Sciweavers

1805 search results - page 175 / 361
» Understanding Code Mobility
Sort
View
108
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
112
Voted
AIED
2005
Springer
15 years 8 months ago
Technology at work to mediate collaborative scientific enquiry in the field
This paper describes and contrasts findings from two related projects where groups of science pupils investigated local air pollution using a collection of mobile sensors and devic...
Hilary Smith, Rosemary Luckin, Geraldine Fitzpatri...
102
Voted
ACSAC
2006
IEEE
15 years 8 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna
127
Voted
ICDCSW
2003
IEEE
15 years 8 months ago
Toward a Security Architecture for Smart Messages: Challenges, Solutions, and Open Issues
Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs ar...
Gang Xu, Cristian Borcea, Liviu Iftode
130
Voted
INFOCOM
2000
IEEE
15 years 7 months ago
Management of Advanced Services in H.323 Internet Protocol Telephony
The Intelligent Network (IN) represents the world wide accepted basis for uniform provisioning of advanced telecom services. On the other hand IP based communication is fast becomi...
Bernard Pagurek, Jinrong Tang, Tony White, Roch H....