Sciweavers

1610 search results - page 287 / 322
» A Transaction Model for Mobile Computing
Sort
View
DAC
2000
ACM
14 years 10 months ago
Power analysis of embedded operating systems
The increasing complexity and software content of embedded systems has led to the common use of sophisticated system software that helps applications use the underlying hardware r...
Robert P. Dick, Ganesh Lakshminarayana, Anand Ragh...
ICALP
2009
Springer
14 years 9 months ago
Rumor Spreading in Social Networks
Social networks are an interesting class of graphs likely to become of increasing importance in the future, not only theoretically, but also for its probable applications to ad hoc...
Flavio Chierichetti, Silvio Lattanzi, Alessandro P...
CCS
2009
ACM
14 years 3 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea
VTC
2006
IEEE
14 years 3 months ago
Performance Comparison of OFDM-TDMA and OFDMA with Cross-Layer Consideration
— Performance comparison of multiuser OFDM-TDMA and OFDMA systems by considering physical and link cross-layer behavior is conducted in this work. We provide a new framework for ...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
MSWIM
2005
ACM
14 years 2 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....