Abstract. Information security is a pressing challenge for mobile code technologies. In order to claim end-to-end security of mobile code, it is necessary to establish that the cod...
Abstract. The Internet is built around the assumption of contemporaneous end-to-end connectivity. This is at odds with what typically happens in mobile networking, where mobile dev...
Pan Hui, Augustin Chaintreau, Richard Gass, James ...
Abstract. We analyze the convergence properties of our force based genetic algorithm(fga) as a decentralized topology control mechanism distributed among software agents. fga guide...
Cem Safak Sahin, Stephen Gundry, Elkin Urrea, M. &...
Abstract--In a wireless network, with the aid of rate adaptation, multiuser diversity can be exploited by allowing the mobile user with the best channel to use the channel. However...
—Real mobile robots should be able to build an abstract representation of the physical environment, in order to navigate and to work in such environment. We present a method for ...