


default search action
2nd MOBICOM 1996: Rye, New York, USA
- Hamid Ahmadi, Randy H. Katz, Ian F. Akyildiz, Zygmunt J. Haas:

MOBICOM '96, Proceedings of the Second Annual International Conference on Mobile Computing and Networking, Rye, New York, USA, November 10-12, 1996. ACM 1996, ISBN 0-89791-872-X - Mikael Degermark, Mathias Engan, Björn Nordgren, Stephen Pink:

Low-Loss TCP/IP Header Compression for Wireless Networks. 1-14 - Robert C. Durst, Gregory J. Miller, Eric J. Travis:

TCP Extensions for Space Communications. 15-26 - Charles E. Perkins, David B. Johnson:

Mobility Support in IPv6. 27-37 - Jan Jannink, Derek Lam, Jennifer Widom, Donald C. Cox, Narayanan Shivakumar:

Efficient and Flexible Location Management Techniques for Wireless Communication Systems. 38-49 - Daniel O. Awduche, Arthur S. Gaylord, Aura Ganz:

On Resource Discovery in Distributed Systems with Mobile Hosts. 50-55 - Ramón Cáceres, Venkata N. Padmanabhan:

Fast and Scalable Handoffs for Wireless Internetworks. 56-66 - Ivan Vukovic, John W. McKown:

Spectrum Sharing Under the Asynchronous UPCS Etiquette: The Performance of Collocated Systems under Heavy Load. 67-72 - Sajal K. Das, Sanjoy K. Sen, Rajeev Jayaram:

A Dynamic Load Balancing Strategy for Channel Assignment Using Selective Borrowing in Cellular Mobile Environment. 73-84 - Håkan Mitts, Harri Hansén, Jukka Immonen, Simo Veikkolainen:

Lossless Handover for Wireless ATM. 85-96 - Sue Long, Rob Kooper, Gregory D. Abowd, Christopher G. Atkeson:

Rapid Prototyping of Mobile Context-Aware Applications: The Cyberguide Case Study. 97-107 - Barron C. Housel, David B. Lindquist:

WebExpress: A System for Optimizing Web Browsing in a Wireless Environment. 108-116 - Anthony D. Joseph, M. Frans Kaashoek:

Building Reliable Mobile-Aware Applications Using the Rover Toolkit. 117-129 - David P. Helmbold, Darrell D. E. Long, Bruce Sherrod:

A Dynamic Disk Spin-Down Technique for Mobile Computing. 130-142 - Jacob R. Lorch, Alan Jay Smith:

Reducing Processor Power Consumption by Improving Processor Time Management in a Single-user Operating System. 143-154 - Armando Fox, Steven D. Gribble

:
Security on the Move: Indirect Authentication using Kerberos. 155-164 - Liina Nenonen, Jouni Mikkonen:

Wireless ATM MAC Performance Evaluation, Case Study: HIPERLAN vs. modified MDR. 165-175 - Zhao Liu, Malathi Veeraraghavan, Kai Y. Eng:

A Scalable Wireless Virtual LAN. 176-186 - Rodrigo Garcés, J. J. Garcia-Luna-Aceves:

Floor Acquisition Multiple Access with Collision Resolution. 187-197

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














