Buy New
Rent Textbook
Digital
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
| Wearable computing | p. 3 |
| Developing mobile applications : a lime primer | p. 25 |
| Pervasive application development : approaches and pitfalls | p. 53 |
| ISAM, joining context awareness and mobility to building pervasive applications | p. 73 |
| Integrating mobile wireless devices into the computational grid | p. 95 |
| Multimedia messaging service | p. 121 |
| A scheme for nomadic hosts location management using DNS | p. 149 |
| Location management techniques for mobile computing environments | p. 163 |
| Locating mobile objects | p. 197 |
| Dependable message delivery to mobile units | p. 227 |
| Location-dependent query processing in mobile computing | p. 255 |
| Simulation models and tool for mobile location-dependent information access | p. 275 |
| Context-aware mobile computing | p. 297 |
| Mobile agent middlewares for context-aware applications | p. 315 |
| Cache management in wireless and mobile computing environments | p. 337 |
| Cache invalidation schemes in mobile environments | p. 361 |
| Hoarding in mobile computing environments | p. 389 |
| Power-aware cache management in mobile environments | p. 403 |
| Energy efficient selective cache invalidation | p. 421 |
| Self-policing mobile ad hoc networks | p. 435 |
| Securing mobile ad hoc networks | p. 457 |
| Ad hoc network security | p. 483 |
| Modeling distributed applications for mobile ad hoc networks using attributed task graphs | p. 503 |
| Medium access control mechanisms in mobile ad hoc networks | p. 543 |
| Quality of service routing in mobile ad hoc networks : past and future | p. 569 |
| Issues in scalable clustered network architecture for mobile ad hoc networks | p. 611 |
| Routing and mobility management in wireless ad hoc networks | p. 637 |
| Localized broadcasting in mobile ad hoc networks using neighbor designation | p. 663 |
| Energy-efficient wireless networks | p. 689 |
| Power management for mobile computers | p. 709 |
| Power awareness and management techniques | p. 731 |
| Adaptive algorithmic power optimization for multimedia workload in mobile environments | p. 747 |
| Energy-aware Web caching over hybrid networks | p. 779 |
| Transmitter power control in wireless computing | p. 805 |
| A survey on mobile transaction models | p. 839 |
| Analytic mobility models of PCS networks | p. 877 |
| Battery power management in portable devices | p. 893 |
| Challenges in wireless security : a case study of 802.11 | p. 923 |
| Security for mobile agents : issues and challenges | p. 941 |
| Security, trust, and privacy in mobile computing environments | p. 961 |
| Table of Contents provided by Blackwell. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.
