Sciweavers

3810 search results - page 170 / 762
» Using mobile agents for network performance management
Sort
View
SUTC
2006
IEEE
15 years 9 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
PERCOM
2005
ACM
16 years 3 months ago
A Location Model for Pervasive Computing Environments
This paper presents a world model for location-aware and user-aware services in ubiquitous computing environments. It can be dynamically organized like a tree based on geographica...
Ichiro Satoh
WIMOB
2008
IEEE
15 years 10 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...
TRIDENTCOM
2010
IEEE
15 years 1 months ago
COMCON: Use Cases for Virtual Future Networks
Abstract-- It is expected from a Future Internet that a multitude of networks will coexist and complement each other. Such environment allows to run specialized networks possibly p...
Daniel Schlosser, Marco Hoffmann, Tobias Hoß...
PERCOM
2010
ACM
14 years 10 months ago
Using Wi-Fi to save energy via P2P remote execution
Abstract-- Mobile devices are becoming increasingly powerful with regards to processing speed, networking capabilities, storage capacity etc. While these improvements open up new p...
Mads Darø Kristensen, Niels Olof Bouvin