Sciweavers

73 search results - page 7 / 15
» Fault Tolerant Authentication in Mobile Computing
Sort
View
JAVA
2001
Springer
13 years 12 months ago
A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system’s design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, e...
Peter R. Cappello, Dimitros Mourloukos
IJNSEC
2008
126views more  IJNSEC 2008»
13 years 7 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli
ICDCSW
2007
IEEE
13 years 7 months ago
A Middleware Support for Agent-Based Application Mobility in Pervasive Environments
—Application mobility is an efficient way to mask uneven conditioning and reduce users’ distractions in pervasive environments. However, since mobility brings more dynamism and...
Yu Zhou, Jiannong Cao, Vaskar Raychoudhury, Joanna...
IWCMC
2006
ACM
14 years 1 months ago
SCAR: context-aware adaptive routing in delay tolerant mobile sensor networks
Sensor devices are being embedded in all sorts of items including vehicles, furniture but also animal and human bodies through health monitors and tagging techniques. The collecti...
Cecilia Mascolo, Mirco Musolesi
ISORC
2003
IEEE
14 years 20 days ago
A Dynamic Shadow Approach for Mobile Agents to Survive Crash Failures
Fault tolerance schemes for mobile agents to survive agent server crash failures are complex since developers normally have no control over remote agent servers. Some solutions mo...
Simon Pears, Jie Xu, Cornelia Boldyreff