Sciweavers

1805 search results - page 160 / 361
» Understanding Code Mobility
Sort
View
102
Voted
ASPLOS
1998
ACM
15 years 6 months ago
Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs
In order to execute a program on a remote computer, it must first be transferred over a network. This transmission incurs the overhead of network latency before execution can beg...
Chandra Krintz, Brad Calder, Han Bok Lee, Benjamin...
ATAL
2003
Springer
15 years 6 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
ICSE
2000
IEEE-ACM
15 years 6 months ago
Software engineering for mobility: a roadmap
The term distributed computing conjures the image of a fixed network structure whose nodes support the execution of processes that communicate with each other via messages traveli...
Gruia-Catalin Roman, Gian Pietro Picco, Amy L. Mur...
INFOCOM
2011
IEEE
14 years 6 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...
124
Voted
PERCOM
2006
ACM
16 years 2 months ago
A Programmable Service Architecture for Mobile Medical Care
This paper introduces MobiCare ? a novel service architecture that enables a wide range of health-related services for efficient and mobile patient care. These services include: (...
Rajiv Chakravorty