Sciweavers

493 search results - page 19 / 99
» Storage Alternatives for Mobile Computers
Sort
View
ICNP
2003
IEEE
15 years 9 months ago
A Bidding Protocol for Deploying Mobile Sensors
In some harsh environments, manually deploying sensors is impossible. Alternative methods may lead to imprecise placement resulting in coverage holes. To provide the required high...
Guiling Wang, Guohong Cao, Thomas F. La Porta
DIALM
1999
ACM
113views Algorithms» more  DIALM 1999»
15 years 8 months ago
Flooding for reliable multicast in multi-hop ad hoc networks
Ad hoc networks are gaining popularity as a result of advances in smaller, more versatile and powerful mobile computing devices. The distinguishing feature of these networks is the...
Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar...
147
Voted
PERVASIVE
2004
Springer
15 years 9 months ago
Accommodating Transient Connectivity in Ad Hoc and Mobile Settings
Much of the work on networking and communications is based on the premise that components interact in one of two ways: either they are connected via a stable wired or wireless netw...
Radu Handorean, Christopher D. Gill, Gruia-Catalin...
RAID
1999
Springer
15 years 8 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
SOCA
2007
IEEE
15 years 10 months ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan