Sciweavers

172 search results - page 26 / 35
» Non-disclosure for Distributed Mobile Code
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
INFOCOM
1999
IEEE
13 years 11 months ago
Techniques for Optimizing CORBA Middleware for Distributed Embedded Systems
The distributed embedded systems industry is poised to leverage emerging real-time operating systems, such as Inferno, Windows CE 2.0, and Palm OS, to support mobile communication...
Aniruddha S. Gokhale, Douglas C. Schmidt
AINA
2007
IEEE
14 years 1 months ago
Collaborative Signal Reinforcement in Sensor Networks
Nodes in sensor fields and in autonomous swarms of mobile robots need to communicate; this usually requires individual nodes to either consume a significant amount of energy, ca...
Tingting Meng, Peter M. Athanas
GLOBECOM
2010
IEEE
13 years 5 months ago
Compressive Data Persistence in Large-Scale Wireless Sensor Networks
This paper considers a large-scale wireless sensor network where sensor readings are occasionally collected by a mobile sink, and sensor nodes are responsible for temporarily stori...
Mu Lin, Chong Luo, Feng Liu, Feng Wu
NETWORKING
2007
13 years 9 months ago
Simple Models for the Performance Evaluation of a Class of Two-Hop Relay Protocols
We evaluate the performance of a class of two-hop relay protocols for mobile ad hoc networks. The interest is on the multicopy two-hop relay (MTR) protocol, where the source may ge...
Ahmad Al Hanbali, Arzad Alam Kherani, Philippe Nai...