Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Wearable computing | p. 3 |
Developing mobile applications : a lime primer | p. 25 |
Pervasive application development : approaches and pitfalls | p. 53 |
ISAM, joining context awareness and mobility to building pervasive applications | p. 73 |
Integrating mobile wireless devices into the computational grid | p. 95 |
Multimedia messaging service | p. 121 |
A scheme for nomadic hosts location management using DNS | p. 149 |
Location management techniques for mobile computing environments | p. 163 |
Locating mobile objects | p. 197 |
Dependable message delivery to mobile units | p. 227 |
Location-dependent query processing in mobile computing | p. 255 |
Simulation models and tool for mobile location-dependent information access | p. 275 |
Context-aware mobile computing | p. 297 |
Mobile agent middlewares for context-aware applications | p. 315 |
Cache management in wireless and mobile computing environments | p. 337 |
Cache invalidation schemes in mobile environments | p. 361 |
Hoarding in mobile computing environments | p. 389 |
Power-aware cache management in mobile environments | p. 403 |
Energy efficient selective cache invalidation | p. 421 |
Self-policing mobile ad hoc networks | p. 435 |
Securing mobile ad hoc networks | p. 457 |
Ad hoc network security | p. 483 |
Modeling distributed applications for mobile ad hoc networks using attributed task graphs | p. 503 |
Medium access control mechanisms in mobile ad hoc networks | p. 543 |
Quality of service routing in mobile ad hoc networks : past and future | p. 569 |
Issues in scalable clustered network architecture for mobile ad hoc networks | p. 611 |
Routing and mobility management in wireless ad hoc networks | p. 637 |
Localized broadcasting in mobile ad hoc networks using neighbor designation | p. 663 |
Energy-efficient wireless networks | p. 689 |
Power management for mobile computers | p. 709 |
Power awareness and management techniques | p. 731 |
Adaptive algorithmic power optimization for multimedia workload in mobile environments | p. 747 |
Energy-aware Web caching over hybrid networks | p. 779 |
Transmitter power control in wireless computing | p. 805 |
A survey on mobile transaction models | p. 839 |
Analytic mobility models of PCS networks | p. 877 |
Battery power management in portable devices | p. 893 |
Challenges in wireless security : a case study of 802.11 | p. 923 |
Security for mobile agents : issues and challenges | p. 941 |
Security, trust, and privacy in mobile computing environments | p. 961 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.