Academic literature on the topic 'Nomadic computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Nomadic computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Nomadic computing"

1

Sadiku, Matthew N. O., Adedamola A. Omotoso, and Sarhan M. Musa. "Nomadic Computing: A Primer." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 830–31. http://dx.doi.org/10.31142/ijtsrd23039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kleinrock, Leonard. "Nomadic computing—an opportunity." ACM SIGCOMM Computer Communication Review 25, no. 1 (January 11, 1995): 36–40. http://dx.doi.org/10.1145/205447.205450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kleinrock, L. "Nomadic computing and smart spaces." IEEE Internet Computing 4, no. 1 (2000): 52–53. http://dx.doi.org/10.1109/4236.815852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yu, Hsiang-Fu, Cho-Jui Hsieh, Hyokun Yun, S. V. N. Vishwanathan, and Inderjit Dhillon. "Nomadic Computing for Big Data Analytics." Computer 49, no. 4 (April 2016): 52–60. http://dx.doi.org/10.1109/mc.2016.116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alonso, Rafael, and Henry F. Korth. "Database system issues in nomadic computing." ACM SIGMOD Record 22, no. 2 (June 1993): 388–92. http://dx.doi.org/10.1145/170036.170092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kindberg, Tim, and John Barton. "A Web-based nomadic computing system." Computer Networks 35, no. 4 (March 2001): 443–56. http://dx.doi.org/10.1016/s1389-1286(00)00181-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cotroneo, Domenico, Cristiano di Flora, Almerindo Graziano, and Stefano Russo. "Securing services in nomadic computing environments." Information and Software Technology 50, no. 9-10 (August 2008): 924–47. http://dx.doi.org/10.1016/j.infsof.2007.08.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lyytinen, Kalle, and Youngjin Yoo. "Research Commentary: The Next Wave of Nomadic Computing." Information Systems Research 13, no. 4 (December 2002): 377–88. http://dx.doi.org/10.1287/isre.13.4.377.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ubiquity staff. "An Interview with Leonard Kleinrock on nomadic computing." Ubiquity 2005, July (July 2005): 1. http://dx.doi.org/10.1145/1086451.1086456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bagrodia, R., W. W. Chu, L. Kleinrock, and C. Popek. "Vision, issues, and architecture for nomadic computing [and communications]." IEEE Personal Communications 2, no. 6 (1995): 14–27. http://dx.doi.org/10.1109/98.475985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Nomadic computing"

1

Karlsson, Johanna. "Nomadic Computing : Security assessment of remote access to workplace systems." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4845.

Full text
Abstract:
Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered. For this purpose a futuristic scenario has been used as a method to identify challenges within nomadic computing. After looking at the state of the art of wireless communication and security techniques, evaluating the focused techniques and looking at future trends, some preliminary conclusions could be made. A model of technology uptake has been used. The main concept of the model is to show that the uptake is depending on a co-evolution between different parts and not only the technique. One conclusion is therefore that the users must have confidence in the technique, but also in the organisation and the organisational use of the technique or else they will not use it. Security is important in order to create this trust and is thus of decisive importance to the technology uptake. Another conclusion is that the three focused techniques; rule-based access, authentication and policy/contract can be used today, but also in the future to increase the security for remote access. Finally, education and user awareness seems to be important in the future, even though the users interact less in the security management.
APA, Harvard, Vancouver, ISO, and other styles
2

Lanfermann, Gerd. "Nomadic migration : a service environment for autonomic computing on the Grid." Phd thesis, Universität Potsdam, 2002. http://opus.kobv.de/ubp/volltexte/2005/81/.

