Sciweavers

1748 search results - page 262 / 350
» Security Models for Heterogeneous Networking
Sort
View
116
Voted
ICDCIT
2005
Springer
15 years 9 months ago
Off-Line Micro-payment System for Content Sharing in P2P Networks
— Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-asyou-use services for a wide variety of web-based applications. We proposed a n...
Xiaoling Dai, John C. Grundy
MOBICOM
2009
ACM
15 years 10 months ago
Data fusion improves the coverage of wireless sensor networks
Wireless sensor networks (WSNs) have been increasingly available for critical applications such as security surveillance and environmental monitoring. An important performance mea...
Guoliang Xing, Rui Tan, Benyuan Liu, Jianping Wang...
145
Voted
OTM
2005
Springer
15 years 9 months ago
Empirical Evaluation of Dynamic Local Adaptation for Distributed Mobile Applications
Distributed mobile applications operate on devices with diverse capabilities, in heterogeneous environments, where parameters such as processor, memory and network utilisation, are...
Pablo Rossi, Caspar Ryan
NOSSDAV
2004
Springer
15 years 8 months ago
Considering altruism in peer-to-peer internet streaming broadcast
In peer-to-peer overlay for video broadcast, peers contribute a portion of the bandwidth to the overlay in return for the service. In the presence of network heterogeneity, it is ...
Yang-Hua Chu, Hui Zhang
155
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Cross-Layer Rate Allocation for Multimedia Applications in Pervasive Computing Environment
Abstract— An important issue for supporting multimedia applications in multiple heterogeneous networks, a typical pervasive computing environment, is how to optimize the rate all...
Liang Zhou, Benoit Geller, Anne Wei, Baoyu Zheng, ...