Sciweavers

447 search results - page 81 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
ICC
2009
IEEE
152views Communications» more  ICC 2009»
14 years 2 months ago
On Concurrent Multipath Transfer in SCTP-Based Handover Scenarios
Abstract—Handling mobility at the transport layer is a promising approach to achieve seamless handover in the context of heterogeneous wireless access networks. In particular, fe...
Lukasz Budzisz, Ramon Ferrús, Ferran Casade...
JLP
2008
134views more  JLP 2008»
13 years 7 months ago
Backwards type analysis of asynchronous method calls
Asynchronous method calls have been proposed to better integrate object orientation with distribution. In the Creol language, asynchronous method calls are combined with so-called...
Einar Broch Johnsen, Ingrid Chieh Yu
SENSYS
2006
ACM
14 years 1 months ago
Data compression algorithms for energy-constrained devices in delay tolerant networks
Sensor networks are fundamentally constrained by the difficulty and energy expense of delivering information from sensors to sink. Our work has focused on garnering additional si...
Christopher M. Sadler, Margaret Martonosi
IWAN
2000
Springer
13 years 11 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...
MIDDLEWARE
2005
Springer
14 years 29 days ago
Functional and architectural adaptation in pervasive computing environments
Service-oriented computing paradigm encourages the use of dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive...
Nanjangud C. Narendra, Umesh Bellur, S. K. Nandy, ...