Mobile computing is one of the biggest issues of computer technology, science and industry today. This book looks at the requirements of developing mobile computing systems and the challenges they pose to computer designers. It examines the requirements of mobile computing hardware, infrastructure and communications services. Information security and the data protection aspects of design are considered, together with telecommunications facilities for linking up to the worldwide computer infrastructure. The book also considers the mobility of computer users versus the portability of the equipment. The text also examines current applications of mobile computing in the public sector and future innovative applications.
Papildus informācija
Springer Book Archives
Keynote Paper.- 1 Trends of flat displays in the multimedia age.- Track
1 Mobile Technology, Tools and Applications.- 2 System support and
applications for mobile computing.- 3 Developments in mobile data system
technology particularly GSM.- 4 Replication-support for advanced mobile
applications.- 5 Caching data over a broadcast channel.- 6 Mobile frames: a
pragmatic approach to automatic application partitioning based on an end-user
data model.- 7 Generic personal communications support for open service
environments.- 8 Supporting user mobility.- 9 Designing secure agents with
O.O. technologies for users mobility.- 10 The idea: integrating authoring
concepts for mobile agents into an authoring tool for active multimedia
mail.- 11 Animation within mobile multimedia on-line services.- 12
Theoretical analyses of data communications integrated into cordless voice
channels.- 13 Random access, reservation and polling multiaccess protocol for
wireless data systems.- 14 Challenges in mobile information systems and
services.- 15 A buffer overhead minimization method for multicast-based
handoff in picocellular networks.- 16 Impact of mobility in mobile
communication systems.- 17 Mobile computing based on GSM: the Mowgli
approach.- 18 An adaptive data distribution system for mobile environments.-
19 Object oriented system architecture and strategies for the exchange of
structured multimedia data with mobile hosts.- 20 Agent skills and their
roles in mobile computing and personal communications.- 21 A global QoS
management for wireless network.- 22 Resource discovery protocol for mobile
computing.- Track 2 Trusting in Technology, Authentication, Security.- 23 The
future of smart cards: technology and application.- 24 Use of smart cards for
security applications by DeutscheTelekom.- 25 An authentication and security
protocol for mobile computing.- 26 Design of secure end-to-end protocols for
mobile systems.- 27 Yet another simple internet electronic payment system.-
28 Difficulties in achieving security in mobile communications.- 29 GSM
digital cellular telephone system: a case study of encryption algorithms.- 30
A new algorithm for smart cards.- 31 A new approach to integrity of digital
images.- 32 How to protect multimedia applications.- 33 Phone card
application and authentication in wireless communications.- 34 Real-time
mobile EFTPOS: challenges and implications of a world first application.-
Index of Contributors.- Keyword Index.