Sciweavers

1030 search results - page 38 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
100
Voted
DCOSS
2008
Springer
14 years 11 months ago
Efficient Node Discovery in Mobile Wireless Sensor Networks
Energy is one of the most crucial aspects in real deployments of mobile sensor networks. As a result of scarce resources, the duration of most real deployments can be limited to ju...
Vladimir Dyo, Cecilia Mascolo
OPODIS
2003
14 years 11 months ago
A Peer-to-Peer Approach to Enhance Middleware Connectivity
One of the problems of middleware for shared state is that they are designed, explicitly or implicitly, for symmetric networks. However, since the Internet is not symmetric, end-to...
Erik Klintskog, Valentin Mesaros, Zacharias El Ban...
IFM
2005
Springer
15 years 3 months ago
Model-Based Prototyping of an Interoperability Protocol for Mobile Ad-Hoc Networks
Abstract. We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for t...
Lars Michael Kristensen, Michael Westergaard, Pede...
JUCS
2010
124views more  JUCS 2010»
14 years 8 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
CSCW
2000
ACM
15 years 2 months ago
Developing adaptive groupware applications using a mobile component framework
A need exists to develop groupware systems that adapt to available resources and support user mobility. This paper presents DACIA, a system that provides mechanisms for building s...
Radu Litiu, Atul Prakash