Sciweavers

501 search results - page 62 / 101
» Access control and key management for mobile agents
Sort
View
MOBIWAC
2009
ACM
14 years 3 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella
SAC
2002
ACM
13 years 8 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
GEOINFO
2003
13 years 10 months ago
The Architecture of a Mobile Emergency Plan Deployment System
This paper describes the implementation of a workflow management system to support mobile GIS workgroup applications and highlights the design of the workflow definition language t...
Fábio Meira de Oliveira Dias, Marcelo T&iac...
PPOPP
2003
ACM
14 years 2 months ago
Impala: a middleware system for managing autonomic, parallel sensor systems
Sensor networks are long-running computer systems with many sensing/compute nodes working to gather information about their environment, process and fuse that information, and in ...
Ting Liu, Margaret Martonosi
COMPLEX
2009
Springer
14 years 23 days ago
Using the Weighted Rich-Club Coefficient to Explore Traffic Organization in Mobility Networks
Abstract. The aim of a transportation system is to enable the movement of goods or persons between any two locations with the highest possible efficiency. This simple principle ins...
Jose J. Ramasco, Vittoria Colizza, Pietro Panzaras...