Sciweavers

2404 search results - page 214 / 481
» Middleware for pervasive computing
Sort
View
PERCOM
2006
ACM
16 years 3 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
DEBS
2003
ACM
15 years 9 months ago
Introducing reliability in content-based publish-subscribe through epidemic algorithms
Distributed content-based publish-subscribe middleware provides the necessary decoupling, flexibility, expressiveness, and scalability required by modern distributed applications...
Paolo Costa, Matteo Migliavacca, Gian Pietro Picco...
HOTDEP
2008
157views Hardware» more  HOTDEP 2008»
15 years 6 months ago
Byzantium: Byzantine-Fault-Tolerant Database Replication Providing Snapshot Isolation
Database systems are a key component behind many of today's computer systems. As a consequence, it is crucial that database systems provide correct and continuous service des...
Nuno M. Preguiça, Rodrigo Rodrigues, Crist&...
IJACI
2010
164views more  IJACI 2010»
15 years 2 months ago
Exploring Multi-Path Communication in Hybrid Mobile Ad Hoc Networks
Abstract. Ambient computing requires the integration of multiple mobile heterogeneous networks. Multi-path communication, in such scenarios, can provide reliability and privacy ben...
Roberto Speicys Cardoso, Mauro Caporuscio
EAGC
2004
Springer
15 years 9 months ago
Implementations of a Service-Oriented Architecture on Top of Jini, JXTA and OGSI
Abstract. This paper presents the design of an implementation-independent, Service-Oriented Architecture (SOA), which is the main basis of the ICENI Grid middleware. Three implemen...
Nathalie Furmento, Jeffrey Hau, William Lee, Steve...