Sciweavers

644 search results - page 100 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
IPPS
2007
IEEE
15 years 6 months ago
Proxy-based Grid Information Dissemination
Resource scheduling in large-scale, volatile desktop grids is challenging because resource state is both dynamic and eclectic. Matching available resources with requests is not al...
Deger Cenk Erdil, Michael J. Lewis, Nael B. Abu-Gh...
ADHOCNOW
2006
Springer
15 years 5 months ago
Circularity-Based Medium Access Control in Mobile Ad Hoc Networks
Abstract. The RTS/CTS access scheme, designed to reduce the number of collisions in a IEEE 802.11 network, is known to exhibit problems due to masked nodes, the imbalance between t...
Mohammad Z. Ahmad, Damla Turgut, R. Bhakthavathsal...
NEW2AN
2007
Springer
15 years 6 months ago
tinyLUNAR: One-Byte Multihop Communications Through Hybrid Routing in Wireless Sensor Networks
Abstract. In this paper we consider a problem of implementing a hybrid routing protocol for wireless sensor networks, which natively supports data-centric, geographic-based and add...
Evgeny Osipov
WMCSA
2000
IEEE
15 years 4 months ago
A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices
The Post-PC revolution is bringing information access to a wide-range of devices beyond the desktop, such as public kiosks, and mobile devices like cellular telephones, PDAs, and ...
Steven J. Ross, Jason L. Hill, Michael Y. Chen, An...
NOSSDAV
2004
Springer
15 years 5 months ago
Low latency and cheat-proof event ordering for peer-to-peer games
We are developing a distributed architecture for massivelymultiplayer games. In this paper, we focus on designing a low-latency event ordering protocol, called NEO, for this archi...
Chris GauthierDickey, Daniel Zappala, Virginia Mar...