Sciweavers

154 search results - page 4 / 31
» Authenticity in a Reliable Protocol for Mobile Computing
Sort
View
ICDCS
2002
IEEE
14 years 11 days ago
Design of Adaptive and Reliable Mobile Agent Communication Protocols
This paper presents a mailbox-based scheme for designing flexible and adaptive message delivery protocols in mobile agent (MA) systems. The scheme associates each mobile agent wit...
Jiannong Cao, Xinyu Feng, Jian Lü, Sajal K. D...
ACSC
2005
IEEE
14 years 1 months ago
SuperstringRep: Reputation-enhanced Service Discovery
1 Service discovery protocols are used in distributed systems to locate services for clients. The services that are located as well as the clients requesting service are commonly a...
Ryan Wishart, Ricky Robinson, Jadwiga Indulska
ICNP
1999
IEEE
13 years 11 months ago
A Logical Ring Reliable Multicast Protocol for Mobile Nodes
A protocol for the reliable multicast of data to mobile hosts is described. A logical ring is maintained between all the base stations that handle the multicast traffic of the sam...
Ioanis Nikolaidis, Janelle J. Harms
AINA
2010
IEEE
14 years 16 days ago
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks
—Conventional broadcasting protocols suffer from network congestion, frequent message losses and corruption of broadcast messages due to a vast number of duplicate packets transm...
Subrata Saha, Syed Rafiul Hussain, A. K. M. Ashiku...
BROADNETS
2005
IEEE
14 years 1 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou