
Mobile Intelligence
by Laurence T. Yang (Department of Computer Science, St. Francis Xavier University, Canada)Rent Textbook
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
eTextbook
We're Sorry
Not Available
Summary
Table of Contents
Preface | |
Contributors | |
Mobile Data and Intelligence | |
A Survey of State-of-the-Art Routing Protocols for Mobile Ad Hoc Networks | |
Connected Dominating Set for Topology Control in Ad Hoc Networks | |
An Intelligent Way to Reduce Channel Under-utilization in Mobile Ad Hoc Networks, | |
Mobility in Publish/Subscribe Systems, | |
Cross-Layer Design Framework for Adaptive Cooperative Caching in Mobile Ad Hoc Networks | |
Recent Advances in Mobile Agent-Oriented Applications | |
Location-Based Mobile Information Services | |
KCLS: A Cluster-Based Location Service Protocol and Its Applications in Multihop Mobile Networks | |
Predictive Location Tracking in Cellular and in Ad Hoc Wireless Networks | |
An Efficient Air Index Scheme for Spatial Data Dissemination in Mobile Computing Environments | |
Next Generation Location-based Services: Merging Positioning and Web 2.0 | |
Mobile Mining | |
Data Mining for Moving Object Databases | |
Mobile Data Mining on Small Devices Through Web Services | |
Mobile Context-Aware and Applications | |
Context Awareness: A Formal Foundation | |
Experiences with a Smart Office Project 294 | |
An Agent-Based Architecture for Providing Enhanced Communication Services.Part V Mobile Intelligence Security | |
MANET Routing Security | |
An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks | |
SMRTI: Secure Mobile Ad Hoc Network Routing with Trust Intrigue | |
Managing Privacy in Location-based Access Control Systems | |
Mobile Multimedia | |
VoiceXML-Enabled Intelligent Mobile Services | |
User Adaptive Video Retrieval on Mobile Devices | |
A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-based Service Environment | |
Energy Efficiency for Mobile Multimedia Replay | |
Intelligent Network | |
Efficient Data-Centric Storage Mechanisms in Wireless Sensor Networks | |
Tracking in Wireless Sensor Networks | |
DDoS Attack Modeling and Detection in Wireless Sensor Networks | |
Energy-Efficient Pattern Recognition for Wireless Sensor Networks | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.