|
[1]R. O. LaMaire, “Wireless LANs and Mobile Networking: Standards and Future Directions”, IEEE Communications Magazine, Vol. 34, No. 8, August 1996, pp. 328-334. [2]K. C. Chen, “Medium Access Control of Wireless LANs for Mobile Computing”, IEEE Network, Vol. 8, No. 5, September/October 1994, pp.50-63. [3]K. Pahlavan, T. H. Probert, and M E. Chase, “Trends in Local Wireless Networks”, IEEE Communications Magazine, Vol. 33, No. 3, March 1995, pp. 33-38. [4]W. Stallings, “IEEE 802.11: Moving Closer to Practical Wireless LANS”, IT Professional, Vol. 3, No. 3, May/June 2001, pp. 17-23. [5]J. Lansford, A. Stephens, and R. Nevo, “Wi-Fi (802.11b) and Bluetooth: Enabling Coexistence”, IEEE Network, Vol. 15, No. 5, September/October 2001, pp. 20-27. [6]C. Heegard, J. T. Coffey, S. Gummadi, P. A. Murphy, R. Provencio, E. J. Rossin, S. Schrum, and M. B. Shoemake, “High Performance Wireless Ethernet”, IEEE Communications Magazine, Vol. 39, No. 11, November 2001, pp. 64-73. [7]Y. Hong, G. C. Walsh, and L. G. Bushnell, “Real-Time Mixed-Traffic Wireless Networks”, IEEE Transactions on Industrial Electronics, Vol. 48, No. 5, October 2001, pp. 883-890. [8]G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function”, IEEE Journal on Selected Areas in Communications, Vol. 18, No. 3, March 2000, pp. 535-547. [9]F. Cali, M. Conti, and E. Gregori, “IEEE 802.11 Protocol: Design and Performance Evaluation of an Adaptive Backoff Mechanism”, IEEE Journal on Selected Areas in Communications, Vol. 18, No. 9, September 2000, pp. 1774-1786. [10]B. P. Crow, I. Widjaja, L. G. Kim, and P. T. Sakai, “IEEE 802.11 Wireless Local Area Networks”, IEEE Communications Magazine, Vol. 35, No. 9, September 1997, pp. 116-126. [11]D. Tipper, T. Dahlberg, H. Shin, and C. Charnsripinyo, “Providing Fault Tolerance in Wireless Access Networks”, IEEE Communications Magazine, Vol. 40, No. 1, January 2002, pp. 58-64. [12]L. Jun and R. Yates, D. Raychaudhuri, “Performance Analysis of Path Rerouting Algorithms for Handoff Control in Mobile ATM Networks”, IEEE Journal on Selected Areas in Communications, Vol. 18, No. 3, March 2000, pp. 496-509. [13]M. El-Kaydi, S. Olariu, and H. Abdel-Wahab, “A Rate-Based Borrowing Scheme for QoS Provisioning in Multimedia Wireless Networks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 13, No. 2, February 2002, pp. 156-166. [14]D. Avagnina, F. Dovis, A. Ghiglione, and P. Mulassano, “Wireless Networks based on High-Altitude Platforms for the Provision of Integrated Navigation/ Communication Services”, IEEE Communications Magazine, Vol. 40, No. 2, February 2002, pp. 119-125. [15]L. D. Paulson, “Exploring the Wireless LANscape”, Computer, Vol. 33, No. 10, October 2000, pp. 12-16. [16]C. V. Gummala and J. O. Limb, “Design of an Access Mechanism for a High Speed Distributed Wireless LAN”, IEEE Journal on Selected Areas in Communications, Vol. 18, No. 9, September 2000, pp. 1740-1750. [17]S. Koutroubinas, T. Antonakopoulos, and V. Makios, “A New Efficient Access Protocol for Integrating Multimedia Services in the Home Environment”, IEEE Transactions on Consumer Electronics, Vol. 45, No. 3, August 1999, pp. 481-487. [18]R. Van