Sciweavers

4596 search results - page 870 / 920
» Mobile Business Processes
Sort
View
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
14 years 2 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
DIALM
2003
ACM
99views Algorithms» more  DIALM 2003»
14 years 1 months ago
Spatio-temporal data reduction with deterministic error bounds
A common way of storing spatio-temporal information about mobile devices is in the form of a 3D (2D geography + time) trajectory. We argue that when cellular phones and Personal D...
Hu Cao, Ouri Wolfson, Goce Trajcevski
SC
2003
ACM
14 years 1 months ago
A Compiler Analysis of Interprocedural Data Communication
This paper presents a compiler analysis for data communication for the purpose of transforming ordinary programs into ones that run on distributed systems. Such transformations ha...
Yonghua Ding, Zhiyuan Li
AP2PC
2003
Springer
14 years 1 months ago
G-Grid: A Class of Scalable and Self-Organizing Data Structures for Multi-dimensional Querying and Content Routing in P2P Networ
Peer-to-Peer (P2P) technologies promise to provide efficient distribution, sharing and management of resources, such as storage, processing, routing and other sundry service capabi...
Aris M. Ouksel, Gianluca Moro
CAISE
2003
Springer
14 years 1 months ago
Building a Collaborative Information Agent in a HomeBot Application
Abstract Information agents are cooperative agents whose main goal is to collaborate and assist task agents like mobile agents in obtaining information from heterogeneous data sour...
Lito Perez Cruz, Arkady B. Zaslavsky, David Squire