Abstract
Recently, as smart computing is constantly growing in terms of data and the number of users, the demand for memory and network resources on a wireless mobile terminal has increased rapidly. To accommodate the need for terminal and network resources, previous techniques have been studied for efficient use of the limited network channels and terminal memory resources. This paper presents a new transmission method which overcomes the data transmission limitations of wireless-handsets such as constraints on the transmission channels and storage capacity of a wireless smart terminal in ubiquitous computing. The wireless device’s transmission and storage capacity limitations have hindered the advancement of ubiquitous computing on wireless Internet. This study proposes a real-time background transfer method to overcome these problems for powerful data transmission and large storage capacity among ubiquitous computing items.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
McCann, J., Bryson, D.: Smart clothes and wearable technology, pp. 3–24, 205–213. CRC Press (2009)
Krumm, J.: Ubiquitous Computing Fundamentals, pp. 1–35. CRC Press (2010)
Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F.: A survey of key management schemes in wireless sensor networks. Computer Communications 30, 2314–2341 (2007)
Al-bar, A., Wakeman, I.: A Survey of Adaptive Applications in Mobile Computing. In: The 21st International Conference on Distributed Computing Systems Workshops (ICDCSW 2001), p. 246 (2001)
Ramana, K.S., Chari, A.A., Kasiviswanth, N.: A Survey on Trust Management for Mobile Ad Hoc Networks. International Journal of Network Security & Its Applications (IJNSA) 2(2), 75–85 (2010)
Goth, G.: Mobile Devices Present Integration Challenges. In: IEEE IT Pro., pp. 11–15 (May 1999)
Poslad, S.: Ubiquitous Computing-smart devices, environments and interactions, pp. 343–378. John Wiley & Sons (2009)
Xu, Y., Li, W.J., Lee, K.K.: Intelligent Wearable Interfaces, pp. 5–30. John Wiley & Sons Press (2008)
Dang, P.P., Chau, P.M.: Robust image transmission over CDMA channels. IEEE Transactions on Consumer Electronics 46(3), 664–672 (2000)
Chu, G.H.: Image transmission apparatus and method using CDMA communication network, U.S. Patent No. US007505782B2, March 17 (2009)
Siewiorek, D., Smailagic, A., Starner, T.: Application Design for Wearable Computing, pp. 51–58. Morgan & Claypool Publishers (2008)
Lo, A., Lu, W., Jacobsson, M., Prasad, V., Niemegeers, I.: Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks. In: Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (July 2006)
Frazier, H.: The 802.3z Gigabit Ethernet Standard. IEEE Network 12(3), 6–7 (1998)
Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method and Physical Layer specifications," IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements, Std. 802.3 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, TG., Chung, GS. (2012). Background Transfer Method for Ubiquitous Computing. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-34601-9_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34600-2
Online ISBN: 978-3-642-34601-9
eBook Packages: Computer ScienceComputer Science (R0)