Full text
Abstract:
In den vergangenen Jahren ist es zu einer dramatischen Vervielfachung der verfügbaren Rechenzeit gekommen. Diese 'Grid Ressourcen' stehen jedoch nicht als kontinuierlicher Strom zur Verfügung, sondern sind über verschiedene Maschinentypen, Plattformen und Betriebssysteme verteilt, die jeweils durch Netzwerke mit fluktuierender Bandbreite verbunden sind.
Es wird für Wissenschaftler zunehmend schwieriger, die verfügbaren Ressourcen für ihre Anwendungen zu nutzen. Wir glauben, dass intelligente, selbstbestimmende Applikationen in der Lage sein sollten, ihre Ressourcen in einer dynamischen und heterogenen Umgebung selbst zu wählen: Migrierende Applikationen suchen eine neue Ressource, wenn die alte aufgebraucht ist. 'Spawning'-Anwendungen lassen Algorithmen auf externen Maschinen laufen, um die Hauptanwendung zu beschleunigen. Applikationen werden neu gestartet, sobald ein Absturz endeckt wird. Alle diese Verfahren können ohne menschliche Interaktion erfolgen.
Eine verteilte Rechenumgebung besitzt eine natürliche Unverlässlichkeit. Jede Applikation, die mit einer solchen Umgebung interagiert, muss auf die gestörten Komponenten reagieren können: schlechte Netzwerkverbindung, abstürzende Maschinen, fehlerhafte Software. Wir konstruieren eine verlässliche Serviceinfrastruktur, indem wir der Serviceumgebung eine 'Peer-to-Peer'-Topology aufprägen. Diese “Grid Peer Service” Infrastruktur beinhaltet Services wie Migration und Spawning, als auch Services zum Starten von Applikationen, zur Dateiübertragung und Auswahl von Rechenressourcen. Sie benutzt existierende Gridtechnologie wo immer möglich, um ihre Aufgabe durchzuführen. Ein Applikations-Information- Server arbeitet als generische Registratur für alle Teilnehmer in der Serviceumgebung.
Die Serviceumgebung, die wir entwickelt haben, erlaubt es Applikationen z.B. eine Relokationsanfrage an einen Migrationsserver zu stellen. Der Server sucht einen neuen Computer, basierend auf den übermittelten Ressourcen-Anforderungen. Er transferiert den Statusfile des Applikation zu der neuen Maschine und startet die Applikation neu. Obwohl das umgebende Ressourcensubstrat nicht kontinuierlich ist, können wir kontinuierliche Berechnungen auf Grids ausführen, indem wir die Applikation migrieren. Wir zeigen mit realistischen Beispielen, wie sich z.B. ein traditionelles Genom-Analyse-Programm leicht modifizieren lässt, um selbstbestimmte Migrationen in dieser Serviceumgebung durchzuführen.
In recent years, there has been a dramatic increase in available compute capacities. However, these “Grid resources” are rarely accessible in a continuous stream, but rather appear scattered across various machine types, platforms and operating systems, which are coupled by networks of fluctuating bandwidth. It becomes increasingly difficult for scientists to exploit available resources for their applications. We believe that intelligent, self-governing applications should be able to select resources in a dynamic and heterogeneous environment: Migrating applications determine a resource when old capacities are used up. Spawning simulations launch algorithms on external machines to speed up the main execution. Applications are restarted as soon as a failure is detected. All these actions can be taken without human interaction.

A distributed compute environment possesses an intrinsic unreliability. Any application that interacts with such an environment must be able to cope with its failing components: deteriorating networks, crashing machines, failing software. We construct a reliable service infrastructure by endowing a service environment with a peer-to-peer topology. This “Grid Peer Services” infrastructure accommodates high-level services like migration and spawning, as well as fundamental services for application launching, file transfer and resource selection. It utilizes existing Grid technology wherever possible to accomplish its tasks. An Application Information Server acts as a generic information registry to all participants in a service environment.

The service environment that we developed, allows applications e.g. to send a relocation requests to a migration server. The server selects a new computer based on the transmitted resource requirements. It transfers the application's checkpoint and binary to the new host and resumes the simulation. Although the Grid's underlying resource substrate is not continuous, we achieve persistent computations on Grids by relocating the application. We show with our real-world examples that a traditional genome analysis program can be easily modified to perform self-determined migrations in this service environment.
APA, Harvard, Vancouver, ISO, and other styles
3

Lanfermann, Gerd. "Nomadic migration a service environment for autonomic computing on the Grid /." [S.l. : s.n.], 2003. http://pub.ub.uni-potsdam.de/2003/0018/lanferm.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cousins, Karlene C. "Access Anytime Anyplace: An Empircal Investigation of Patterns of Technology Use in Nomadic Computing Environments." unrestricted, 2004. http://etd.gsu.edu/theses/available/etd-12132004-144636/.

