• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 21,600
Next 10 →

M.: Tourism and mobile technology

by Barry Brown, Matthew Chalmers - In: Eighth European Conference on CSCW ‘03
"... Abstract. While tourism presents considerable potential for the use of new mobile technologies, we currently have little understanding of how tourists organise their activities or of the problems they face. This paper presents an ethnographic study of city tourists ’ practices that draws out a numbe ..."
Abstract - Cited by 97 (7 self) - Add to MetaCart
Abstract. While tourism presents considerable potential for the use of new mobile technologies, we currently have little understanding of how tourists organise their activities or of the problems they face. This paper presents an ethnographic study of city tourists ’ practices that draws out a

Understanding Code Mobility

by Alfonso Fuggetta, Gian Pietro Picco, Giovanni Vigna - IEEE COMPUTER SCIENCE PRESS , 1998
"... The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular, they fail in providing the desired degree of configurability, ..."
Abstract - Cited by 560 (34 self) - Add to MetaCart
conceptual framework for understanding code mobility. The framework is centered around a classification that introduces three dimensions: technologies, design paradigms, and applications. The contribution of the paper is twofold. First, it provides a set of terms and concepts to understand and compare

Mobile Technology)

by Dr. Vinod, Kumar Gupta, Renu Bagoria, Neha Bagoria
"... Abstract- This paper identifies and investigates the factors which influence customers decision to use a specific form of mobile banking, and specifically focuses on the evaluation of SMSbased mobile banking in India. Other my study plans to connect the gap of research in the acceptance of mobile ba ..."
Abstract - Add to MetaCart
banking among the customers. Main challenges are what are the Positive and Negative factors which influence the adoption of SMS-based mobile banking? Second is Focus on the adoption of mobile banking services by customers and usage of mobile banking in India. Third is Different Technologies behind Mobile

Next Century Challenges: Mobile Networking for “Smart Dust”

by J. M. Kahn, R. H. Katz , K. S. J. Pister , 1999
"... Large-scale networks of wireless sensors are becoming an active topic of research. Advances in hardware technology and engineering design have led to dramatic reductions in size, power consumption and cost for digital circuitry, wire-less communications and Micro ElectroMechanical Systems (MEMS). Th ..."
Abstract - Cited by 625 (1 self) - Add to MetaCart
the key elements of the emergent technology of “Smart Dust ” and outline the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network nodes co-located within a small volume.

A survey of context-aware mobile computing research

by Guanling Chen, David Kotz , 2000
"... Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied this topi ..."
Abstract - Cited by 692 (2 self) - Add to MetaCart
Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied

The design of personal mobile technologies for lifelong learning

by Mike Sharples - Computers & Education , 2000
"... interface; interactive learning environments; lifelong learning This paper sets out a framework for the design of a new genre of educational technology: personal (handheld or wearable) computer systems that support learning from any location throughout a lifetime. We set out a theory of lifelong lea ..."
Abstract - Cited by 183 (10 self) - Add to MetaCart
interface; interactive learning environments; lifelong learning This paper sets out a framework for the design of a new genre of educational technology: personal (handheld or wearable) computer systems that support learning from any location throughout a lifetime. We set out a theory of lifelong

A Survey of active network Research

by David L. Tennenhouse, Jonathan M. Smith - IEEE Communications , 1997
"... Active networks are a novel approach to network architecture in which the switches of the network perform customized computations on the messages flowing through them. This approach is motivated by both lead user applications, which perform user-driven computation at nodes within the network today, ..."
Abstract - Cited by 549 (29 self) - Add to MetaCart
, and the emergence of mobile code technologies that make dynamic network service innovation attainable. In this paper, we discuss two approaches to the realization of active networks and provide a snapshot of the current research issues and activities. Introduction – What Are Active Networks? In an active network

MACAW: A Media Access Protocol for Wireless LAN's

by Vaduvur Bharghavan, et al.
"... In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols f ..."
Abstract - Cited by 839 (11 self) - Add to MetaCart
In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols

The Cornerstones of Competitive Advantage: A Resource Based View,

by Margaret A Peteraf , J L Kellogg - Strategic Management Journal , 1993
"... JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about J ..."
Abstract - Cited by 978 (1 self) - Add to MetaCart
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about

NeXt generation/dynamic spectrum access/cognitive Radio Wireless Networks: A Survey

by Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty - COMPUTER NETWORKS JOURNAL (ELSEVIER , 2006
"... Today's wireless networks are characterized by a fixed spectrum assignment policy. However, a large portion of the assigned spectrum is used sporadically and geographical variations in the utilization of assigned spectrum ranges from 15% to 85% with a high variance in time. The limited availabl ..."
Abstract - Cited by 746 (15 self) - Add to MetaCart
. The term xG networks is used throughout the paper. The novel functionalities and current research challenges of the xG networks are explained in detail. More specifically, a brief overview of the cognitive radio technology is provided and the xG network architecture is introduced. Moreover, the xG network
Next 10 →
Results 1 - 10 of 21,600
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University