Sciweavers

163 search results - page 5 / 33
» An Overview of Portable Distributed Techniques
Sort
View
UIC
2009
Springer
14 years 2 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
ISPAN
2002
IEEE
14 years 16 days ago
An Overview of Data Replication on the Internet
The proliferation of the Internet is leading to high expectation on the fast turnaround time. Clients abandoning their connections due to excessive downloading delays translates d...
Thanasis Loukopoulos, Dimitris Papadias, Ishfaq Ah...
IPPS
2006
IEEE
14 years 1 months ago
An overview of data aggregation architecture for real-time tracking with sensor networks
Abstract— Since sensor nodes normally have limited resources in terms of energy, bandwidth and computation capability, efficiency is a key design goal in sensor network research...
Tian He, Lin Gu, Liqian Luo, Ting Yan, John A. Sta...
MDM
2010
Springer
188views Communications» more  MDM 2010»
13 years 6 months ago
A Distributed Technique for Dynamic Operator Placement in Wireless Sensor Networks
—We present an optimal distributed algorithm to adapt the placement of a single operator in high communication cost networks, such as a wireless sensor network. Our parameterfree...
Georgios Chatzimilioudis, Nikos Mamoulis, Dimitrio...
SAC
2008
ACM
13 years 7 months ago
Conflict-aware load-balancing techniques for database replication
Middleware-based database replication protocols require few or no changes in the database engine. As a consequence, they are more portable and flexible than kernel-based protocols...
Vaide Zuikeviciute, Fernando Pedone