Full text
Abstract:
Thesis (Ph.D.)--Georgia State University, 2004.
Ttitle from title screen. Daniel Robey, committee chair; Marie Claude-Boudreau , Michale Gallivan, Upkar Varshney, committee members. 191 p. [numbered vi, 181] : ill. (some col.). Description based on contents viewed Feb. 26, 2007. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
5

Marongiu, Andrea <1978&gt. "Tecniche di ottimizzazione del software per sistemi su singolo chip per applicazioni di Nomadic Computing." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amsdottorato.unibo.it/2959/.

Full text
Abstract:
I moderni sistemi embedded sono equipaggiati con risorse hardware che consentono l’esecuzione di applicazioni molto complesse come il decoding audio e video. La progettazione di simili sistemi deve soddisfare due esigenze opposte. Da un lato è necessario fornire un elevato potenziale computazionale, dall’altro bisogna rispettare dei vincoli stringenti riguardo il consumo di energia. Uno dei trend più diffusi per rispondere a queste esigenze opposte è quello di integrare su uno stesso chip un numero elevato di processori caratterizzati da un design semplificato e da bassi consumi. Tuttavia, per sfruttare effettivamente il potenziale computazionale offerto da una batteria di processoriè necessario rivisitare pesantemente le metodologie di sviluppo delle applicazioni. Con l’avvento dei sistemi multi-processore su singolo chip (MPSoC) il parallel programming si è diffuso largamente anche in ambito embedded. Tuttavia, i progressi nel campo della programmazione parallela non hanno mantenuto il passo con la capacità di integrare hardware parallelo su un singolo chip. Oltre all’introduzione di multipli processori, la necessità di ridurre i consumi degli MPSoC comporta altre soluzioni architetturali che hanno l’effetto diretto di complicare lo sviluppo delle applicazioni. Il design del sottosistema di memoria, in particolare, è un problema critico. Integrare sul chip dei banchi di memoria consente dei tempi d’accesso molto brevi e dei consumi molto contenuti. Sfortunatamente, la quantità di memoria on-chip che può essere integrata in un MPSoC è molto limitata. Per questo motivo è necessario aggiungere dei banchi di memoria off-chip, che hanno una capacità molto maggiore, come maggiori sono i consumi e i tempi d’accesso. La maggior parte degli MPSoC attualmente in commercio destina una parte del budget di area all’implementazione di memorie cache e/o scratchpad. Le scratchpad (SPM) sono spesso preferite alle cache nei sistemi MPSoC embedded, per motivi di maggiore predicibilità, minore occupazione d’area e – soprattutto – minori consumi. Per contro, mentre l’uso delle cache è completamente trasparente al programmatore, le SPM devono essere esplicitamente gestite dall’applicazione. Esporre l’organizzazione della gerarchia di memoria ll’applicazione consente di sfruttarne in maniera efficiente i vantaggi (ridotti tempi d’accesso e consumi). Per contro, per ottenere questi benefici è necessario scrivere le applicazioni in maniera tale che i dati vengano partizionati e allocati sulle varie memorie in maniera opportuna. L’onere di questo compito complesso ricade ovviamente sul programmatore. Questo scenario descrive bene l’esigenza di modelli di programmazione e strumenti di supporto che semplifichino lo sviluppo di applicazioni parallele. In questa tesi viene presentato un framework per lo sviluppo di software per MPSoC embedded basato su OpenMP. OpenMP è uno standard di fatto per la programmazione di multiprocessori con memoria shared, caratterizzato da un semplice approccio alla parallelizzazione tramite annotazioni (direttive per il compilatore). La sua interfaccia di programmazione consente di esprimere in maniera naturale e molto efficiente il parallelismo a livello di loop, molto diffuso tra le applicazioni embedded di tipo signal processing e multimedia. OpenMP costituisce un ottimo punto di partenza per la definizione di un modello di programmazione per MPSoC, soprattutto per la sua semplicità d’uso. D’altra parte, per sfruttare in maniera efficiente il potenziale computazionale di un MPSoC è necessario rivisitare profondamente l’implementazione del supporto OpenMP sia nel compilatore che nell’ambiente di supporto a runtime. Tutti i costrutti per gestire il parallelismo, la suddivisione del lavoro e la sincronizzazione inter-processore comportano un costo in termini di overhead che deve essere minimizzato per non comprometterre i vantaggi della parallelizzazione. Questo può essere ottenuto soltanto tramite una accurata analisi delle caratteristiche hardware e l’individuazione dei potenziali colli di bottiglia nell’architettura. Una implementazione del task management, della sincronizzazione a barriera e della condivisione dei dati che sfrutti efficientemente le risorse hardware consente di ottenere elevate performance e scalabilità. La condivisione dei dati, nel modello OpenMP, merita particolare attenzione. In un modello a memoria condivisa le strutture dati (array, matrici) accedute dal programma sono fisicamente allocate su una unica risorsa di memoria raggiungibile da tutti i processori. Al crescere del numero di processori in un sistema, l’accesso concorrente ad una singola risorsa di memoria costituisce un evidente collo di bottiglia. Per alleviare la pressione sulle memorie e sul sistema di connessione vengono da noi studiate e proposte delle tecniche di partizionamento delle strutture dati. Queste tecniche richiedono che una singola entità di tipo array venga trattata nel programma come l’insieme di tanti sotto-array, ciascuno dei quali può essere fisicamente allocato su una risorsa di memoria differente. Dal punto di vista del programma, indirizzare un array partizionato richiede che ad ogni accesso vengano eseguite delle istruzioni per ri-calcolare l’indirizzo fisico di destinazione. Questo è chiaramente un compito lungo, complesso e soggetto ad errori. Per questo motivo, le nostre tecniche di partizionamento sono state integrate nella l’interfaccia di programmazione di OpenMP, che è stata significativamente estesa. Specificamente, delle nuove direttive e clausole consentono al programmatore di annotare i dati di tipo array che si vuole partizionare e allocare in maniera distribuita sulla gerarchia di memoria. Sono stati inoltre sviluppati degli strumenti di supporto che consentono di raccogliere informazioni di profiling sul pattern di accesso agli array. Queste informazioni vengono sfruttate dal nostro compilatore per allocare le partizioni sulle varie risorse di memoria rispettando una relazione di affinità tra il task e i dati. Più precisamente, i passi di allocazione nel nostro compilatore assegnano una determinata partizione alla memoria scratchpad locale al processore che ospita il task che effettua il numero maggiore di accessi alla stessa.
APA, Harvard, Vancouver, ISO, and other styles
6

Jones, Evan Philip Charles. "Practical Routing in Delay-Tolerant Networks." Thesis, University of Waterloo, 2006. http://hdl.handle.net/10012/814.

Full text
Abstract:
Delay-tolerant networks (DTNs) have the potential to connect devices and areas of the world that are under-served by traditional networks. The idea is that an end-to-end connection may never be present. To make communication possible, intermediate nodes take custody of the data being transferred and forward it as the opportunity arises. Both links and nodes may be inherently unreliable and disconnections may be long-lived. A critical challenge for DTNs is determining routes through the network without ever having an end-to-end connection.

This thesis presents a practical routing protocol that uses only observed information about the network. Previous approaches either require complete future knowledge about the connection schedules, or use many copies of each message. Instead, our protocol uses a metric that estimates the average waiting time for each potential next hop. This learned topology information is distributed using a link-state routing protocol, where the link-state packets are flooded using epidemic routing. The routing is recomputed each time connections are established, allowing messages to take advantage of unpredictable contacts. Messages are exchanged if the topology suggests that a connected node is "closer" than the current node.

Simulation results are presented, showing that the protocol provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge. Further, it requires a significantly less resources than the epidemic alternative, suggesting that this approach scales better with the number of messages in the network.
APA, Harvard, Vancouver, ISO, and other styles
7

Désiré, Nguessan. "Um modelo de gerência de segurança para middleware baseado em tuple para ambientes difusos e nômades." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-21012010-171918/.

Full text
Abstract:
Este trabalho explora a gerência de segurança e cooperação de aplicações em sistemas distribuídos móveis. Neste contexto, é feito um estudo sobre os diferentes middlewares para ambientes móveis (mobile middleware): suas capacidades de enfrentar os desafios da mobilidade e da segurança. As análises do estudo mostram que esses middlewares devem possuir características que lhes permitem uma melhor adaptação às necessidades das aplicações e à natureza dos ambientes móveis. Os middlewares existentes pouco abordam a questão da segurança. A segurança ainda é um problema complexo que deve ser gerido em todos os níveis de um sistema distribuído móvel, incluindo novos mecanismos. Com base nessa análise, foi desenvolvido um modelo de gerência de segurança que implementa um mecanismo de autenticação mútua, confidencialidade, detecção de intruso e controle de acesso em ambientes móveis. O objetivo é garantir a confiabilidade, a disponibilidade de serviços e a privacidade do usuário através da tecnologia PET - Privacy-Enhancing Tecnologies. A idéia é fundamentada em agentes interceptadores e autoridades de segurança que distribuem tíquetes de segurança e controlam o acesso a recursos e espaços de tuple do ambiente. O estudo de caso apresentou resultados satisfatórios que permitem julgar a pertinência do modelo proposto. O modelo será integrado a um sistema de e-saúde.
The work exploits the security management and the cooperation of applications in mobile distributed systems. In this context a study of different mobile middleware is made. The study examines their capacities to face the challenges of mobility and security issues. The analysis shows that the existing middleware has very few approaches on security problems; security is still a complex issue to be managed in all the levels of mobile distributed system including new mechanisms. Based on this analysis, a security management model is developed that implements a mechanism for mutual authentication, confidentiality, intrusion detection, access control of mobile agents in mobile environments, ensures services availability and user privacy, through technology PET (Privacy-Enhancing Technologies). The idea is based on interceptor agents and security authorities that distribute security tickets and control the access to resources and Tuple spaces in mobile environment. The proposed model presents good performance and is integrated to an e-health system: Relationship Management with Chronic Patient GRPC.
APA, Harvard, Vancouver, ISO, and other styles
8

Nathansohn, Nof. "Digital nomads : space + narrative computing for the village of Al Araqib." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127875.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Architecture, May, 2020
Cataloged from the official PDF of thesis. "May 2020."
Includes bibliographical references (pages 82-83).
For political reasons, the officially unrecognized Bedouin village of Al Araqib in Israeli's Negev desert is prevented from building permanent structures. While the state of Israel does not issue demolition warrants for new illegal houses, it instead demolishes these houses without a warrant, under the auspices of a law that allows the police to destroy new illegal structures within 30 days of construction. This situation has encouraged the people of Al Araqib to become familiar with different technologies. They use solar energy to provide electricity to the village, and smartphones to document and report demolitions. As an act of resistance as much as a practical measure, they repeatedly rebuild their houses, appropriating architecture as a political tool. This creates a situation where the Bedouin with their strong nomadic history, uses physical structures--the language and logic used by their oppressors--in the fight for their ancestral land.
Beyond supporting and recognizing the Bedouin people's fight for justice, this design thesis asks to harness the conflux of physical architecture and digital technologies in an effort to create innovative modes of communication that speak to the experiences of unrecognized populations, struggling for cultural survival. Specifically, through collaborative work by the people of Al Araqib, this thesis initiates a laboratory of tools and techniques that harness the spatial characteristics of the land and the social narrative of its people. Aiming to strengthen their ability to communicate more widely and more productively, the thesis proposes a platform that includes a set of digital and physical tools, such as digital design and fabrication, hackable devices, internet of things, architectural drawings, videos, sensors, GPS, automatization and GIS. Lastly, this thesis catalogues these diverse tools as part of a content management system and as a 'cookbook'.
It is composed of spatial information, automated and visualized to create a more persuasive narrative, and of journalistic strategies that introduce knowledge sharing and evidence of the reality of demolition and its impact on human lives.
by Nof Nathansohn.
S.M.
S.M. Massachusetts Institute of Technology, Department of Architecture
APA, Harvard, Vancouver, ISO, and other styles
9

Vales, Ruben Oliveira. "Nomadic fog storage." Master's thesis, 2017. http://hdl.handle.net/10071/14930.

