Sciweavers

1610 search results - page 150 / 322
» A Transaction Model for Mobile Computing
Sort
View
107
Voted
CN
2004
94views more  CN 2004»
15 years 2 months ago
A performance study of power-saving polices for Wi-Fi hotspots
Wi-Fi hotspots are one of the most promising scenarios for mobile computing. In this scenario, a very limiting factor is the shortage of energetic resources in mobile devices. Leg...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
138
Voted
ICDCSW
2007
IEEE
15 years 9 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
135
Voted
BIRTHDAY
2004
Springer
15 years 8 months ago
Communicating Mobile Processes
This paper presents a new model for mobile processes in occam-π. A process, embedded anywhere in a dynamically evolving network, may suspend itself mid-execution, be safely discon...
Peter H. Welch, Fred R. M. Barnes
143
Voted
HPCC
2010
Springer
15 years 3 months ago
Scheduling and Queue Management for Multi-class Traffic in Access Router of Mobility Protocol
The traffic characteristics in recent years have changed considerably having more video and audio traffic with critical real-time constraints. This situation is compounded by the i...
Md. Shohrab Hossain, Mohammed Atiquzzaman, William...
167
Voted
WOA
2010
15 years 14 days ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro