Sciweavers

644 search results - page 48 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
ICCS
2005
Springer
14 years 2 months ago
Cost Model and Adaptive Scheme for Publish/Subscribe Systems on Mobile Grid Environments
Abstract. Publish/subscribe model is appropriate in many push based data dissemination applications. This paper presents cost model for publish/subscribe systems, analyze its perfo...
Sangyoon Oh, Sangmi Lee Pallickara, Sung Hoon Ko, ...

Publication
211views
15 years 6 months ago
Congestion Avoidance in Computer Networks with A Connecitonless Network Layer: Part IV: A Selective Binary Feedback Scheme for G
With increasingly widespread use of computer networks, and the use of varied technology for the interconnection of computers, congestion is a significant problem. In this report, w...
K. Ramakrishnan and R. Jain,
WISTP
2010
Springer
14 years 3 months ago
MoteAODV - An AODV Implementation for TinyOS 2.0
Reliable, inexpensive, on-the-fly networks can be established using mobile ad-hoc network (MANET) technology. Such networks can be used in a wide variety of scenarios ranging from...
Werner Backes, Jared Cordasco
PERCOM
2006
ACM
14 years 8 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...
WIMOB
2007
IEEE
14 years 2 months ago
A Fault Resilient Routing Protocol for Mobile Ad-Hoc Networks
— In a Mobile Ad hoc NETwork (MANET), mobile devices cooperate to forward packets for each other without the assistance of dedicated routing infrastructures. Due to its networkin...
Sirisha Medidi, Jiong Wang