Sciweavers

5324 search results - page 826 / 1065
» Internet Security Protocols
Sort
View
TRIDENTCOM
2005
IEEE
14 years 4 months ago
Wireless Nomadic Transfer over Mobile Ad hoc Networks
Mobile ad hoc networking allows the development of several infrastructure free applications. One of the arguments we focused on is the possibility of deploying a set of services i...
Stefano Annese, Andrea Ghittino
ICWE
2005
Springer
14 years 4 months ago
Light-Weight Distributed Web Interfaces: Preparing the Web for Heterogeneous Environments
Abstract. In this paper we show an approach that allows web interfaces to dynamically distribute among several interconnected heterogeneous devices in an environment to support the...
Chris Vandervelpen, Geert Vanderhulst, Kris Luyten...
MIDDLEWARE
2005
Springer
14 years 4 months ago
Dual-Quorum Replication for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Dual-quorum replication combines volume leases and qu...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
SAC
2004
ACM
14 years 4 months ago
A multi-criteria model for electronic auctions
In this paper we present a multi-criteria model for electronic auctions, which is based on reference points. According to the model, the buyer must specify an aspiration point tha...
Marie-Jo Bellosta, Imène Brigui, Sylvie Kor...
EUC
2004
Springer
14 years 4 months ago
Invalidation for CORBA Caching in Wireless Devices
Wireless devices are widely used to get some information from the Internet. However, limited bandwidth, frequent disconnections and different communication protocols are most comm...
James Jayaputera, David Taniar