Sciweavers

5446 search results - page 889 / 1090
» Mobile computing
Sort
View
MOBIHOC
2007
ACM
16 years 3 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
SOSP
2003
ACM
16 years 8 days ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
223
Voted
GIS
2003
ACM
16 years 4 months ago
Indexing of network constrained moving objects
With the proliferation of mobile computing, the ability to index efficiently the movements of mobile objects becomes important. Objects are typically seen as moving in two-dimensi...
Dieter Pfoser, Christian S. Jensen
AINA
2008
IEEE
15 years 5 months ago
An Open Source Platform for the Integration of Distributed Services
Service-orientation is not only a means for systems integration, but also an architecture paradigm for building systems. Flexibility, adaptability and interoperability are some of...
Félix Cuadrado, Juan C. Dueñas, Jos&...
CVPR
1998
IEEE
16 years 5 months ago
Stereo and Color Analysis for Dynamic Obstacle Avoidance
We develop a vision system for highly mobile autonomous agents that is capable of dynamic obstacle avoidance. We demonstrate the robust performance of the system in artificial ani...
Tamer F. Rabie, Demetri Terzopoulos