By Topic

Mobile Computing Systems and Applications, 1994. Proceedings., Workshop on

Date 8-9 Dec. 1994

Filter Results

Displaying Results 1 - 25 of 39
  • Workshop on Mobile Computing Systems and Applications

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (240 KB)
    Freely Available from IEEE
  • Mobisaic: an information system for a mobile wireless computing environment

    Publication Year: 1994, Page(s):185 - 190
    Cited by:  Papers (4)  |  Patents (59)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (838 KB)

    Mobisaic is a World Wide Web information system designed to serve users in a mobile wireless computing environment. Mobisaic extends the Web by allowing documents to both refer and react to potentially changing contextual information, such as current location in the wireless network. Mobisaic relies on client side processing of HTML documents that support two new concepts: dynamic uniform resource... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Workshop on Mobile Computing Systems and Applications December 1994

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On travelling incognito [mobile computing]

    Publication Year: 1994, Page(s):205 - 211
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    User mobility is rapidly becoming an important and popular feature in today's networks. This is especially evident in wireless/cellular environments. While useful and desirable, user mobility raises a number of important security related issues and concerns. One of them is the issue of tracking mobile user's movements and current whereabouts. Ideally, no entity other than the user himself and a re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A group communication approach for mobile computing

    Publication Year: 1994, Page(s):95 - 102
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    Describes the design and implementation of a set of tools, called MobileChannel, for use with the Isis system. A simple scheme to support user mobility-switching a control point between replicated servers-provides a uniform mechanism to handle both client migrations and server failures. The hands-off mechanism is simplified by integrating a FIFO channel implementation into the server replication m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Bayou Architecture: support for data sharing among mobile users

    Publication Year: 1994, Page(s):2 - 7
    Cited by:  Papers (1)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    The Bayou System is a platform of replicated, highly available, variable-consistency, mobile databases on which to build collaborative applications. This paper presents the preliminary system architecture along with the design goals that influenced it. We take a fresh, bottom-up and critical look at the requirements of mobile computing applications and carefully pull together both new and existing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic documents: mobile wireless access to the WWW

    Publication Year: 1994, Page(s):179 - 184
    Cited by:  Patents (48)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    We propose dynamic documents as an approach to extending and customizing the WWW/Mosaic for mobile computing platforms. Dynamic documents are programs executed on a mobile platform to generate a document; they are implemented as Tcl scripts. We have modified the NCSA Mosaic web client to run the dynamic documents it retrieves through a modified Tcl interpreter. The interpreter is designed to execu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymity in a mobile computing environment

    Publication Year: 1994, Page(s):200 - 204
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    In a mobile computing environment, it is desirable to protect information about the movements and activities of mobile entities from onlookers. Solutions to this problem of providing anonymity have to be developed with the constraints of mobile computing environments in mind. It is argued that this issue merits investigation. A brief survey of the nature of anonymity provided in proposed or existi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent resource discovery for mobile computers

    Publication Year: 1994, Page(s):116 - 118
    Cited by:  Papers (2)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    As mobile computers move from one place to another, their “physical” points of attachment to the network change from time to time. Host movement causes service disruption. The Mobile-IP protocol attempts to solve this problem by hiding the effect of change in network service access points from the transport and higher layers. Thus, Mobile-IP ensures that a mobile host remains “vi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application design for wireless computing

    Publication Year: 1994, Page(s):91 - 94
    Cited by:  Papers (1)  |  Patents (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    As mobile computing becomes more prevalent, systems and applications must deal with a growing disparity in resource types and availability at the user interface device. Network characteristics, display size, method of input, local storage and computing are some of the more obviously affected components. Although the challenges of effectively managing these resources are partially addressed by exis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • W4-the Wireless World Wide Web

    Publication Year: 1994, Page(s):176 - 178
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    A number of people see personal digital assistants, PDAs, with wireless communication as the next big thing in the computer industry. However, the current PDA's obvious limitations in computational power, storage, communication bandwidth, and display size pose the questions: can you build anything, and if so, would anyone want to use it? In order to put these dreams in perspective, we decided to b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method providing identity privacy to mobile users during authentication

    Publication Year: 1994, Page(s):196 - 199
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    The increasing development of mobile networks raises new security requirements and concerns. In addition to the basic need for authentication, confidentiality and key distribution services, a new problem involving privacy is the unauthorized tracking of users' migration. In other words, accessing any information related to the mobile user's location data without his consent, is a serious violation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Replication strategies for mobile e-mail

