Sciweavers

644 search results - page 45 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
WOA
2010
13 years 6 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
ICC
2007
IEEE
166views Communications» more  ICC 2007»
14 years 2 months ago
Dynamic Optimization of Secure Mobile Sensor Networks: A Genetic Algorithm
— We propose a reduced-complexity genetic algorithm for secure and dynamic deployment of resource constrained multi-hop mobile sensor networks. Mobility and security are relative...
Rahul Khanna, Huaping Liu, Hsiao-Hwa Chen
CONEXT
2008
ACM
13 years 10 months ago
Adapting TFRC to mobile networks with frequent disconnections
In the context of mobile and pervasive networking, it is not uncommon to experience frequent loss of connectivity. Congestion control algorithms usually mistake resulting packets ...
Olivier Mehani, Roksana Boreli
HOTNETS
2010
13 years 3 months ago
"Extra-sensory perception" for wireless networks
Commodity smartphones and tablet devices now come equipped with a variety of sensors, including accelerometers, multiple positioning sensors, magnetic compasses, and inertial sens...
Lenin Ravindranath, Calvin C. Newport, Hari Balakr...
ISORC
2005
IEEE
14 years 2 months ago
Heterogeneous Adaptive Component-Based Applications with Adaptive.Net
Adaptation to changing environmental conditions is a major challenge for most distributed applications. The service-oriented programming paradigm leads to an increasing number of ...
Andreas Rasche, Marco Puhlmann, Andreas Polze