Sciweavers

69 search results - page 12 / 14
» Towards Optimized Data Fetching for Service Discovery
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 6 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 7 months ago
UNIT: User-centric Transaction Management in Web-Database Systems
Web-database systems are nowadays an integral part of everybody's life, with applications ranging from monitoring/trading stock portfolios, to personalized blog aggregation a...
Alexandros Labrinidis, Daniel Mossé, Huimin...
MIDDLEWARE
2009
Springer
14 years 18 days ago
Rhizoma: A Runtime for Self-deploying, Self-managing Overlays
Abstract. The trend towards cloud and utility computing infrastructures raises challenges not only for application development, but also for management: diverse resources, changing...
Qin Yin, Adrian Schüpbach, Justin Cappos, And...
ICNP
2007
IEEE
14 years 10 days ago
Multicast Algorithms for Multi-Channel Wireless Mesh Networks
— Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorit...
Guo-Kai Zeng, Bo Wang 0001, Yong Ding, Li Xiao, Ma...
SAC
2000
ACM
13 years 10 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi