Skip to main content

Background Transfer Method for Ubiquitous Computing

  • Conference paper
Network and System Security (NSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7645))

Included in the following conference series:

  • 1190 Accesses

Abstract

Recently, as smart computing is constantly growing in terms of data and the number of users, the demand for memory and network resources on a wireless mobile terminal has increased rapidly. To accommodate the need for terminal and network resources, previous techniques have been studied for efficient use of the limited network channels and terminal memory resources. This paper presents a new transmission method which overcomes the data transmission limitations of wireless-handsets such as constraints on the transmission channels and storage capacity of a wireless smart terminal in ubiquitous computing. The wireless device’s transmission and storage capacity limitations have hindered the advancement of ubiquitous computing on wireless Internet. This study proposes a real-time background transfer method to overcome these problems for powerful data transmission and large storage capacity among ubiquitous computing items.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McCann, J., Bryson, D.: Smart clothes and wearable technology, pp. 3–24, 205–213. CRC Press (2009)

    Google Scholar 

  2. Krumm, J.: Ubiquitous Computing Fundamentals, pp. 1–35. CRC Press (2010)

    Google Scholar 

  3. Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F.: A survey of key management schemes in wireless sensor networks. Computer Communications 30, 2314–2341 (2007)

    Article  Google Scholar 

  4. Al-bar, A., Wakeman, I.: A Survey of Adaptive Applications in Mobile Computing. In: The 21st International Conference on Distributed Computing Systems Workshops (ICDCSW 2001), p. 246 (2001)

    Google Scholar 

  5. Ramana, K.S., Chari, A.A., Kasiviswanth, N.: A Survey on Trust Management for Mobile Ad Hoc Networks. International Journal of Network Security & Its Applications (IJNSA) 2(2), 75–85 (2010)

    Article  Google Scholar 

  6. Goth, G.: Mobile Devices Present Integration Challenges. In: IEEE IT Pro., pp. 11–15 (May 1999)

    Google Scholar 

  7. Poslad, S.: Ubiquitous Computing-smart devices, environments and interactions, pp. 343–378. John Wiley & Sons (2009)

    Google Scholar 

  8. Xu, Y., Li, W.J., Lee, K.K.: Intelligent Wearable Interfaces, pp. 5–30. John Wiley & Sons Press (2008)

    Google Scholar 

  9. Dang, P.P., Chau, P.M.: Robust image transmission over CDMA channels. IEEE Transactions on Consumer Electronics 46(3), 664–672 (2000)

    Article  Google Scholar 

  10. Chu, G.H.: Image transmission apparatus and method using CDMA communication network, U.S. Patent No. US007505782B2, March 17 (2009)

    Google Scholar 

  11. Siewiorek, D., Smailagic, A., Starner, T.: Application Design for Wearable Computing, pp. 51–58. Morgan & Claypool Publishers (2008)

    Google Scholar 

  12. Lo, A., Lu, W., Jacobsson, M., Prasad, V., Niemegeers, I.: Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks. In: Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (July 2006)

    Google Scholar 

  13. Frazier, H.: The 802.3z Gigabit Ethernet Standard. IEEE Network 12(3), 6–7 (1998)

    Article  Google Scholar 

  14. Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method and Physical Layer specifications," IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements, Std. 802.3 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, TG., Chung, GS. (2012). Background Transfer Method for Ubiquitous Computing. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34601-9_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34600-2

  • Online ISBN: 978-3-642-34601-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics