Sciweavers

1440 search results - page 281 / 288
» Mobility Model for Tactical Networks
Sort
View
UIST
1995
ACM
14 years 7 days ago
Migratory Applications
We introduce a new genre of user interface applications that can migrate from one machine to another, taking their user interface and application contexts with them, and continue ...
Krishna Bharat, Luca Cardelli
ICISC
2004
146views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
RAS
2000
161views more  RAS 2000»
13 years 8 months ago
Active object recognition by view integration and reinforcement learning
A mobile agent with the task to classify its sensor pattern has to cope with ambiguous information. Active recognition of three-dimensional objects involves the observer in a sear...
Lucas Paletta, Axel Pinz
JCM
2010
126views more  JCM 2010»
13 years 7 months ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani
CORR
2010
Springer
163views Education» more  CORR 2010»
13 years 3 months ago
Toward a Push-Scalable Global Internet
Push message delivery, where a client maintains an "always-on" connection with a server in order to be notified of a (asynchronous) message arrival in real-time, is incre...
Sachin Agarwal