Sciweavers

158 search results - page 28 / 32
» Ad Hoc Key Management Infrastructure
Sort
View
FGCS
2008
159views more  FGCS 2008»
13 years 10 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
JSS
2007
80views more  JSS 2007»
13 years 9 months ago
Feedback control-based dynamic resource management in distributed real-time systems
The resource management in distributed real-time systems becomes increasingly unpredictable with the proliferation of data-driven applications. Therefore, it is inefficient to all...
Tian He, John A. Stankovic, Michael Marley, Chenya...
SMARTNET
2000
13 years 11 months ago
MobiliTools: An OMG Standards-Based Toolbox for Agent Mobility and Interoperability
: One of the keys to success for applications of mobile and/or intelligent agents in large-scale open systems such as Internet is the ability of heterogeneous agents to cooperate a...
Bruno Dillenseger
ATAL
2004
Springer
14 years 3 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
MSWIM
2006
ACM
14 years 3 months ago
Establishing how many VoIP calls a wireless LAN can support without performance degradation
The use of Voice IP (VoIP) over wireless local area networks (WLAN) is a topic of great interest in the research arena. This paper attempts to answer the question: how many VoIP c...
Ángel Cuevas Rumín, Eur Ing Chris Gu...