Sciweavers

745 search results - page 37 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
NETWORK
2007
144views more  NETWORK 2007»
13 years 8 months ago
A Survey of Routing Protocols that Support QoS in Mobile Ad Hoc Networks
The explosive growth in the use of mobile devices coupled with users’ desires for real-time applications has provided new challenges in the design of protocols for mobile ad hoc...
Lei Chen, Wendi B. Heinzelman
WWW
2001
ACM
14 years 9 months ago
iMobile: An Agent-Based Platform for Mobile Services
iMobile is a platform that addresses the research issues in building mobile services. iMobile acts as a message gateway that allows mobile devices using various protocols on diffe...
Herman Chung-Hwa Rao, Yih-Farn Chen, Di-Fa Chang, ...
MATA
2004
Springer
199views Communications» more  MATA 2004»
14 years 2 months ago
Configuration Management for Networked Reconfigurable Embedded Devices
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Timothy O'Sullivan, Richard Studdert
IFIPTM
2010
139views Management» more  IFIPTM 2010»
13 years 7 months ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman
SECON
2010
IEEE
13 years 6 months ago
Using BGP in a Satellite-Based Challenged Network Environment
Once, satellites were considered an important option for creating global Internet access. However, for a period of time, satellites were supplanted by other ground-based technologi...
Roman Chertov, Kevin C. Almeroth