Sciweavers

1519 search results - page 52 / 304
» Authentication for Mobile Agents
Sort
View
AISS
2010
113views more  AISS 2010»
14 years 9 months ago
The Object Replication Method for the Efficient Migration of Agent
The migration method of a mobile agent affects the entire performance of the distributed system. Most of the existing migration methods have the slow-witted structures due to the ...
Yonsik Lee, Kwangwoo Nam
COOPIS
2002
IEEE
15 years 4 months ago
View Propagation and Inconsistency Detection for Cooperative Mobile Agents
Mobile agents are autonomous programs that migrate from one machine to another within a network on behalf of a client, thus, they are ideal for mobile computing environments since ...
Susan Weissman Lauzac, Panos K. Chrysanthis
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 6 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
WWW
2001
ACM
16 years 15 days ago
iMobile: An Agent-Based Platform for Mobile Services
iMobile is a platform that addresses the research issues in building mobile services. iMobile acts as a message gateway that allows mobile devices using various protocols on diffe...
Herman Chung-Hwa Rao, Yih-Farn Chen, Di-Fa Chang, ...
ICMI
2009
Springer
132views Biometrics» more  ICMI 2009»
15 years 6 months ago
Activity-aware ECG-based patient authentication for remote health monitoring
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...