When two devices come into contact, albeit opportunistically, it provides a great opportunity to match services to resources, exchange information, cyberforage, execute tasks remotely, and forward messages
Opportunities in opportunistic computing
Conti M;
2010
Abstract
When two devices come into contact, albeit opportunistically, it provides a great opportunity to match services to resources, exchange information, cyberforage, execute tasks remotely, and forward messagesFile in questo prodotto:
Non ci sono file associati a questo prodotto.
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


