Sciweavers

1545 search results - page 93 / 309
» Opportunities in Opportunistic Computing
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
Accelerating SSL with GPUs
SSL/TLS is a standard protocol for secure Internet communication. Despite its great success, today's SSL deployment is largely limited to security-critical domains. The low a...
Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon...
PERVASIVE
2008
Springer
13 years 8 months ago
Cooperative Techniques Supporting Sensor-Based People-Centric Inferencing
Abstract. People-centric sensor-based applications targeting mobile device users offer enormous potential. However, learning inference models in this setting is hampered by the lac...
Nicholas D. Lane, Hong Lu, Shane B. Eisenman, Andr...
TMC
2008
164views more  TMC 2008»
13 years 8 months ago
Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks
Integrating mobile computing and localized user interaction into the Internet requires more than simply overcoming pure routing challenges. Apart from issues such as intermittent c...
Anargyros Garyfalos, Kevin C. Almeroth
NEW2AN
2010
Springer
13 years 7 months ago
Heuristic Congestion Control for Message Deletion in Delay Tolerant Network
Delay tolerant network (DTN) challenges on large delay of communication, opportunistic and intermittent connectivity so that data can be transferred over vulnerable network. Most r...
Lertluck Leela-amornsin, Hiroshi Esaki
RAID
2010
Springer
13 years 7 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...