Sciweavers

875 search results - page 139 / 175
» Requirements for Context-Dependent Mobile Access to Informat...
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
SyncScan: practical fast handoff for 802.11 infrastructure networks
Abstract— Wireless access networks scale by replicating base stations geographically and then allowing mobile clients to seamlessly “hand off” from one station to the next as...
Ishwar Ramani, Stefan Savage
EUROMICRO
1997
IEEE
15 years 1 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
SIGOPS
2008
156views more  SIGOPS 2008»
14 years 9 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 1 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
CF
2004
ACM
15 years 3 months ago
Modeling service-based multimedia content adaptation in pervasive computing
Pervasive computing applications allow users to access information from anywhere while traveling and using variety of devices. Heterogeneity and limitation of resources involved i...
Girma Berhe, Lionel Brunie, Jean-Marc Pierson