Sciweavers

5446 search results - page 362 / 1090
» Mobile computing
Sort
View
AINA
2008
IEEE
15 years 4 months ago
Updated Data Dissemination for Applications with Time Constraints in Mobile Ad Hoc Networks
In our previous work, we proposed few updated data dissemination methods to refresh old replicas efficiently in mobile ad hoc networks. These methods disseminate updated data item...
Takahiro Hara, Sanjay Kumar Madria
ACMSE
2004
ACM
15 years 9 months ago
A P2P intrusion detection system based on mobile agents
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Geetha Ramachandran, Delbert Hart
132
Voted
CONCUR
2001
Springer
15 years 8 months ago
Reasoning about Security in Mobile Ambients
The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems. The first part of th...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
ESCIENCE
2006
IEEE
15 years 8 months ago
Remote Control of Web 2.0-Enabled Laboratories from Mobile Devices
The design of WebLabs has traditionally been focused on the hardware rather than the software side. However, paying more importance to the software side can bring about important ...
Diego López de Ipiña, Javier Garc&ia...
GPC
2008
Springer
15 years 5 months ago
Write Once, Run Anywhere - A Survey of Mobile Runtime Environments
The hype surrounding Web 2.0 and technologies such as AJAX shows: The future of distributed application development lies in Rich Internet Applications (RIAs), which are based on h...
Sören Blom, Matthias Book, Volker Gruhn, Rusl...