Sciweavers

1315 search results - page 183 / 263
» Providing Service Continuity in Ad Hoc Networks
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 26 days ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
TKDE
2010
197views more  TKDE 2010»
13 years 3 months ago
Filtering Data Streams for Entity-Based Continuous Queries
The idea of allowing query users to relax their correctness requirements in order to improve performance of a data stream management system (e.g., location-based services and senso...
Reynold Cheng, Benjamin C. M. Kao, Alan Kwan, Suni...
PERCOM
2008
ACM
14 years 8 months ago
Non-anchored Unified Naming for Ubiquitous Computing Environments
Users and developers require some way to identify by human readable names the many resources that comprise a ubiquitous computing environment. In addition, naming in such environm...
Yoo Chul Chung, Dongman Lee
AICT
2006
IEEE
120views Communications» more  AICT 2006»
14 years 3 months ago
Business Processes Characterisation Through Definition of Structural and Non-Structural Criteria
Workflow and Web Services have the main role in the development and in the realisation of B2B architectures. In this context, the principal target is to compose many services supp...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...
CISIS
2009
IEEE
14 years 3 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...