Sciweavers

44 search results - page 7 / 9
» Decomposition and Reuse of Mobile Services
Sort
View
PERCOM
2006
ACM
14 years 10 months ago
Managing Pervasive Systems using Role-based Obligation Policies
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, services and applications. Policy-based management is an effective approach for mana...
Chetan Shiva Shankar, Roy H. Campbell
FLAIRS
2003
14 years 7 days ago
Spatially-Aware Information Retrieval with Graph-Based Qualitative Reference Models
Geo-referenced information is used by a growing number of “spatially-aware” tools in different application areas, including tourism, marketing, environmental management, and m...
Thomas Vögele, Christoph Schlieder
WIMOB
2007
IEEE
14 years 5 months ago
Securing Virtual Private Networks with SIM Authentication
—  With the ever increasing amount of systems requiring user authentication, users are experiencing an substantial inconvenience. A huge amount of passwords needs to be remember...
Torstein Bjørnstad, Ivar Jørstad, Do...
NBIS
2009
Springer
14 years 3 months ago
Analysis of Web Alert Models
act— Web alerts are user-defined monitor conditions for public Internet information in which notification messages are sent to users whenever their alert conditions are met. The ...
Jameela Al-Jaroodi, Nader Mohamed
ICC
2000
IEEE
233views Communications» more  ICC 2000»
14 years 2 months ago
Multicasting Sustained CBR and VBR Traffic in Wireless Ad-Hoc Networks
Wireless ad-hoc networks consist of mobile nodes forming a dynamically changing topology without any infrastructure. Multicasting in a wireless ad-hoc network is difficult and chal...
George D. Kondylis, Srikanth V. Krishnamurthy, Son...