Sciweavers

5446 search results - page 973 / 1090
» Mobile computing
Sort
View
MOBICOM
2004
ACM
15 years 8 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
JPDC
2006
141views more  JPDC 2006»
15 years 2 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
IWSOS
2007
Springer
15 years 9 months ago
Dynamic Ontology Mapping for Interacting Autonomous Systems
Abstract. With the emergence of mobile and ubiquitous computing environments, there is a requirement to enable collaborative applications between these environments. As many of the...
Steven Heeps, Joe Sventek, Naranker Dulay, Alberto...
PLDI
1999
ACM
15 years 7 months ago
Enhanced Code Compression for Embedded RISC Processors
This paper explores compiler techniques for reducing the memory needed to load and run program executables. In embedded systems, where economic incentives to reduce both ram and r...
Keith D. Cooper, Nathaniel McIntosh
CCR
2006
90views more  CCR 2006»
15 years 2 months ago
CRAWDAD: a community resource for archiving wireless data at Dartmouth
Wireless network researchers are seriously starved for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, a Community R...
Jihwang Yeo, David Kotz, Tristan Henderson