Sciweavers

73 search results - page 12 / 15
» Fault Tolerant Authentication in Mobile Computing
Sort
View
JIRS
2007
108views more  JIRS 2007»
13 years 7 months ago
Task-based Hardware Reconfiguration in Mobile Robots Using FPGAs
This paper presents a methodology for the realization of intelligent, task-based reconfiguration of the computational hardware for mobile robot applications. Task requirements are ...
Sesh Commuri, V. Tadigotla, L. Sliger
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 7 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
HASE
2008
IEEE
13 years 8 months ago
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks
Live migration provides transparent load-balancing and fault-tolerant mechanism for applications. When a Virtual Machine migrates among hosts residing in two networks, the network...
Qin Li, Jinpeng Huai, Jianxin Li, Tianyu Wo, Minxi...
DEXAW
2005
IEEE
356views Database» more  DEXAW 2005»
14 years 1 months ago
Grid Visualizer: A Monitoring Tool for Grid Environment
One specific problem in wide-area distributed computing environment is effective management of the vast amount of resources that are made available within the grid environment. Th...
Ghazala Shaheen, Muhammad Usman Malik, Zohair Ihsa...
MASCOTS
1993
13 years 8 months ago
Simulation Modeling of Weak-Consistency Protocols
: Weak-consistency replication protocols can be used to build wide-area services that are scalable, fault-tolerant, and useful for mobile computer systems. We have evaluated the ti...
Richard A. Golding, Darrell D. E. Long