Sciweavers

494 search results - page 87 / 99
» An implementation and evaluation of a mobile hotspot
Sort
View
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
14 years 14 days ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
TOOLS
2000
IEEE
13 years 12 months ago
Pickling Threads State in the Java System
Today, distributed object-based computing is closely linked with Java. The Java virtual machine is ported to most current operating systems and provides many services which help d...
Sara Bouchenak, Daniel Hagimont
SRDS
1999
IEEE
13 years 11 months ago
An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging
Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures....
Kuo-Feng Ssu, Bin Yao, W. Kent Fuchs
GCC
2006
Springer
13 years 11 months ago
Redar: A Remote Desktop Architecture for the Distributed Virtual Personal Computing
Some popular computing technologies, such as ubiquitous computing, grid computing and thin-client computing, bring people to a much more distributed and pervasive computing enviro...
Yuedong Zhang, Zhenhua Song, Dingju Zhu, Zhuan Che...
ATAL
2006
Springer
13 years 9 months ago
ReAgents: behavior-based remote agents and their performance
We present a performance analysis of an agent-based middleware system we have developed based on "reAgents," remotely executing agents that enhance the performance of cl...
Eugene Hung, Joseph Pasquale