Topic
Internet appliance
About: Internet appliance is a research topic. Over the lifetime, 1974 publications have been published within this topic receiving 43571 citations.
Papers published on a yearly basis
Papers
More filters
••
03 Sep 2003TL;DR: The Mobile Internet represents both a dramatic step forward and a significant step backward, from an information access standpoint, while it offers users greater access to valuable information and services ”on the move”, mobile handsets are hardly the ideal access device in terms of their screen-size and input capabilities.
Abstract: For many users the Mobile Internet means accessing information services through their mobile handsets – accessing mobile portals via WAP phones, for example In this context, the Mobile Internet represents both a dramatic step forward and a significant step backward, from an information access standpoint While it offers users greater access to valuable information and services ”on the move”, mobile handsets are hardly the ideal access device in terms of their screen-size and input capabilities As a result, mobile portal users are often frustrated by how difficult it is to quickly access the right information at the right time
6 citations
•
6 citations
•
20 Jun 2005
TL;DR: This book presents a meta-analysis of the determinants of infectious disease in eight operation rooms and its effects on the immune systems of eight patients and three of them were women.
Abstract: .............................................................................................................................. ii Acknowledgements............................................................................................................ iv List of Tables .................................................................................................................... vii List of Figures .................................................................................................................... ix Chapter
6 citations
01 Sep 2001
TL;DR: Where charging is currently implemented in the Internet, and the requirements for the necessary infrastructure to charge for Internet services and applications, now and into the future are discussed.
Abstract: The Internet is evolving into a ubiquitous platform for the delivery of services and content. This evolution brings with it a sea of change, as it rapidly becomes the chosen medium for commercial published material and communication. The evolution of Internet services, both mobile and fixed, presents the industry and academia with many research and engineering challenges. Among these the challenge of charging and billing for Internet services stands out. Also where the charging and billing should belong both commercially and physically within the public and private networks is an important area for research. This paper discusses where charging is currently implemented in the Internet, and the requirements for the necessary infrastructure to charge for Internet services and applications, now and into the future. The focus of this research is on the technical challenges of generation, collection and processing of the charging and billing data within the network. To support this research an experimental charging platform is presented that is currently under development.
6 citations
••
26 Apr 2004TL;DR: This position paper explores privacy issues created by mobile and wireless Internet access and is interested in data that can be collected from packet headers and signaling messages and exploited to control the user’s access to communications resources and online services.
Abstract: This position paper explores privacy issues created by mobile and wireless Internet access We consider the information about the user’s identity, location, and the serviced accessed that is necessarily or unnecessarily revealed observers, including the access network, intermediaries within the Internet, and the peer endpoints In particular, we are interested in data that can be collected from packet headers and signaling messages and exploited to control the user’s access to communications resources and online services We also suggest some solutions to reduce the amount of information that is leaked
6 citations