Sciweavers

313 search results - page 57 / 63
» Efficient Implementation of XML Security for Mobile Devices
Sort
View
CONEXT
2009
ACM
14 years 11 months ago
The age of impatience: optimal replication schemes for opportunistic networks
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...
Joshua Reich, Augustin Chaintreau
SIGUCCS
2005
ACM
15 years 3 months ago
Universal imaging: revolutionizing desktop support
Lehigh University has recently implemented a new PC deployment model which is built around the Universal Imaging Utility, a product of Big Bang, LLC. This model has allowed Lehigh...
Stephen G. Lewis, Sara K. Rodgers
CCGRID
2003
IEEE
15 years 3 months ago
Recovering Internet Symmetry in Distributed Computing
This paper describes two systems to recover the Internet connectivity impaired by private networks and firewalls. These devices cause asymmetry in the Internet, making peer-to-pee...
Se-Chang Son, Miron Livny
FPL
2006
Springer
120views Hardware» more  FPL 2006»
15 years 1 months ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
MASS
2010
248views Communications» more  MASS 2010»
14 years 7 months ago
Adaptive exploitation of cooperative relay for high performance communications in MIMO ad hoc networks
With the popularity of wireless devices and the increase of computing and storage resources, there are increasing interests in supporting mobile computing techniques. Particularly...
Shan Chu, Xin Wang