Nee, G. Awater, M. Morikura, H. Takanashi, M. Webster, and K. W. Halford, “New High-Rate Wireless LAN Standards”, IEEE Communications Magazine, Vol. 37, No. 12, December 1999, pp. 82-88. [19]G. Anastasi, L. Lenzini, E. Mingozzi, A. Hettich, and A. Kramling, “MAC Protocols for Wideband Wireless Local Access: Evolution toward Wireless ATM”, IEEE Personal Communications, Vol. 5, No. 5, October 1998, pp. 53-64. [20]K. Pahlavan, A. Zahedi, and P. Krishnamurthy, “Wideband Local Access: Wireless LAN and Wireless ATM”, IEEE Communications Magazine, Vol. 35, No. 11, November 1997, pp. 34-40. [21]H. S. Chhaya and S. Gupta, “Performance of Asynchronous Data Transfer Methods of IEEE 802.11 MAC Protocol”, IEEE Personal Communications, Vol. 3, No. 5, October 1996, pp. 8-15. [22]J. C. Haartsen and S. Mattisson, “Bluetooth- A New Low-Power Radio Interface Providing Short-Range Connectivity”, Proceedings of the IEEE, Vol. 88, No. 10, October 2000, pp. 1651-1661. [23]Mobile Planet, http://www.mobileplanet.com. [24]Pocket Gear, http://www.pocketgear.com [25]Mobile Devices, http://www.microsoft.com/mobile. [26]H. Wang, G. Z. Zeng, and S. Lin, “A Strong Migration Method of Mobile Agents Based on Java”, The Sixth International Conference on Computer Supported Cooperative Work in Design, Ontario, Canada, July 2001, pp. 313-318. [27]J. Sanchez, F. Morilla, S. Dormido, J. Aranda, and P. Ruiperez, “Virtual and Remote Control Labs Using Java: A Qualitative Approach”, IEEE Control Systems Magazine, Vol. 22, No. 2, April 2002, pp. 8-10. [28]M. Grabner, G. Leonhartsberger, A. Leutgeb, and J. Altmann, “Java in Industrial Automation-A Virtual PLC”, The 25th Annual International Computer Software and Applications Conference, Chicago, USA, October 2001, pp. 477-479. [29]S. Helal, “Pervasive Java, Part II”, IEEE Pervasive Computing, Vol. 1, No. 2, April-June 2002, pp. 85-89. [30]E. A. Bretz, “New Phones Play Games and Run Java Applications”, IEEE Spectrum, Vol. 39, No. 2, February 2002, pp. 62-63. [31]L. Ho, S. X. Yang, and F. Wang, “A Remote Control System Using Java and CORBA Architecture”, Intelligent Control and Automation, Vol. 2, No. 2, April 2002, pp. 1337-1342. [32]E. Altendorf, M. Hohman, and R. Zabicki, “Using J2EE on a Large, Web-based Project”, IEEE Software, Vol. 19, No. 2, March 2002, pp. 81-89. [33]T. Y. Ku, D. H. Park, and K. D. Moon, “A Java-based Home Network Middleware Architecture Supporting IEEE 1394 and TCP/IP”, IEEE Transactions on Consumer Electronics, Vol. 48, No. 3, August 2002, pp. 496 -504. [34]C. E. Lin, C. C. Li, A. S. Hou, and C. C. Wu, “A Real Time Remote Control Architecture Using Mobile Communication”, Proceedings of the 19th IEEE on Instrumentation and Measurement Technology Conference, Alaska, USA, May 2002, pp. 901 -906. [35]C. F. Tsai and H. C. Wu, “A Multi-agent Architecture for Intelligent Home Network Service”, IEEE Transactions on Consumer Electronics, Vol. 48, No. 3, August 2002, pp. 505-514. [36]I.Nikolaidis, “The Remote Method Invocation Guide”, IEEE Network, Vol. 16, No. 2, March 2002, pp. 5-6. [37]L. Podesta, “A Web Browser for Remote Control of Measurement Systems”, Proceedings of the 19th IEEE on Instrumentation