Academic literature on the topic 'Nomadic computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Nomadic computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Nomadic computing"
Sadiku, Matthew N. O., Adedamola A. Omotoso, and Sarhan M. Musa. "Nomadic Computing: A Primer." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 830–31. http://dx.doi.org/10.31142/ijtsrd23039.
Full textKleinrock, Leonard. "Nomadic computing—an opportunity." ACM SIGCOMM Computer Communication Review 25, no. 1 (January 11, 1995): 36–40. http://dx.doi.org/10.1145/205447.205450.
Full textKleinrock, L. "Nomadic computing and smart spaces." IEEE Internet Computing 4, no. 1 (2000): 52–53. http://dx.doi.org/10.1109/4236.815852.
Full textYu, Hsiang-Fu, Cho-Jui Hsieh, Hyokun Yun, S. V. N. Vishwanathan, and Inderjit Dhillon. "Nomadic Computing for Big Data Analytics." Computer 49, no. 4 (April 2016): 52–60. http://dx.doi.org/10.1109/mc.2016.116.
Full textAlonso, Rafael, and Henry F. Korth. "Database system issues in nomadic computing." ACM SIGMOD Record 22, no. 2 (June 1993): 388–92. http://dx.doi.org/10.1145/170036.170092.
Full textKindberg, Tim, and John Barton. "A Web-based nomadic computing system." Computer Networks 35, no. 4 (March 2001): 443–56. http://dx.doi.org/10.1016/s1389-1286(00)00181-x.
Full textCotroneo, Domenico, Cristiano di Flora, Almerindo Graziano, and Stefano Russo. "Securing services in nomadic computing environments." Information and Software Technology 50, no. 9-10 (August 2008): 924–47. http://dx.doi.org/10.1016/j.infsof.2007.08.002.
Full textLyytinen, Kalle, and Youngjin Yoo. "Research Commentary: The Next Wave of Nomadic Computing." Information Systems Research 13, no. 4 (December 2002): 377–88. http://dx.doi.org/10.1287/isre.13.4.377.75.
Full textUbiquity staff. "An Interview with Leonard Kleinrock on nomadic computing." Ubiquity 2005, July (July 2005): 1. http://dx.doi.org/10.1145/1086451.1086456.
Full textBagrodia, R., W. W. Chu, L. Kleinrock, and C. Popek. "Vision, issues, and architecture for nomadic computing [and communications]." IEEE Personal Communications 2, no. 6 (1995): 14–27. http://dx.doi.org/10.1109/98.475985.
Full textDissertations / Theses on the topic "Nomadic computing"
Karlsson, Johanna. "Nomadic Computing : Security assessment of remote access to workplace systems." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4845.
Full textLanfermann, Gerd. "Nomadic migration : a service environment for autonomic computing on the Grid." Phd thesis, Universität Potsdam, 2002. http://opus.kobv.de/ubp/volltexte/2005/81/.
Full textEs wird für Wissenschaftler zunehmend schwieriger, die verfügbaren Ressourcen für ihre Anwendungen zu nutzen. Wir glauben, dass intelligente, selbstbestimmende Applikationen in der Lage sein sollten, ihre Ressourcen in einer dynamischen und heterogenen Umgebung selbst zu wählen: Migrierende Applikationen suchen eine neue Ressource, wenn die alte aufgebraucht ist. 'Spawning'-Anwendungen lassen Algorithmen auf externen Maschinen laufen, um die Hauptanwendung zu beschleunigen. Applikationen werden neu gestartet, sobald ein Absturz endeckt wird. Alle diese Verfahren können ohne menschliche Interaktion erfolgen.
Eine verteilte Rechenumgebung besitzt eine natürliche Unverlässlichkeit. Jede Applikation, die mit einer solchen Umgebung interagiert, muss auf die gestörten Komponenten reagieren können: schlechte Netzwerkverbindung, abstürzende Maschinen, fehlerhafte Software. Wir konstruieren eine verlässliche Serviceinfrastruktur, indem wir der Serviceumgebung eine 'Peer-to-Peer'-Topology aufprägen. Diese “Grid Peer Service” Infrastruktur beinhaltet Services wie Migration und Spawning, als auch Services zum Starten von Applikationen, zur Dateiübertragung und Auswahl von Rechenressourcen. Sie benutzt existierende Gridtechnologie wo immer möglich, um ihre Aufgabe durchzuführen. Ein Applikations-Information- Server arbeitet als generische Registratur für alle Teilnehmer in der Serviceumgebung.
Die Serviceumgebung, die wir entwickelt haben, erlaubt es Applikationen z.B. eine Relokationsanfrage an einen Migrationsserver zu stellen. Der Server sucht einen neuen Computer, basierend auf den übermittelten Ressourcen-Anforderungen. Er transferiert den Statusfile des Applikation zu der neuen Maschine und startet die Applikation neu. Obwohl das umgebende Ressourcensubstrat nicht kontinuierlich ist, können wir kontinuierliche Berechnungen auf Grids ausführen, indem wir die Applikation migrieren. Wir zeigen mit realistischen Beispielen, wie sich z.B. ein traditionelles Genom-Analyse-Programm leicht modifizieren lässt, um selbstbestimmte Migrationen in dieser Serviceumgebung durchzuführen.
In recent years, there has been a dramatic increase in available compute capacities. However, these “Grid resources” are rarely accessible in a continuous stream, but rather appear scattered across various machine types, platforms and operating systems, which are coupled by networks of fluctuating bandwidth. It becomes increasingly difficult for scientists to exploit available resources for their applications. We believe that intelligent, self-governing applications should be able to select resources in a dynamic and heterogeneous environment: Migrating applications determine a resource when old capacities are used up. Spawning simulations launch algorithms on external machines to speed up the main execution. Applications are restarted as soon as a failure is detected. All these actions can be taken without human interaction.
A distributed compute environment possesses an intrinsic unreliability. Any application that interacts with such an environment must be able to cope with its failing components: deteriorating networks, crashing machines, failing software. We construct a reliable service infrastructure by endowing a service environment with a peer-to-peer topology. This “Grid Peer Services” infrastructure accommodates high-level services like migration and spawning, as well as fundamental services for application launching, file transfer and resource selection. It utilizes existing Grid technology wherever possible to accomplish its tasks. An Application Information Server acts as a generic information registry to all participants in a service environment.
The service environment that we developed, allows applications e.g. to send a relocation requests to a migration server. The server selects a new computer based on the transmitted resource requirements. It transfers the application's checkpoint and binary to the new host and resumes the simulation. Although the Grid's underlying resource substrate is not continuous, we achieve persistent computations on Grids by relocating the application. We show with our real-world examples that a traditional genome analysis program can be easily modified to perform self-determined migrations in this service environment.
Lanfermann, Gerd. "Nomadic migration a service environment for autonomic computing on the Grid /." [S.l. : s.n.], 2003. http://pub.ub.uni-potsdam.de/2003/0018/lanferm.pdf.
Full textCousins, Karlene C. "Access Anytime Anyplace: An Empircal Investigation of Patterns of Technology Use in Nomadic Computing Environments." unrestricted, 2004. http://etd.gsu.edu/theses/available/etd-12132004-144636/.
Full textTtitle from title screen. Daniel Robey, committee chair; Marie Claude-Boudreau , Michale Gallivan, Upkar Varshney, committee members. 191 p. [numbered vi, 181] : ill. (some col.). Description based on contents viewed Feb. 26, 2007. Includes bibliographical references.
Marongiu, Andrea <1978>. "Tecniche di ottimizzazione del software per sistemi su singolo chip per applicazioni di Nomadic Computing." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amsdottorato.unibo.it/2959/.
Full textJones, Evan Philip Charles. "Practical Routing in Delay-Tolerant Networks." Thesis, University of Waterloo, 2006. http://hdl.handle.net/10012/814.
Full textThis thesis presents a practical routing protocol that uses only observed information about the network. Previous approaches either require complete future knowledge about the connection schedules, or use many copies of each message. Instead, our protocol uses a metric that estimates the average waiting time for each potential next hop. This learned topology information is distributed using a link-state routing protocol, where the link-state packets are flooded using epidemic routing. The routing is recomputed each time connections are established, allowing messages to take advantage of unpredictable contacts. Messages are exchanged if the topology suggests that a connected node is "closer" than the current node.
Simulation results are presented, showing that the protocol provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge. Further, it requires a significantly less resources than the epidemic alternative, suggesting that this approach scales better with the number of messages in the network.
Désiré, Nguessan. "Um modelo de gerência de segurança para middleware baseado em tuple para ambientes difusos e nômades." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-21012010-171918/.
Full textThe work exploits the security management and the cooperation of applications in mobile distributed systems. In this context a study of different mobile middleware is made. The study examines their capacities to face the challenges of mobility and security issues. The analysis shows that the existing middleware has very few approaches on security problems; security is still a complex issue to be managed in all the levels of mobile distributed system including new mechanisms. Based on this analysis, a security management model is developed that implements a mechanism for mutual authentication, confidentiality, intrusion detection, access control of mobile agents in mobile environments, ensures services availability and user privacy, through technology PET (Privacy-Enhancing Technologies). The idea is based on interceptor agents and security authorities that distribute security tickets and control the access to resources and Tuple spaces in mobile environment. The proposed model presents good performance and is integrated to an e-health system: Relationship Management with Chronic Patient GRPC.
