Sciweavers

2347 search results - page 317 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
MOBICOM
2004
ACM
14 years 1 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
EWSA
2004
Springer
14 years 1 months ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer
IFL
2004
Springer
122views Formal Methods» more  IFL 2004»
14 years 1 months ago
Source-Based Trace Exploration
Abstract. Tracing a computation is a key method for program comprehension and debugging. Hat is a tracing system for Haskell 98 programs. During a computation a trace is recorded i...
Olaf Chitil
ISAAC
2004
Springer
102views Algorithms» more  ISAAC 2004»
14 years 1 months ago
Polynomial Deterministic Rendezvous in Arbitrary Graphs
Abstract. The rendezvous problem in graphs has been extensively studied in the literature, mainly using a randomized approach. Two mobile agents have to meet at some node of a conn...
Dariusz R. Kowalski, Andrzej Pelc
MDM
2004
Springer
14 years 1 months ago
Processing Range-Monitoring Queries on Heterogeneous Mobile Objects
We consider in this paper how to leverage heterogeneous mobile computing capability for efficient processing of real-time range-monitoring queries. In our environment, each mobil...
Ying Cai, Kien A. Hua, Guohong Cao