Sciweavers

303 search results - page 14 / 61
» A Low-Latency Checkpointing Scheme for Mobile Computing Syst...
Sort
View
83
Voted
WAIM
2001
Springer
15 years 4 months ago
A Mixed Data Dissemination Strategy for Mobile Computing Systems
Abstract. Broadcasting is a very effective technique to disseminate information to a massive number of clients when the data size is small. However, if the data size is large, the...
Guohong Cao, Yiqiong Wu, Bo Li
97
Voted
IPPS
2007
IEEE
15 years 6 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
APNOMS
2006
Springer
15 years 3 months ago
A DNS Based New Route Optimization Scheme with Fast Neighbor Discovery in Mobile IPv6 Networks
In this paper, we propose a new route optimization scheme (EDNS-MIPv6) for MIPv6 using the enhanced Domain Name System (DNS) together with local mobility management scheme to reduc...
Byungjoo Park, Haniph A. Latchman
PDCAT
2005
Springer
15 years 5 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
DAC
2006
ACM
16 years 19 days ago
Systems for human-powered mobile computing
This article outlines several projects aimed at generating electrical energy by passively tapping a variety of human body sources and activities. After summarizing different energ...
Joseph A. Paradiso