Full text
Abstract:
Mobile services incrementally demand for further processing and storage. However, mobile devices are known for their constrains in terms of processing, storage, and energy. Early proposals have addressed these aspects; by having mobile devices access remote clouds. But these proposals suffer from long latencies and backhaul bandwidth limitations in retrieving data. To mitigate these issues, edge clouds have been proposed. Using this paradigm, intermediate nodes are placed between the mobile devices and the remote cloud. These intermediate nodes should fulfill the end users’ resource requests, namely data and processing capability, and reduce the energy consumption on the mobile devices’ batteries. But then again, mobile traffic demand is increasing exponentially and there is a greater than ever evolution of mobile device’s available resources. This urges the use of mobile nodes’ extra capabilities for fulfilling the requisites imposed by new mobile applications. In this new scenario, the mobile devices should become both consumers and providers of the emerging services. The current work researches on this possibility by designing, implementing and testing a novel nomadic fog storage system that uses fog and mobile nodes to support the upcoming applications. In addition, a novel resource allocation algorithm has been developed that considers the available energy on mobile devices and the network topology. It also includes a replica management module based on data popularity. The comprehensive evaluation of the fog proposal has evidenced that it is responsive, offloads traffic from the backhaul links, and enables a fair energy depletion among mobiles nodes by storing content in neighbor nodes with higher battery autonomy.
Os serviços móveis requerem cada vez mais poder de processamento e armazenamento. Contudo, os dispositivos móveis são conhecidos por serem limitados em termos de armazenamento, processamento e energia. Como solução, os dispositivos móveis começaram a aceder a estes recursos através de nuvens distantes. No entanto, estas sofrem de longas latências e limitações na largura de banda da rede, ao aceder aos recursos. Para resolver estas questões, foram propostas soluções de edge computing. Estas, colocam nós intermediários entre os dispositivos móveis e a nuvem remota, que são responsáveis por responder aos pedidos de recursos por parte dos utilizadores finais. Dados os avanços na tecnologia dos dispositivos móveis e o aumento da sua utilização, torna-se cada mais pertinente a utilização destes próprios dispositivos para fornecer os serviços da nuvem. Desta forma, o dispositivo móvel torna-se consumidor e fornecedor do serviço nuvem. O trabalho atual investiga esta vertente, implementado e testando um sistema que utiliza dispositivos móveis e nós no “fog”, para suportar os serviços móveis emergentes. Foi ainda implementado um algoritmo de alocação de recursos que considera os níveis de energia e a topologia da rede, bem como um módulo que gere a replicação de dados no sistema de acordo com a sua popularidade. Os resultados obtidos provam que o sistema é responsivo, alivia o tráfego nas ligações no core, e demonstra uma distribuição justa do consumo de energia no sistema através de uma disseminação eficaz de conteúdo nos nós da periferia da rede mais próximos dos nós consumidores.
APA, Harvard, Vancouver, ISO, and other styles
10

Lanfermann, Gerd [Verfasser]. "Nomadic migration : a service environment for autonomic computing on the Grid / von Gerd Lanfermann." 2003. http://d-nb.info/968682774/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Nomadic computing"

1

International, Conference on Systems Research Informatics and Cybernetics (14th 2002 Baden-Baden Germany). Advances in computer cybernetics: Nomadic computing for wireless applications ... Windsor, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roberts, Steven K. Computing Across America: The Bicycle Odyssey of a High-Tech Nomad. Information Today, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Nomadic computing"

1

Kleinrock, L. "Nomadic Computing." In IFIP Advances in Information and Communication Technology, 223–33. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34985-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oppermann, Reinhard, Marcus Specht, and Igor Jaceniak. "Hippie: A Nomadic Information System." In Handheld and Ubiquitous Computing, 330–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48157-5_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McCann, J. A., and J. S. Crane. "Component DBMS architecture for nomadic computing." In Lecture Notes in Computer Science, 175–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oppermann, Reinhard, and Marcus Specht. "A Context-Sensitive Nomadic Exhibition Guide." In Handheld and Ubiquitous Computing, 127–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-39959-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cotroneo, Domenico, Armando Migliaccio, and Stefano Russo. "A Communication Broker for Nomadic Computing Systems." In High Performance Computing and Communications, 1011–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11557654_112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nikiforova, Evdokia, Viktor Nogovitsyn, Lena Borisova, and Anatoliy Nikolaev. "Nomadic School: Problem of Access to Quality Education." In Advances in Intelligent Systems and Computing, 53–58. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11473-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Olmedo-Aguirre, José Oscar, Mónica Rivera de la Rosa, and Guillermo Morales-Luna. "ECA-Rule Visual Programming for Ubiquitous and Nomadic Computing." In MICAI 2008: Advances in Artificial Intelligence, 925–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88636-5_87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Paal, Stefan, Reiner Kammüller, and Bernd Freisleben. "A Cross-Platform Application Environment for Nomadic Desktop Computing." In Object-Oriented and Internet-Based Technologies, 185–200. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30196-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Paal, Stefan, Reiner Kammüller, and Bernd Freisleben. "Supporting Nomadic Desktop Computing Using an Internet Application Workbench." In On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops, 40–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30470-8_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sugihara, Koichiro, and Naohiro Hayashibara. "Message Dissemination Using Nomadic Lévy Walk on Unit Disk Graphs." In Advances in Intelligent Systems and Computing, 136–47. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22354-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Nomadic computing"

1

Zhang, Jun, and Chris Phillips. "Intelligent Roaming for Nomadic Computing." In Communication Technologies: from Theory to Applications (ICTTA). IEEE, 2008. http://dx.doi.org/10.1109/ictta.2008.4530179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Kan, and Tim Kindberg. "An authorization infrastructure for nomadic computing." In the seventh ACM symposium. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/507711.507728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alonso, Rafael, and Henry F. Korth. "Database system issues in nomadic computing." In the 1993 ACM SIGMOD international conference. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/170035.170092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Baloian, Nelson, Ramon Cruzat, Richard Ibarra, and Javier Bustos-Jimenez. "Sketches characterization and compression for nomadic computing." In 2011 15th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2011. http://dx.doi.org/10.1109/cscwd.2011.5960113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wickramarachchi, Anuradha, Dulaj Atapattu, Pamoda Wimalasiri, Ravidu Mallawa Arachchi, and Gihan Dias. "Use of nomadic computing devices for storage synchronization." In 2018 International Conference on Information Networking (ICOIN). IEEE, 2018. http://dx.doi.org/10.1109/icoin.2018.8343204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Malhotra, Richa, Diptish Dey, Eric A. Van Doorn, and Antonius M. J. Koonen. "Traffic modeling in a reconfigurable broadband nomadic computing environment." In Information Technologies 2000, edited by Angela L. Chiu, Frank Huebner, and Robert D. van der Mei. SPIE, 2001. http://dx.doi.org/10.1117/12.417474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kristensen, Mads Daro, and Niels Olof Bouvin. "Energy Efficient Routing in Nomadic Networks." In Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07). IEEE, 2007. http://dx.doi.org/10.1109/percomw.2007.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bolla, R., S. Mangialardi, R. Rapuzzi, and M. Repetto. "Streaming Multimedia Contents to Nomadic Users in Ubiquitous Computing Environments." In IEEE INFOCOM 2009 - IEEE Conference on Computer Communications Workshops. IEEE, 2009. http://dx.doi.org/10.1109/infcomw.2009.5072193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nkenyereye, L., and J. W. Jang. "Cloud Computing Enabled External Applications to Car Users using Nomadic Smartphones." In International Conference on Computer Information Systems and Industrial Applications. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/cisia-15.2015.72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

de Carvalho, Aparecido Fabiano Pinatti, Luigina Ciolfi, and Breda Gray. "Detailing a Spectrum of Motivational Forces Shaping Nomadic Practices." In CSCW '17: Computer Supported Cooperative Work and Social Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/2998181.2998313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography