Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on

25-26 Feb. 1999

Filter Results

Displaying Results 1 - 15 of 15
  • Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1999, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s): 123
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • DataX: an approach to ubiquitous database access

    Publication Year: 1999, Page(s):70 - 79
    Cited by:  Papers (2)  |  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    The paper describes an approach for enabling remote database access from heterogeneous thin clients. DataX is a proxy based architecture that supports disconnected operation by replicating a subset of the database on the mobile client, using a weak consistency criterion. It adapts data replication to device characteristics, link attributes and user preferences. It employs a per-device renderer to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workflow and application adaptations in mobile environments

    Publication Year: 1999, Page(s):62 - 69
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    The article describes applications that can benefit from integrated mobile computing and workflow management technologies. Such applications empower a mobile workforce to perform coordinated and streamlined work activities in the field or on the road. We discuss characteristics of these applications and workflow management for supporting these applications. We suggest that mobility support not onl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy-enabled handoffs across heterogeneous wireless networks

    Publication Year: 1999, Page(s):51 - 60
    Cited by:  Papers (213)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    “Access is the killer app” is the vision of the Daedalus project at UC Berkeley. Being able to be connected seamlessly anytime anywhere to the best network still remains an unfulfilled goal. Often, even determining the “best” network is a challenging task because of the widespread deployment of overlapping wireless networks. We describe a policy-enabled handoff system that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • `Caches in the air': disseminating tourist information in the GUIDE system

    Publication Year: 1999, Page(s):11 - 19
    Cited by:  Papers (23)  |  Patents (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    The paper describes work carried out as part of the GUIDE project at Lancaster University. The overall aim of the project is to develop a context-sensitive tourist guide for visitors to the city of Lancaster. Visitors are equipped with portable GUIDE units which in turn provide interactive services and dynamically tailored Web based information, reflecting the visitor's preferences and environment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP performance in wireless multi-hop networks

    Publication Year: 1999, Page(s):41 - 50
    Cited by:  Papers (92)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    We investigate the interaction between TCP and MAC layer in a wireless multi-hop network. Using simulation, we provide new insight into two critical problems of TCP over wireless multi-hop. The first is the conflict between TCP data packets and TCP ACKs, which causes performance to degrade for window sizes greater than 1 packet. The second is the interaction between TCP and MAC layer backoff timer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive protocol for reliable multicast in mobile multi-hop radio networks

    Publication Year: 1999, Page(s):111 - 122
    Cited by:  Papers (27)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    In this paper we propose a new protocol for reliable multicast in a multi-hop mobile radio network. The protocol is reliable, i.e., it guarantees message delivery to all multicast nodes even when the topology of the network changes during multicasting. The proposed protocol uses a core based shared tree. The multicast tree may get fragmented due to node movements. A notion of forwarding region is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadcast of consistent data to read-only transactions from mobile clients

    Publication Year: 1999, Page(s):80 - 88
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    We study the inconsistency problem in data broadcast. While data items in a mobile computing system are being broadcast, update transactions may install new values for the data items. If the executions of update transactions and the broadcast of data items are interleaved without any control, it is possible that the mobile transactions, which are generated by mobile clients, may observe inconsiste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive groupware for wireless networks

    Publication Year: 1999, Page(s):20 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Current groupware systems do not work well over wireless networks, as a wireless connection is of variable and often poor quality. Our research suggests a number of changes that allow groupware applications to make efficient use of a wireless channel. One fundamental change is providing adaptability, which allows applications to take advantage of favourable network conditions and to react to diffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PowerScope: a tool for profiling the energy usage of mobile applications

    Publication Year: 1999, Page(s):2 - 10
    Cited by:  Papers (121)  |  Patents (60)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    We describe the design and implementation of PowerScope, a tool for profiling energy usage by applications. PowerScope maps energy consumption to program structure, in much the same way that CPU profilers map processor cycles to specific processes and procedures. Our approach combines hardware instrumentation to measure current level with kernel software support to perform statistical sampling of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ad-hoc on-demand distance vector routing

    Publication Year: 1999, Page(s):90 - 100
    Cited by:  Papers (3001)  |  Patents (84)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. We present Ad-hoc On Demand Distance Vector Routing (AODV), a novel algorithm for the operation of such ad-hoc networks. Each mobile host operates as a specialized router, and routes are obtained as needed (i.e., on-demand) wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RAT: a quick (and dirty?) push for mobility support

    Publication Year: 1999, Page(s):32 - 40
    Cited by:  Papers (4)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    The goal of IP mobility support is to provide the means by which applications on distinct computers are able to communicate when one or both computers have changed their physical network location. Mobile IP (MIP) tries to provide such support with a solution at the network layer. To date, MIP deployment is insignificant and this is likely to remain so, unless there is a breakthrough. In contrast, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geocasting in mobile ad hoc networks: location-based multicast algorithms

    Publication Year: 1999, Page(s):101 - 110
    Cited by:  Papers (132)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    The paper addresses the problem of geocasting in mobile ad hoc network (MANET) environments. Geocasting is a variant of the conventional multicasting problem. For multicasting, conventional protocols define a multicast group as a collection of hosts which register to a multicast group address. However for geocasting, the group consists of the set of all nodes within a specified geographical region... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.