Sciweavers

1334 search results - page 245 / 267
» Application Characterization for Wireless Network Power Mana...
Sort
View
PERCOM
2006
ACM
15 years 11 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
PERCOM
2004
ACM
15 years 11 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 6 months ago
An End-to-End Technique to Estimate the Transmission Rate of an IEEE 802.11 WLAN
— The deployment of wireless LANs (WLANs) has been steadily increasing over the years and estimating the actual bit rate of a WLAN device is important for management and applicat...
Antonio Augusto de Aragão Rocha, Rosa Maria...
ICIW
2007
IEEE
15 years 6 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
ECHT
1994
15 years 3 months ago
An Interaction Engine for Rich Hypertexts
In semantically rich hypertexts it is attractive to enable presentation of a network of nodes and links at different levels action. It is also important that the user can interact...
Kasper Østerbye, Kurt Nørmark