Sciweavers

575 search results - page 83 / 115
» Robust Distributed Name Service
Sort
View
ESORICS
2004
Springer
15 years 3 months ago
Hindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynami...
Claude Castelluccia, Gabriel Montenegro, Julien La...
GISCIENCE
2004
Springer
110views GIS» more  GISCIENCE 2004»
15 years 3 months ago
Information Dissemination in Mobile Ad-Hoc Geosensor Networks
This paper addresses the issue of how to disseminate relevant information to mobile agents within a geosensor network. Conventional mobile and location-aware systems are founded on...
Silvia Nittel, Matt Duckham, Lars Kulik
INFOCOM
2002
IEEE
15 years 2 months ago
Inference and Labeling of Metric-Induced Network Topologies
—The development and deployment of distributed network-aware applications and services require the ability to compile and maintain a model of the underlying network resources wit...
Azer Bestavros, John W. Byers, Khaled Harfoush
NOMS
2000
IEEE
15 years 2 months ago
Failure semantics of mobile agent systems involved in network fault management
Recently mobile agent technology has been recognised as a potential tool for realising distributed network fault management. The autonomy and mobility of such agents can help ensu...
Otto Wittner, Bjarne E. Helvik, C. J. E. Holper
ERCIMDL
2000
Springer
185views Education» more  ERCIMDL 2000»
15 years 1 months ago
CORC: Helping Libraries Take a Leading Role in the Digital Age
The OCLC Cooperative Online Resource Catalog is helping librarians thrive in the digital age. Librarians are using CORC to select, describe, maintain, and provide guided access to ...
Kay Covert