2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies 2009
DOI: 10.1109/ubicomm.2009.8
|View full text |Cite
|
Sign up to set email alerts
|

Multipath Data Transmission for Wireless Thin Clients

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Regardless of its original type, the heterogeneous graphical content (text, image, graphics, video, 3D, …) is converted into sequences of images (eventually a mixture of images and graphics), which are then interactively displayed on the terminal. Such an approach would appear to be inappropriate when addressing the above-mentioned mobile thin client constraints [7]- [10] since it would reduce the user experience. Moreover, these solutions are restricted practically by their genericity: they depend on the device capabilities, operating system and user community support.…”
Section: Introductionmentioning
confidence: 99%
“…Regardless of its original type, the heterogeneous graphical content (text, image, graphics, video, 3D, …) is converted into sequences of images (eventually a mixture of images and graphics), which are then interactively displayed on the terminal. Such an approach would appear to be inappropriate when addressing the above-mentioned mobile thin client constraints [7]- [10] since it would reduce the user experience. Moreover, these solutions are restricted practically by their genericity: they depend on the device capabilities, operating system and user community support.…”
Section: Introductionmentioning
confidence: 99%
“…Second, mobile thin client computing allows companies to better protect their classified data. By running office applications on a centralized company server, mobile employees can ubiquitously access all necessary data while at the same time the confidential and valuable data stays on the trusted and secured central server [21]. For example, no data can get lost owing to the theft of a mobile device of one of the employees.…”
Section: Introductionmentioning
confidence: 99%