M. Endler, Hana K. Rubinsztejn, R. Rocha, Vagner José do Sacramento Rodrigues
{"title":"基于代理的移动计算适配","authors":"M. Endler, Hana K. Rubinsztejn, R. Rocha, Vagner José do Sacramento Rodrigues","doi":"10.1201/9781420013153.ch13","DOIUrl":null,"url":null,"abstract":"In mobile computing and wireless communication, proxies are mainly used to overcome the three major problems of these networks: throughput and latency differences between the wired and the wireless links, host mobility, and limited resources of the mobile hosts (MH). This report aims to present a general classification of proxy-based approaches, describe the most frequent functions assigned to proxies, discuss some of the underlying techniques used for implementing these functions, and present concrete examples of the most successful and well-known systems.","PeriodicalId":205382,"journal":{"name":"The Handbook of Mobile Middleware","volume":"105 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Proxy-Based Adaptation for Mobile Computing\",\"authors\":\"M. Endler, Hana K. Rubinsztejn, R. Rocha, Vagner José do Sacramento Rodrigues\",\"doi\":\"10.1201/9781420013153.ch13\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In mobile computing and wireless communication, proxies are mainly used to overcome the three major problems of these networks: throughput and latency differences between the wired and the wireless links, host mobility, and limited resources of the mobile hosts (MH). This report aims to present a general classification of proxy-based approaches, describe the most frequent functions assigned to proxies, discuss some of the underlying techniques used for implementing these functions, and present concrete examples of the most successful and well-known systems.\",\"PeriodicalId\":205382,\"journal\":{\"name\":\"The Handbook of Mobile Middleware\",\"volume\":\"105 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Handbook of Mobile Middleware\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/9781420013153.ch13\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Handbook of Mobile Middleware","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/9781420013153.ch13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In mobile computing and wireless communication, proxies are mainly used to overcome the three major problems of these networks: throughput and latency differences between the wired and the wireless links, host mobility, and limited resources of the mobile hosts (MH). This report aims to present a general classification of proxy-based approaches, describe the most frequent functions assigned to proxies, discuss some of the underlying techniques used for implementing these functions, and present concrete examples of the most successful and well-known systems.