Sciweavers

1631 search results - page 87 / 327
» Mobility Management
Sort
View
91
Voted
MDM
2005
Springer
147views Communications» more  MDM 2005»
15 years 6 months ago
Demo: mobile database administrator-MDBA
Increasingly advances in mobile computing are allowing development of the applications for ubiquitous computing environment. Ubiquitous computing represents the concepts of comput...
Fernando Siqueira, Angelo Brayner
112
Voted
ICWN
2009
14 years 10 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...
ACSAC
2002
IEEE
15 years 5 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok
INFOSCALE
2009
ACM
15 years 5 months ago
CAWA: Continuous Approximate Where-About Queries
With the current proliferation of wireless networks and mobile device technologies, the management of moving object databases to facilitate queries over these domains has been exte...
Alexander J. Aved, Kien A. Hua, Antoniya Petkova
116
Voted
MOBICOM
2004
ACM
15 years 6 months ago
Using code collection to support large applications on mobile devices
The progress of mobile device technology unfolds a new spectrum of applications that challenges conventional infrastructure models. Most of these devices are perceived by their us...
Lucian Popa 0002, Irina Athanasiu, Costin Raiciu, ...