Sciweavers

398 search results - page 47 / 80
» Embedded Network Protocols for Mobile Devices
Sort
View
KIVS
2005
Springer
14 years 2 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
SIGUCCS
2005
ACM
14 years 2 months ago
An augmented campus design for context-aware service provision
This paper deals with the design of a multi-modal system for pervasive context-aware service provision and humanenvironment interaction in augmented environments by the use of Per...
Alessandro Genco, Giuseppe Reina, Paolo Raccuglia,...
PERCOM
2003
ACM
14 years 8 months ago
BASE - A Micro-Broker-Based Middleware for Pervasive Computing
Pervasive computing environments add a multitude of additional devices to our current computing landscapes. Specialized embedded systems provide sensor information about the real ...
Christian Becker, Gregor Schiele, Holger Gubbels, ...
WIMOB
2008
IEEE
14 years 3 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
GI
2001
Springer
14 years 1 months ago
Infrastructure for Pervasive Computing: Challenges
: As mobile and embedded computing devices become more pervasive, it is becoming obvious that the nature of interactions between users and computers must evolve. Applications need ...
Karen Henricksen, Jadwiga Indulska, Andry Rakotoni...