Sciweavers

16 search results - page 1 / 4
» Decentralized Bootstrapping in Pervasive Applications
Sort
View
PERCOM
2007
ACM
14 years 5 months ago
Decentralized Bootstrapping in Pervasive Applications
Abstract— Deploying world-scale pervasive applications usually requires substantial investments in server infrastructure. A better option is to use P2P techniques, because it dis...
Mirko Knoll, Arno Wacker, Gregor Schiele, Torben W...
IWCMC
2010
ACM
14 years 26 days ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
PERCOM
2006
ACM
13 years 10 months ago
Bootstrapping Chord in Ad Hoc Networks: Not Going Anywhere for a While.
With the growing prevalence of wireless devices, infrastructure-less ad hoc networking is coming closer to reality. Research in this field has mainly been concerned with routing. ...
Curt Cramer, Thomas Fuhrmann
GPCE
2009
Springer
14 years 3 months ago
Classifying Java class transformations for pervasive virtualized access
The indirection of object accesses is a common theme for target domains as diverse as transparent distribution, persistence, and program instrumentation. Virtualizing accesses to ...
Phil McGachey, Antony L. Hosking, J. Eliot B. Moss
FI
2010
175views more  FI 2010»
13 years 8 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao