Sciweavers

1030 search results - page 38 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
159
Voted
DCOSS
2008
Springer
15 years 5 months ago
Efficient Node Discovery in Mobile Wireless Sensor Networks
Energy is one of the most crucial aspects in real deployments of mobile sensor networks. As a result of scarce resources, the duration of most real deployments can be limited to ju...
Vladimir Dyo, Cecilia Mascolo
141
Voted
OPODIS
2003
15 years 5 months ago
A Peer-to-Peer Approach to Enhance Middleware Connectivity
One of the problems of middleware for shared state is that they are designed, explicitly or implicitly, for symmetric networks. However, since the Internet is not symmetric, end-to...
Erik Klintskog, Valentin Mesaros, Zacharias El Ban...
137
Voted
IFM
2005
Springer
15 years 9 months ago
Model-Based Prototyping of an Interoperability Protocol for Mobile Ad-Hoc Networks
Abstract. We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for t...
Lars Michael Kristensen, Michael Westergaard, Pede...
142
Voted
JUCS
2010
124views more  JUCS 2010»
15 years 2 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
138
Voted
CSCW
2000
ACM
15 years 8 months ago
Developing adaptive groupware applications using a mobile component framework
A need exists to develop groupware systems that adapt to available resources and support user mobility. This paper presents DACIA, a system that provides mechanisms for building s...
Radu Litiu, Atul Prakash