Sciweavers

447 search results - page 40 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
ICDCSW
2003
IEEE
14 years 27 days ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
ICIW
2007
IEEE
14 years 1 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
ICDE
2007
IEEE
138views Database» more  ICDE 2007»
14 years 9 months ago
ICEDB: Intermittently-Connected Continuous Query Processing
Current distributed database and stream processing systems assume that the network connecting nodes in the data processor is "always on," and that the absence of a netwo...
Yang Zhang, Bret Hull, Hari Balakrishnan, Samuel M...
MATA
2004
Springer
199views Communications» more  MATA 2004»
14 years 29 days ago
Configuration Management for Networked Reconfigurable Embedded Devices
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Timothy O'Sullivan, Richard Studdert
ICDCS
2008
IEEE
14 years 2 months ago
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
Peer-to-peer (P2P) data networks dominate Internet traffic. In this work, we study the problems that arise when mobile hosts participate in P2P networks. We primarily focus on th...
Zhenyun Zhuang, Sandeep Kakumanu, Yeonsik Jeong, R...