Sciweavers

1950 search results - page 29 / 390
» Two Abstractions for Distributed Systems of Mobile Nodes
Sort
View
CN
2007
124views more  CN 2007»
15 years 4 months ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
SEMWEB
2010
Springer
15 years 2 months ago
Using Reformulation Trees to Optimize Queries over Distributed Heterogeneous Sources
Abstract. In order to effectively and quickly answer queries in environments with distributed RDF/OWL, we present a query optimization algorithm to identify the potentially relevan...
Yingjie Li, Jeff Heflin
ICDCS
2003
IEEE
15 years 10 months ago
Compiler Scheduling of Mobile Agents for Minimizing Overheads
Mobile code carried by a mobile agent can automatically travel to several data sources in order to complete a designated program. Traditionally, most mobile agent systems [7][8][1...
Xiaotong Zhuang, Santosh Pande
JCP
2007
120views more  JCP 2007»
15 years 4 months ago
Mobile Processes: Enhancing Cooperation in Distributed Mobile Environments
— Currently, context awareness is one of the main trends in distributed mobile computing environments. Against this background, the demand for more complex – and additionally l...
Christian P. Kunze, Sonja Zaplata, Winfried Lamers...
ASIACRYPT
2000
Springer
15 years 9 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas