Extensible security architectures for Java
Proceedings of the sixteenth ACM symposium on Operating systems principles
Agile application-aware adaptation for mobility
Proceedings of the sixteenth ACM symposium on Operating systems principles
Flexible network support for mobility
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Vertical handoffs in wireless overlay networks
Mobile Networks and Applications - Special issue: mobile networking in the Internet
An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Managing Imap
A User-Centered Location Model
Personal and Ubiquitous Computing
Mobile Networking Through Mobile IP
IEEE Internet Computing
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Reconsidering Internet Mobility
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
A peer-to-peer approach to wireless LAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Secure authentication system for public WLAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Seamless User-Level Handoff in Ubiquitous Multimedia Service Delivery
Multimedia Tools and Applications
Routing in multi-radio, multi-hop wireless mesh networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Reputation-based Wi-Fi deployment protocols and security analysis
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Supporting service discovery, querying and interaction in ubiquitous computing environments
Wireless Networks - Special issue: Pervasive computing and communications
Reconsidering wireless systems with multiple radios
ACM SIGCOMM Computer Communication Review
Contact networking: a localized mobility system
Proceedings of the 1st international conference on Mobile systems, applications and services
WilmaGate: a new open access gateway for hotspot management
Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Iterative Adaptation for Mobile Clients Using Existing APIs
IEEE Transactions on Parallel and Distributed Systems
The Last Inch at 70 Miles Per Hour
IEEE Pervasive Computing
Host Mobility Using an Internet Indirection Infrastructure
Proceedings of the 1st international conference on Mobile systems, applications and services
Dynamic host configuration for managing mobility between public and private networks
USITS'01 Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems - Volume 3
OSDI '06 Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
EnsemBlue: integrating distributed storage and consumer electronics
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Parallelizing security checks on commodity hardware
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems
FatVAP: aggregating AP backhaul capacity to maximize throughput
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
A network-based architecture for seamless mobility services
IEEE Communications Magazine
Hi-index | 0.00 |
Wireless infrastructures are increasingly diverse, complex, and difficult to manage. Those who restrict themselves to homogeneous, managed campus or corporate networks are a vanishing breed. In the wild, users are confronted with many overlapping infrastructures with a broad variety of strengths and weaknesses. Such diversity of infrastructure is both a challenge and an opportunity. The challenge lies in presenting the alternatives to applications and users in a way that provides the best possible utility to both. However, by managing these many alternatives, we can provide significant benefits, exploiting multiple networks concurrently and planning future transmissions intelligently.