Sciweavers

2243 search results - page 409 / 449
» Contracts for Mobile Processes
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 1 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
OPODIS
2004
15 years 1 months ago
Searching for a Black Hole in Tree Networks
A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the t...
Jurek Czyzowicz, Dariusz R. Kowalski, Euripides Ma...
ISCAPDCS
2003
15 years 1 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
WIS
2004
15 years 1 months ago
Pruning Update Log Files in Intermittently Connected Databases
Modern databases allow mobile clients that subscribe to replicated data, to process the replica without requiring continuous connectivity, and to receive the updates while connecte...
Liton Chakraborty, Ajit Singh, Kshirasagar Naik
NIPS
2003
15 years 1 months ago
Distributed Optimization in Adaptive Networks
We develop a protocol for optimizing dynamic behavior of a network of simple electronic components, such as a sensor network, an ad hoc network of mobile devices, or a network of ...
Ciamac Cyrus Moallemi, Benjamin Van Roy