Sciweavers

2691 search results - page 452 / 539
» Security in Ad Hoc Networks
Sort
View
NOMS
2006
IEEE
129views Communications» more  NOMS 2006»
14 years 4 months ago
A Framework for the Decentralisation and Management of Collaborative Applications in Ubiquitous Computing Environments
—When deploying collaborative applications such as Instant Messaging in ubiquitous computing environments significant enhancements can be afforded by offering additional context ...
Karl Quinn, Austin Kenny, Kevin Feeney, David Lewi...
ECEASST
2008
83views more  ECEASST 2008»
13 years 10 months ago
Layered Architecture Consistency for MANETs: Introducing New Team Members
In this paper we extend our results (as given in [PHE+07]) concerning the layered architecture for modeling workflows in Mobile Ad-Hoc NETworks (MANETs) using algebraic higher ord...
Enrico Biermann, Kathrin Hoffmann, Julia Padberg
DKE
2002
263views more  DKE 2002»
13 years 9 months ago
Data management issues in mobile and peer-to-peer environments
Mobile computing is a revolutionary technology, born as a result of remarkable advance in the development of computer hardware and wireless communication. It enables us to access ...
Budiarto, Shojiro Nishio, Masahiko Tsukamoto
ICDCSW
2011
IEEE
12 years 9 months ago
Finding a "Kneedle" in a Haystack: Detecting Knee Points in System Behavior
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...
CISS
2008
IEEE
14 years 4 months ago
Resource allocation algorithms for multiuser cooperative OFDMA systems with subchannel permutation
— In this paper, we investigate resource allocation for a multi-user OFDMA cooperative system. Aiming at minimizing the total transmission power under target rate constraints for...
Bo Gui, Leonard J. Cimini Jr.