Sciweavers

644 search results - page 107 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
CONCUR
1991
Springer
15 years 3 months ago
Real Space Process Algebra
We propose a process algebra obtained by adapting the process algebra with continuous relative timing from Baeten and Middelburg [Process Algebra with Timing, Springer, 2002, Chap....
Jos C. M. Baeten, Jan A. Bergstra

Presentation
956views
13 years 5 months ago
A Method for Distributed Computaion of Semi-Optimal Multicast Tree in MANET
In this paper, we propose a new method to construct a semi-optimal QoS-aware multicast tree on MANET using distributed computation of the tree based on Genetic Algorithm (GA). This...
ATC
2008
Springer
15 years 1 months ago
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server
Wireless networks and the voice over Internet protocol (VoIP) have recently been widely adapted. VoIP services over Ad-hoc network can be accomplished by middleware embedded in mob...
Lin-huang Chang, Chun-hui Sung, Shih-yi Chiu, Jiun...
WISE
2010
Springer
14 years 9 months ago
The Ubiquitous DBMS
Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigator...
Kyu-Young Whang