{"title":"普适计算的路由策略","authors":"Jizhi Wang","doi":"10.1109/SPCA.2006.297534","DOIUrl":null,"url":null,"abstract":"In the near future, a pervasive computing environment can be expected based on the recent progresses and advances in computing and communication technologies. This paper describes the recent network model that can be applied in pervasive computing. The routing strategy among networks is presented in pervasive computing. Special attention is paid on key research issues include X-cast routing algorithms, security schemes, and QoS model","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Routing Strategy of Pervasive Computing\",\"authors\":\"Jizhi Wang\",\"doi\":\"10.1109/SPCA.2006.297534\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the near future, a pervasive computing environment can be expected based on the recent progresses and advances in computing and communication technologies. This paper describes the recent network model that can be applied in pervasive computing. The routing strategy among networks is presented in pervasive computing. Special attention is paid on key research issues include X-cast routing algorithms, security schemes, and QoS model\",\"PeriodicalId\":232800,\"journal\":{\"name\":\"2006 First International Symposium on Pervasive Computing and Applications\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 First International Symposium on Pervasive Computing and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPCA.2006.297534\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 First International Symposium on Pervasive Computing and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPCA.2006.297534","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In the near future, a pervasive computing environment can be expected based on the recent progresses and advances in computing and communication technologies. This paper describes the recent network model that can be applied in pervasive computing. The routing strategy among networks is presented in pervasive computing. Special attention is paid on key research issues include X-cast routing algorithms, security schemes, and QoS model