Sciweavers

686 search results - page 133 / 138
» Securing Mobile Agent Based Tele-Assistance Systems
Sort
View
SRDS
2010
IEEE
13 years 8 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
AUTONOMICS
2008
ACM
14 years 23 days ago
Emergent engineering for the management of complex situations
Ubiquitous computing and communication environments connect systems and people in unprecedented ways, but also fundamentally challenge the mindset of traditional systems engineeri...
René Doursat, Mihaela Ulieru
PERCOM
2010
ACM
14 years 2 months ago
Negotiate power and performance in the reality of RFID systems
—Recent years have witnessed the wide adoption of the RFID technology in many important application domains including logistics, inventory, retailing, public transportation, and ...
Xunteng Xu, Lin Gu, Jianping Wang, Guoliang Xing
ICEIS
2000
IEEE
14 years 3 months ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant
EAGC
2003
Springer
14 years 4 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...