Sciweavers

2691 search results - page 361 / 539
» Security in Ad Hoc Networks
Sort
View
MIDDLEWARE
2004
Springer
14 years 3 months ago
Environment mobility: moving the desktop around
In this position paper, we focus on issues related to middleware support for software mobility in ad hoc and pervasive systems. In particular, we are interested in moving the comp...
Dag Johansen, Håvard D. Johansen, Robbert va...
ICN
2005
Springer
14 years 3 months ago
Reliable Mobile Ad Hoc P2P Data Sharing
Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method f...
Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Se...
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 10 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
ARCS
2009
Springer
14 years 5 months ago
Hybrid Resource Discovery Mechanism in Ad Hoc Grid Using Structured Overlay
Resource management has been an area of research in ad hoc grids for many years. Recently, different research projects have focused resource management in centralized, decentralize...
Tariq Abdullah, Luc Onana Alima, Vassiliy Sokolov,...
ICSOC
2004
Springer
14 years 3 months ago
Hot service deployment in an ad hoc grid environment
In this paper, we present a solution to the problem of dynamically deploying grid service factories onto computing nodes running an implementation of the Open Grid Services Infras...
Thomas Friese, Matthew Smith, Bernd Freisleben