Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Mobile Computing Projects

star_border star_border star_border star_border star_border

Adaptive and Energy Efficient Context

A novel framework that includes the time variant Hidden Markov Model. It estimates the user state us..

3,000.00INR
star_border star_border star_border star_border star_border

A P2P-based Market-guided Distributed Routing Mechanism forHigh-Throughput Hybrid Wireless Networks

Most of the file sharing networks plays a major role in the current networking domain. On that the f..

3,000.00INR
star_border star_border star_border star_border star_border

A Predictive Cross-Layered Interference Management in a Multichannel MAC with Reactive Routing in VANET

Vehicular ad hoc networks (VANETs) represent a particular mobile technology that permits communica..

4,500.00INR
star_border star_border star_border star_border star_border

ADAPTIVE MOBILE CLOUD COMPUTING TO ENABLE RICH MOBILE MULTIMEDIA APPLICATIONS

ABSTRACT In this paper, we look at early trends, and opportunities and benefits for new CMM app..

4,500.00INR
star_border star_border star_border star_border star_border

AN ADAPTIVE SYSTEM BASED ON ROAD MAP PROFILING TO ENHANCE WARNING MESSAGE DISSEMINATION IN VANETS

ABSTRACT           In recent years, new applications..

4,500.00INR
star_border star_border star_border star_border star_border

An Incentive-Compatible Mechanism for Transmission Scheduling of Delay-Sensitive Medical Packets in E-Health Networks

An incentive-compatible mechanism for transmission scheduling in electronic health (e-health) netw..

4,500.00INR
star_border star_border star_border star_border star_border

Backward Path Growth for Efficient Mobile Sequential Recommendation

The problem of mobile sequential recommendation is to suggest a route connecting a set of pick-up po..

3,500.00INR
star_border star_border star_border star_border star_border

Combined Authetication

n current computing environments, collaborative computing has been a central concern in Ubiquitous, ..

2,500.00INR
star_border star_border star_border star_border star_border

Demystifying the Imperfect Client-Side Cache Performance of Mobile Web Browsing-JAVA

The web browser is one of the most significant applications on mobile devices such as smartphones...

4,500.00INR
star_border star_border star_border star_border star_border

Design of Efficient Multicast protocol for IEEE 802.11n WLANs and Cross-Layer Optimization for scalable video streaming

—The legacy multicasting over IEEE 802.11-based WLANs has two well-known problems—poor reliability a..

2,500.00INR
star_border star_border star_border star_border star_border

Detecting Colluding Blackhole and Grey hole Attacks in Delay Tolerant Networks

Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in..

4,500.00INR
star_border star_border star_border star_border star_border

DISTRIBUTED COOPERATIVE CACHING IN SOCIAL WIRELESS

ABSTRACT: This paper introduces cooperative caching policies for minimizing electronic content ..

4,500.00INR
star_border star_border star_border star_border star_border

DISTRIBUTED MALWARE PROPAGATION IN MOBILE ADHOC NETWORK

ABSTRACT               &nbs..

4,500.00INR
star_border star_border star_border star_border star_border

Dynamic Frequency Resource Allocation in Heterogeneous Cellular Networks-JAVA

Deployment of low power picobasestations within cellular networks can potentially increase both ca..

4,500.00INR
star_border star_border star_border star_border star_border

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures

Rapid advances in wireless communication technologies have paved the way for a wide range of mobil..

4,500.00INR
Showing 1 to 15 of 45 (3 Pages)