Sciweavers

1030 search results - page 33 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
AUTOMATICA
2010
113views more  AUTOMATICA 2010»
14 years 9 months ago
Decentralized estimation and control of graph connectivity for mobile sensor networks
The ability of a robot team to reconfigure itself is useful in many applications: for metamorphic robots to change shape, for swarm motion towards a goal, for biological systems to...
Peng Yang, Randy A. Freeman, G. J. Gordon, Kevin M...
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
15 years 1 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
ICPADS
2002
IEEE
15 years 2 months ago
A Mobile Cache Consistency Protocol Using Shareable Read/Write Time Locks
Object caching is often used to improve the performance of mobile applications, but the gain is often lessened by the additional load of maintaining consistency between an origina...
Abhinav Vora, Zahir Tari, Peter Bertók, Kwo...
SRDS
2000
IEEE
15 years 2 months ago
Performance of Mobile, Single-Object, Replication Protocols
This paper discusses the implementation and performance of bounded voting: a new object replication protocol designed for use in mobile and weakly-connected environments. We show ...
Ugur Çetintemel, Peter J. Keleher
DCOSS
2010
Springer
15 years 1 months ago
Data Spider: A Resilient Mobile Basestation Protocol for Efficient Data Collection in Wireless Sensor Networks
Traditional deployments of wireless sensor networks (WSNs) rely on static basestations to collect data. For applications with highly spatio-temporal and dynamic data generation, su...
Onur Soysal, Murat Demirbas