Nathansohn, Nof. "Digital nomads : space + narrative computing for the village of Al Araqib." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127875.
Full textCataloged from the official PDF of thesis. "May 2020."
Includes bibliographical references (pages 82-83).
For political reasons, the officially unrecognized Bedouin village of Al Araqib in Israeli's Negev desert is prevented from building permanent structures. While the state of Israel does not issue demolition warrants for new illegal houses, it instead demolishes these houses without a warrant, under the auspices of a law that allows the police to destroy new illegal structures within 30 days of construction. This situation has encouraged the people of Al Araqib to become familiar with different technologies. They use solar energy to provide electricity to the village, and smartphones to document and report demolitions. As an act of resistance as much as a practical measure, they repeatedly rebuild their houses, appropriating architecture as a political tool. This creates a situation where the Bedouin with their strong nomadic history, uses physical structures--the language and logic used by their oppressors--in the fight for their ancestral land.
Beyond supporting and recognizing the Bedouin people's fight for justice, this design thesis asks to harness the conflux of physical architecture and digital technologies in an effort to create innovative modes of communication that speak to the experiences of unrecognized populations, struggling for cultural survival. Specifically, through collaborative work by the people of Al Araqib, this thesis initiates a laboratory of tools and techniques that harness the spatial characteristics of the land and the social narrative of its people. Aiming to strengthen their ability to communicate more widely and more productively, the thesis proposes a platform that includes a set of digital and physical tools, such as digital design and fabrication, hackable devices, internet of things, architectural drawings, videos, sensors, GPS, automatization and GIS. Lastly, this thesis catalogues these diverse tools as part of a content management system and as a 'cookbook'.
It is composed of spatial information, automated and visualized to create a more persuasive narrative, and of journalistic strategies that introduce knowledge sharing and evidence of the reality of demolition and its impact on human lives.
by Nof Nathansohn.
S.M.
S.M. Massachusetts Institute of Technology, Department of Architecture
Vales, Ruben Oliveira. "Nomadic fog storage." Master's thesis, 2017. http://hdl.handle.net/10071/14930.
Full textOs serviços móveis requerem cada vez mais poder de processamento e armazenamento. Contudo, os dispositivos móveis são conhecidos por serem limitados em termos de armazenamento, processamento e energia. Como solução, os dispositivos móveis começaram a aceder a estes recursos através de nuvens distantes. No entanto, estas sofrem de longas latências e limitações na largura de banda da rede, ao aceder aos recursos. Para resolver estas questões, foram propostas soluções de edge computing. Estas, colocam nós intermediários entre os dispositivos móveis e a nuvem remota, que são responsáveis por responder aos pedidos de recursos por parte dos utilizadores finais. Dados os avanços na tecnologia dos dispositivos móveis e o aumento da sua utilização, torna-se cada mais pertinente a utilização destes próprios dispositivos para fornecer os serviços da nuvem. Desta forma, o dispositivo móvel torna-se consumidor e fornecedor do serviço nuvem. O trabalho atual investiga esta vertente, implementado e testando um sistema que utiliza dispositivos móveis e nós no “fog”, para suportar os serviços móveis emergentes. Foi ainda implementado um algoritmo de alocação de recursos que considera os níveis de energia e a topologia da rede, bem como um módulo que gere a replicação de dados no sistema de acordo com a sua popularidade. Os resultados obtidos provam que o sistema é responsivo, alivia o tráfego nas ligações no core, e demonstra uma distribuição justa do consumo de energia no sistema através de uma disseminação eficaz de conteúdo nos nós da periferia da rede mais próximos dos nós consumidores.
Lanfermann, Gerd [Verfasser]. "Nomadic migration : a service environment for autonomic computing on the Grid / von Gerd Lanfermann." 2003. http://d-nb.info/968682774/34.
Full textBooks on the topic "Nomadic computing"
International, Conference on Systems Research Informatics and Cybernetics (14th 2002 Baden-Baden Germany). Advances in computer cybernetics: Nomadic computing for wireless applications ... Windsor, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics, 2002.
Find full textRoberts, Steven K. Computing Across America: The Bicycle Odyssey of a High-Tech Nomad. Information Today, 1988.
Find full textBook chapters on the topic "Nomadic computing"
Kleinrock, L. "Nomadic Computing." In IFIP Advances in Information and Communication Technology, 223–33. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34985-5_16.
