Exploiting reflection in mobile computing middleware
نویسندگان
چکیده
منابع مشابه
Exploiting Reflection and Metadata to build Mobile Computing Middleware
Recent advances in wireless networking technologies and the growing success of mobile computing devices, such as laptop computers, third generation mobile phones, personal digital assistants, watches and the like, are enabling new classes of applications that present challenging problems to designers. Devices face temporary and unannounced loss of network connectivity when they move; they disco...
متن کاملExploiting Logical Mobility in Mobile Computing Middleware
In the past few years, we have witnessed the growth in availability of mobile computing devices, such as mobile phones, personal digital assistants (PDAs), laptop computers and the like, combined with the advent of new wireless networking systems, such as 802.11b, Bluetooth, and GSM/GPRS. Users of such devices demand access to networked information and services at all times and locations, and, ...
متن کاملMobile Computing Middleware
Recent advances in wireless networking technologies and the growing success of mobile computing devices, such as laptop computers, third generation mobile phones, personal digital assistants, watches and the like, are enabling new classes of applications that present challenging problems to designers. Mobile devices face temporary loss of network connectivity when they move; they are likely to ...
متن کاملMiddleware for Mobile Computing
Recent advances in wireless networking technologies and the growing success of mobile computing devices, such as laptop computers, third generation mobile phones, personal digital assistants, watches and the like, are enabling new classes of applications that present challenging problems to designers. Mobile devices face temporary loss of network connectivity when they move; they are likely to ...
متن کاملTowards A Mobile Computing Middleware: A Synergy of Reflection and Mobile Code Techniques
In the past decade, middleware technologies built on top of network operating systems have greatly enhanced the design and implementation of distributed applications. In particular, they succeeded in hiding away many requirements introduced by distribution, such as heterogeneity, fault tolerance, resource sharing, and the like, from application developers, offering them an image of the distribu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGMOBILE Mobile Computing and Communications Review
سال: 2002
ISSN: 1559-1662,1931-1222
DOI: 10.1145/643550.643553