Sciweavers

713 search results - page 51 / 143
» Organization and Mobility in Mobile Agent Computing
Sort
View
INDOCRYPT
2001
Springer
15 years 4 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
SAC
2004
ACM
15 years 5 months ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
COMPSAC
1996
IEEE
15 years 4 months ago
Handling Multimedia Data for Mobile Computers
Mobile clients have unusual needs for sending and receiving multimedia data. The traditional client/server paradigm does not take into account variable network conditions; thus tr...
Charles E. Perkins
PE
2002
Springer
111views Optimization» more  PE 2002»
14 years 11 months ago
Forwarders vs. centralized server: an evaluation of two approaches for locating mobile agents
This paper evaluates and compares the performance of two approaches for locating an agent in a mobile agent environment. The first approach dynamically creates a chain of forwarde...
Sara Alouf, Fabrice Huet, Philippe Nain
CORR
2007
Springer
128views Education» more  CORR 2007»
14 years 11 months ago
A Mobile Computing Architecture for Numerical Simulation
The domain of numerical simulation is a place where the parallelization of numerical code is common. The definition of a numerical context means the configuration of resources suc...
Cyril Dumont, Fabrice Mourlin