Full textOppermann, Reinhard, Marcus Specht, and Igor Jaceniak. "Hippie: A Nomadic Information System." In Handheld and Ubiquitous Computing, 330–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48157-5_37.
Full textMcCann, J. A., and J. S. Crane. "Component DBMS architecture for nomadic computing." In Lecture Notes in Computer Science, 175–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053484.
Full textOppermann, Reinhard, and Marcus Specht. "A Context-Sensitive Nomadic Exhibition Guide." In Handheld and Ubiquitous Computing, 127–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-39959-3_10.
Full textCotroneo, Domenico, Armando Migliaccio, and Stefano Russo. "A Communication Broker for Nomadic Computing Systems." In High Performance Computing and Communications, 1011–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11557654_112.
Full textNikiforova, Evdokia, Viktor Nogovitsyn, Lena Borisova, and Anatoliy Nikolaev. "Nomadic School: Problem of Access to Quality Education." In Advances in Intelligent Systems and Computing, 53–58. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11473-2_6.
Full textOlmedo-Aguirre, José Oscar, Mónica Rivera de la Rosa, and Guillermo Morales-Luna. "ECA-Rule Visual Programming for Ubiquitous and Nomadic Computing." In MICAI 2008: Advances in Artificial Intelligence, 925–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88636-5_87.
Full textPaal, Stefan, Reiner Kammüller, and Bernd Freisleben. "A Cross-Platform Application Environment for Nomadic Desktop Computing." In Object-Oriented and Internet-Based Technologies, 185–200. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30196-7_14.
Full textPaal, Stefan, Reiner Kammüller, and Bernd Freisleben. "Supporting Nomadic Desktop Computing Using an Internet Application Workbench." In On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops, 40–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30470-8_19.
Full textSugihara, Koichiro, and Naohiro Hayashibara. "Message Dissemination Using Nomadic Lévy Walk on Unit Disk Graphs." In Advances in Intelligent Systems and Computing, 136–47. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22354-0_13.
Full textConference papers on the topic "Nomadic computing"
Zhang, Jun, and Chris Phillips. "Intelligent Roaming for Nomadic Computing." In Communication Technologies: from Theory to Applications (ICTTA). IEEE, 2008. http://dx.doi.org/10.1109/ictta.2008.4530179.
Full textZhang, Kan, and Tim Kindberg. "An authorization infrastructure for nomadic computing." In the seventh ACM symposium. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/507711.507728.
Full textAlonso, Rafael, and Henry F. Korth. "Database system issues in nomadic computing." In the 1993 ACM SIGMOD international conference. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/170035.170092.
Full textBaloian, Nelson, Ramon Cruzat, Richard Ibarra, and Javier Bustos-Jimenez. "Sketches characterization and compression for nomadic computing." In 2011 15th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2011. http://dx.doi.org/10.1109/cscwd.2011.5960113.
Full textWickramarachchi, Anuradha, Dulaj Atapattu, Pamoda Wimalasiri, Ravidu Mallawa Arachchi, and Gihan Dias. "Use of nomadic computing devices for storage synchronization." In 2018 International Conference on Information Networking (ICOIN). IEEE, 2018. http://dx.doi.org/10.1109/icoin.2018.8343204.
Full textMalhotra, Richa, Diptish Dey, Eric A. Van Doorn, and Antonius M. J. Koonen. "Traffic modeling in a reconfigurable broadband nomadic computing environment." In Information Technologies 2000, edited by Angela L. Chiu, Frank Huebner, and Robert D. van der Mei. SPIE, 2001. http://dx.doi.org/10.1117/12.417474.
Full textKristensen, Mads Daro, and Niels Olof Bouvin. "Energy Efficient Routing in Nomadic Networks." In Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07). IEEE, 2007. http://dx.doi.org/10.1109/percomw.2007.43.
Full textBolla, R., S. Mangialardi, R. Rapuzzi, and M. Repetto. "Streaming Multimedia Contents to Nomadic Users in Ubiquitous Computing Environments." In IEEE INFOCOM 2009 - IEEE Conference on Computer Communications Workshops. IEEE, 2009. http://dx.doi.org/10.1109/infcomw.2009.5072193.
Full textNkenyereye, L., and J. W. Jang. "Cloud Computing Enabled External Applications to Car Users using Nomadic Smartphones." In International Conference on Computer Information Systems and Industrial Applications. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/cisia-15.2015.72.
Full textde Carvalho, Aparecido Fabiano Pinatti, Luigina Ciolfi, and Breda Gray. "Detailing a Spectrum of Motivational Forces Shaping Nomadic Practices." In CSCW '17: Computer Supported Cooperative Work and Social Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/2998181.2998313.
Full text