Sciweavers

452 search results - page 37 / 91
» Is home network application acceptable or not
Sort
View
JSA
2007
139views more  JSA 2007»
13 years 8 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
PAM
2010
Springer
13 years 10 months ago
A First Look at Mobile Hand-Held Device Traffic
Abstract. Although mobile hand-held devices (MHDs) are ubiquitous today, little is know about how they are used--especially at home. In this paper, we cast a first look on mobile h...
Gregor Maier, Fabian Schneider, Anja Feldmann
ICC
2007
IEEE
14 years 3 months ago
A Support System for Designing Ubiquitous Service Composition Scenarios
—Ubiquitous service composition provides new services and applications seamlessly by establishing cooperation among any devices in home networks and any services in service provi...
Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, ...
ICDCS
1996
IEEE
14 years 25 days ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin
PERCOM
2011
ACM
12 years 11 months ago
Ubiquitous cloud: Managing service resources for adaptive ubiquitous computing
Abstract—The adaptive ubiquitous services, which dynamically adapt behaviors to requirements and contexts, are one of the major challenges in the ubiquitous computing. To facilit...
Koichi Egami, Shinsuke Matsumoto, Masahide Nakamur...