Sciweavers

3276 search results - page 539 / 656
» Data Management for Pervasive Computing
Sort
View
74
Voted
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 4 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
MOBIQUITOUS
2005
IEEE
15 years 4 months ago
MAIPAN - Middleware for Application Interconnection in Personal Area Networks
This paper proposes the Middleware for Application Interconnection in Personal Area Networks (MAIPAN), a middleware that provides a uniform computing environment for creating dyna...
Miklós Aurél Rónai, Kristof F...
70
Voted
NCA
2005
IEEE
15 years 4 months ago
Developing a Consistent Domain-Oriented Distributed Object Service
This paper presents a new algorithm for a reconfigurable distributed domain-oriented atomic object service, called DO-RAMBO, which stands for Domain-Oriented Reconfigurable Atom...
Chryssis Georgiou, Peter M. Musial, Alexander A. S...
95
Voted
DCOSS
2005
Springer
15 years 4 months ago
Macro-programming Wireless Sensor Networks Using Kairos
The literature on programming sensor networks has focused so far on g higher-level abstractions for expressing local node behavior. Kairos is a natural next step in sensor network ...
Ramakrishna Gummadi, Omprakash Gnawali, Ramesh Gov...
75
Voted
KIVS
2005
Springer
15 years 4 months ago
An Integrated Simulator for Inter-Domain Scenarios
Abstract. The simulation of large-scale inter-domain networks is useful for various aspects of network planning and management. It is also a challenge due to its scalability proble...
Matthias Scheidegger, Florian Baumgartner, Torsten...