Multi-Device to Multi-Device (MD2MD) Content-Centric Networking Based on Multi-RAT Device

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-Device to Multi-Device (MD2MD) Content-Centric Networking Based on Multi-RAT Device

This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD) content-centric networking (CCN) environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requir...

متن کامل

Issues on Multi-Device Multi-Player Gaming

The current advances in mobile technology, has made it possible for traditional pc games to be ported to the mobile device. The development of multi-user games on mobile devices has presented many challenges and issues. This paper presents the different issues that must be tackled when creating a viable multi-user, multi-device game. We tackled issues ranging from user interaction issues , grap...

متن کامل

Consistent Multi-device Design Using Device Categories

Mobile devices differ in many aspects such as screen, keys, browsers, java support and much more. The difficult task designers now face is how to design solutions that take sufficient advantage of specific device characteristics while offering a consistent and similar experience. In this paper we discuss an approach using device categories to tackle this design challenge. Our categorization is ...

متن کامل

Consistency on Multi-device Design

We propose consistency priorities to support multi-device interface design minimizing the user’s cognitive effort while performing the same task on different interfaces. The methodology is being evaluated through a framework that generates Pocket PC interfaces from desktop web pages. Initial results point to the acceptance of the approach. Research sub-areas: design methods, mobile computing, w...

متن کامل

Multi-device Anonymous Authentication

Recently, a few pragmatic and privacy protecting systems for authentication in multiple systems have been designed. The most prominent examples are Restricted Identification and Pseudonymous Signature schemes designed by the German Federal Office for Information Security for German personal identity cards. The main properties are that a user can authenticate himself with a single private key (s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2017

ISSN: 2073-8994

DOI: 10.3390/sym9120291