile device. The development of multi-user games on mobile devices has presented many challenges and issues. This paper presents the different issues that must be tackled when creating a viable multi-user, multi-device game. We tackled issues ranging from user interaction issues , grap...
متن کاملConsistent Multi-device Design Using Device Categories
Mobile devices differ in many aspects such as screen, keys, browsers, java support and much more. The difficult task designers now face is how to design solutions that take sufficient advantage of specific device characteristics while offering a consistent and similar experience. In this paper we discuss an approach using device categories to tackle this design challenge. Our categorization is ...
متن کاملConsistency on Multi-device Design
We propose consistency priorities to support multi-device interface design minimizing the user’s cognitive effort while performing the same task on different interfaces. The methodology is being evaluated through a framework that generates Pocket PC interfaces from desktop web pages. Initial results point to the acceptance of the approach. Research sub-areas: design methods, mobile computing, w...
متن کاملMulti-device Anonymous Authentication
Recently, a few pragmatic and privacy protecting systems for authentication in multiple systems have been designed. The most prominent examples are Restricted Identification and Pseudonymous Signature schemes designed by the German Federal Office for Information Security for German personal identity cards. The main properties are that a user can authenticate himself with a single private key (s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Symmetry
سال: 2017
ISSN: 2073-8994
DOI: 10.3390/sym9120291