Sciweavers

1338 search results - page 195 / 268
» A Secure Communications Infrastructure for High-Performance ...
Sort
View
IJWIN
2006
119views more  IJWIN 2006»
13 years 9 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
WMASH
2003
ACM
14 years 2 months ago
Wireless hotspots: current challenges and future directions
In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users an...
Anand Balachandran, Geoffrey M. Voelker, Paramvir ...
SOSP
2005
ACM
14 years 5 months ago
THINC: a virtual display architecture for thin-client computing
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership of personal computers have created a growing market...
Ricardo A. Baratto, Leonard N. Kim, Jason Nieh
MOBIHOC
2007
ACM
14 years 8 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
ICSOC
2005
Springer
14 years 2 months ago
Handling Faults in Decentralized Orchestration of Composite Web Services
Abstract. Composite web services can be orchestrated in a decentralized manner by breaking down the original service specification into a set of partitions and executing them on a...
Girish Chafle, Sunil Chandra, Pankaj Kankar, Vijay...