and Measurement Technology Conference, Alaska, USA, May 2002, pp. 647 -649. [38]K. Hasuko, C. Fukunaga, R. Ichimiya, M. Ikeno, Y. Ishida, H. Kano, H. Kurashige, K. Mizouchi, Y. Nakamura, H. Sakamoto, O. Sasaki, and K. Tanaka, “A Remote Control System for FPGA-embedded Modules in Radiation Environments”, IEEE Transactions on Nuclear and Plasma Sciences Society, Vol. 49, No. 2, April 2002, pp.501 -506. [39]B. Qiu, H. B. Gooi, Y. Liu, and E. K. Chan, “Internet-based SCADA Display System”, IEEE Computer Applications in Power, Vol. 15, No. 1, January 2002, pp. 14-19. [40]N. Swamy, O. Kuljaca, and F. L. Lewis, “ Internet-Based Educational Control Systems Lab Using NetMeeting”, IEEE Transactions on Education, Vol. 45, No. 2, May 2002, pp. 145-151. [41]F. J. Monaco and A. Gonzaga, “Remote Device Command and Resource Sharing over the Internet: A New Approach Based on a Distributed Layered Architecture”, IEEE Transactions on Computers, Vol. 51, No. 7, July 2002, pp. 787-792. [42]K. K. Tan and C. Y. Soh, “Internet Home Control System Using Bluetooth over WAP”, Engineering Science and Education Journal, Vol. 11, No. 4, August 2002, pp. 126-132. [43]K. P. Wong and K. Lee, “Visualizing Wavelet Transformed Traveling Waves on Power Transmission Line Using JAVA”, International Conference on Advances in Power System Control, Operation and Management, Singapore, December 2000, pp. 349 —353. [44]L. K. John, R. Radhakrishnan, A. Sivasubramaniam, and N. Vijaykrishnan, ”Architectural Issues in Java Runtime Systems”, Proceedings of The Sixth International Symposium on High-Performance Computer Architecture, Toulouse, France, January 2000, pp. 387-398. [45]L. Carro, S. A. Ito, and R. P. Jacobi, “System Design Based on Single Language and Single-chip Java ASIP Microcontroller”, Proceedings of Design, Automation, and Test in Europe Conference and Exhibition, Paris, France, March 2000, pp.703-707. [46]C. Bohoris, H. Cruickshank, and G. Pavlou, “Using Mobile Agents for Network Performance Management”, Proceedings of The Symposium on Network Operations and Management, Honolulu, Hawaii, USA, April 2000, pp. 637-652. [47]O. Festor, E. Nataf, and R. State, “A Java Based Implementation of A Network Level Information Model for The ATM/Frame Relay Interconnection”, Proceedings of The Symposium on Network Operations and Management, Honolulu, Hawaii, USA, April 2000, pp. 965-966. [48]T. Saydam and S. Yucel, “Connection Service and Management Using Mobile Agents”, Proceedings of The Symposium on Network Operations and Management, Honolulu, Hawaii, USA, April 2000, pp. 937-938. [49]G. E. Becker, R. Rudrapatna, and S. Sowlay, K. N. Wong, J. R. Wu, “Integrated Network and Element Management System for the 3rd Generation CDMA2000 Wireless Network”, Proceedings of The Symposium on Network Operations and Management, Honolulu, Hawaii, USA, April 2000, pp. 953-954. [50]J. Forslow, Ku Honsoon, and J. G. Park, “Web-based Configuration Management Architecture for Router Networks”, Proceedings of The Symposium on Network Operations and Management, Honolulu, Hawaii, USA, April 2000, pp. 173-186. [51]Wiscore Company, “Net-Start!User’s Guide”, Version 1.2, April 2002.
|