    Publication Year: 1994, Page(s):111 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Mobile computer users may have multiple computers and various communication methods available to them. Thus, effective electronic mail services in diverse mobile environments, including both wireless and wireline scenarios, can be significantly enhanced using replication services. In this paper, we discuss our adaptations of R.A. Golding's (1992) weak-consistency group communication and membership... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving end-to-end performance of TCP over mobile internetworks

    Publication Year: 1994, Page(s):146 - 152
    Cited by:  Papers (10)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    Reliable transport protocols such as TCP use end-to-end flow, congestion and error control mechanisms to provide reliable delivery over an internetwork. However, the end-to-end performance of a TCP connection can suffer significant degradation in the presence of a wireless link. We are exploring alternatives for optimizing end-to-end performance of TCP connections across an internetwork consisting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-aware computing applications

    Publication Year: 1994, Page(s):85 - 90
    Cited by:  Papers (28)  |  Patents (243)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    Describes systems that examine and react to an individual's changing context. Such systems can promote and mediate people's interactions with devices, computers and other people, and they can help navigate unfamiliar places. We believe that a limited amount of information covering a person's proximate environment is most important for this form of computing, since the interesting part of the world... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An indoor wireless system for personalized shopping assistance

    Publication Year: 1994, Page(s):69 - 74
    Cited by:  Papers (1)  |  Patents (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    By integrating wireless, video, speech and real-time data access technologies, a unique shopping assistant service can be created that personalizes the attention provided to a customer based on individual needs, without limiting his movement, or causing distractions for others in the shopping center. We have developed this idea into a service based on two products: a very high volume hand-held wir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal mobile addressing in the Internet

    Publication Year: 1994, Page(s):24 - 31
    Cited by:  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    To support mobility, we propose to use a triple (M, N, d) as an address for every stationary or mobile computer in a multi-network system, like the Internet. In this (M, N, d) address, M is the network where the computer is currently located, N is the network where the computer is usually located, and d is a unique identifier of the computer in network N. The address of a stationary computer is al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Causally ordered message delivery in mobile systems

    Publication Year: 1994, Page(s):169 - 174
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    There is a growing trend in using mobile computing environments for several applications, and it is important that such mobile systems are provided with adequate support both at the systems level and at the communication level. Causal ordering is a useful property, particularly in applications that involve human interactions. We present three algorithms for causal ordering in mobile systems. The f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Disconnected operation in the Thor object-oriented database system

    Publication Year: 1994, Page(s):51 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    The paper discusses issues raised by providing disconnected operation in the Thor object-oriented database system. Disconnected operation in such a system poses new challenges because of the small size of objects, the richness and complexity of their interconnections, the huge number of them, and the fact that they are accessed within atomic transactions. We propose three techniques to address the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing with tentative data values in disconnected work groups

    Publication Year: 1994, Page(s):192 - 195
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    The paper describes a problem of weakly consistent replicated data systems used in support of disconnected groups of people. The problem concerns actions and updates derived from tentative data updates that are ultimately determined to be in conflict. While some such actions and updates can be automatically resolved, many require human intervention. Furthermore, although some file and database sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A client-side-only approach to disconnected file access

    Publication Year: 1994, Page(s):104 - 110
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    Discusses a client-side-only approach to providing disconnected access to a heterogeneous set of network file services. Our method contrasts with those used in systems such as Coda, primarily because Coda depends upon changes to both the client software and the server software. Instead, we assume that we cannot make changes to the servers, and we explore the resultant benefits and limitations, as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility: a medium for computation, communication, and control

    Publication Year: 1994, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    The advent of ubiquitous mobile computing has widely been regarded as the convergence of pager-like communications technology and laptop-like computational power enabling applications that span both realms of functionality. However ubiquitous mobile computing, coupled with the proliferation of microprocessor-controlled appliances and networking, creates another important new application arena: tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with connected and disconnected operation of portable notebook computers in distributed systems

    Publication Year: 1994, Page(s):119 - 123
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    DOC (Disconnected Operation Cache) is a two-level client caching system designed and implemented to support connected and disconnected operation of small form-factor, battery-powered portable computers. This paper describes some design features of DOC, and our experiences with running it in the software engineering environment of AST Research. The uniqueness of the DOC project stems from the fact ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting adaptive services in a heterogeneous mobile environment

    Publication Year: 1994, Page(s):153 - 157
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    Future computer environments will include mobile computers which will either be disconnected, weakly interconnected by low-speed wireless networks such as GSM (global system for mobile communications), or fully interconnected by high-speed networks ranging from Ethernet to ATM (asynchronous transfer mode). While the transition between networks is currently a heavyweight operation, we believe that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.