Sciweavers

745 search results - page 115 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
MIDDLEWARE
2005
Springer
14 years 2 months ago
SLP-based service management for dynamic ad-hoc networks
The need for an efficient service management system in an ad-hoc network is obvious. Mobile nodes – and with them the services they provide – frequently enter and leave the ne...
Stefan Penz
RTAS
1996
IEEE
14 years 1 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
SAC
2004
ACM
14 years 2 months ago
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of ne...
Tobias Straub, Andreas Heinemann
MUM
2004
ACM
154views Multimedia» more  MUM 2004»
14 years 2 months ago
Plug-and-play application platform: towards mobile peer-to-peer
While peer-to-peer (P2P) has emerged as a new hot communication concept among the Internet users, mobile usage of P2P applications is still taking its first steps. This article fi...
Erkki Harjula, Mika Ylianttila, Jussi Ala-Kurikka,...
BIOWIRE
2007
Springer
14 years 3 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...