Sciweavers

1030 search results - page 102 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
WETICE
2007
IEEE
15 years 10 months ago
A Dominating Set Based Peer-to-Peer Protocol for Real-Time Multi-source Collaboration
Designing a collaborative architecture for real-time applications is an intricate challenge that usually involves dealing with the real-time constraints, resource limitations and ...
Dewan Tanvir Ahmed, Shervin Shirmohammadi, Abdulmo...
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 9 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
USENIX
1994
15 years 5 months ago
Concert/C: A Language for Distributed Programming
Concert/C is a new language for distributed C programming that extends ANSI C to support distribution and process dynamics. Concert/C provides the ability to create and terminate ...
Joshua S. Auerbach, Arthur P. Goldberg, Germ&aacut...
ACSC
2004
IEEE
15 years 7 months ago
A RMI Protocol for Aglets
Aglets is a mobile agent system that allows an agent to move with its code and execution state across the network to interact with other entities. Aglets utilizes Java RMI to supp...
Feng Lu, Kris Bubendorfer
WINET
2002
103views more  WINET 2002»
15 years 3 months ago
IP Paging Service for Mobile Hosts
In wireless networks, mobile hosts must update the network with their current location in order to get packets delivered. Paging facilitates efficient power management at the mobil...
Ramachandran Ramjee, Erran L. Li, Thomas F. La Por...