Essays about: "Mobile device management"

Showing result 36 - 38 of 38 essays containing the words Mobile device management.

  1. 36. Middleware for Context-Aware Opportunistic Networks

    University essay from KTH/Kommunikationssystem, CoS

    Author : Panteleimon Panidis; [2006]
    Keywords : Mobile devices; Wireless networks; middleware; context; Mobil enhet; Trådlösa nätverk; mellanvara; sammanhang;

    Abstract : Mobile devices such as palmtops and cell phones are continuously increasing in capabilities and popularity. At the same time, due to their decreasing price they are becoming more and more attractive and available to the average customer. This has lead to the development of many new applications for such portable electronic devices. READ MORE

  2. 37. Interactions of Vertical Handoffs with 802.11b wireless LANs : Handoff Policy

    University essay from KTH/Mikroelektronik och Informationsteknik, IMIT

    Author : Guilo Mola; [2004]
    Keywords : vertical handoff; mobile IP; SmartBadge; GPRS; 802.11b; Link Layer triggers;

    Abstract : Nomadic computing aims to be a leading short term revolution in the Internet, however to succeed in this the infrastructure, the protocols, the handoff mechanisms have to be designed and implemented to provide mobile computing with both reliability and transparency. A good deal of the work is addressed by mobile IP itself, but addressing wireless diversity is perhaps the most important next step. READ MORE

  3. 38. Nomadic Computing : Security assessment of remote access to workplace systems

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik och datavetenskap

    Author : Johanna Karlsson; [2003]
    Keywords : Remote Access; Security; Mobile Device; Wireless Communication;

    Abstract : Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. READ MORE