Sciweavers

501 search results - page 67 / 101
» Access control and key management for mobile agents
Sort
View

Presentation
445views
15 years 6 months ago
Telecommunications Networks
The class lectures for this class are broadcast live on the internet. Video recordings of all classes are available on-line. The presrntation cover the following topics: A Review...
Raj Jain
CJ
2002
122views more  CJ 2002»
13 years 8 months ago
Java for On-line Distributed Monitoring of Heterogeneous Systems and Services
monitoring indicators at different levels of abstraction. At the application level, it instruments the Java Virtual Machine (JVM) to notify several different types of events trigge...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
DSN
2007
IEEE
14 years 3 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
SIGMOD
1994
ACM
175views Database» more  SIGMOD 1994»
14 years 27 days ago
Sleepers and Workaholics: Caching Strategies in Mobile Environments
In the mobile wireless computing environment of the future, a large number of users, equipped with low-powered palmtop machines, will query databases over wireless communication ch...
Daniel Barbará, Tomasz Imielinski
ETFA
2006
IEEE
14 years 2 months ago
Towards a File System Interface for Mobile Resources in Networked Embedded Systems
— Networks for real-time embedded systems are a key emerging technology for current and future systems. Such networks need to enable reliable communication without requiring sign...
Neil C. Audsley, R. Gao, Ameet Patil