Sciweavers

4533 search results - page 840 / 907
» Prediction Services for Distributed Computing
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 11 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
IFIP8
2004
13 years 11 months ago
Using Group Management to Tame Mobile Ad Hoc Networks
Mobile ad hoc networks (MANET) offer a convenient basis towards pervasive computing, due to inherent support for anytime, anywhere network access for mobile users. However, the dev...
Malika Boulkenafed, Daniele Sacchetti, Valé...
DAIS
2008
13 years 11 months ago
Using Object Replication for Building a Dependable Version Control System
Object-oriented technologies are frequently used to design and implement distributed applications. Object replication is a well-established approach to increase the dependability f...
Rüdiger Kapitza, Peter Baumann, Hans P. Reise...
CN
2006
82views more  CN 2006»
13 years 10 months ago
A cost-minimization algorithm for fast location tracking in mobile wireless networks
Location tracking is one of the most important issues in providing real-time applications over wireless networks due to its effect to quality of service (QoS), such as end-to-end ...
Wenye Wang, Guoliang Xue
PUC
2006
139views more  PUC 2006»
13 years 10 months ago
EMMA: Epidemic Messaging Middleware for Ad hoc networks
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particula...
Mirco Musolesi, Cecilia Mascolo, Stephen Hailes