Sciweavers

3810 search results - page 227 / 762
» Using mobile agents for network performance management
Sort
View
WMCSA
2003
IEEE
15 years 10 months ago
Application Management Techniques for the Bifrost System
This paper describes the adaptive component migration facility in the Bifrost Location-Independent Computing System. We present a facility that allows mobile clients to selectivel...
Avneesh Bhatnagar, Evan Speight, Dan Crawl, Joseph...
AINA
2009
IEEE
15 years 10 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
SAC
2002
ACM
15 years 5 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
MOBIHOC
2002
ACM
16 years 5 months ago
Directional virtual carrier sensing for directional antennas in mobile ad hoc networks
This paper presents a new carrier sensing mechanism called DVCS (Directional Virtual Carrier Sensing) for wireless communication using directional antennas. DVCS does not require ...
Mineo Takai, Jay Martin, Rajive Bagrodia, Aifeng R...
MOBICOM
2010
ACM
15 years 5 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...