Sciweavers

1805 search results - page 113 / 361
» Understanding Code Mobility
Sort
View
PPPJ
2006
ACM
15 years 8 months ago
Enabling Java mobile computing on the IBM Jikes research virtual machine
Today’s complex applications must face the distribution of data and code among different network nodes. Java is a wide-spread language that allows developers to build complex so...
Giacomo Cabri, Letizia Leonardi, Raffaele Quitadam...
ICDCS
2011
IEEE
14 years 1 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang
GCC
2003
Springer
15 years 7 months ago
Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation
An instance-oriented security mechanism is proposed to deal with security threats in building a general-purpose mobile agent middleware in Grid environment. The proposed solution i...
Tianchi Ma, Shanping Li
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 2 months ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez
MOBILWARE
2010
ACM
15 years 5 days ago
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms
We propose a new elastic application model that enables the seamless and transparent use of cloud resources to augment the capability of resourceconstrained mobile devices. The sal...
Xinwen Zhang, Sangoh Jeong, Anugeetha Kunjithapath...