Sciweavers

2306 search results - page 410 / 462
» Supporting Mobility in MosquitoNet
Sort
View
114
Voted
SIGMETRICS
1994
ACM
15 years 8 months ago
An Empirical Study of a Highly Available File System
In this paper we present results from a six-month empirical study of the high availability aspectsof the CodaFile System. We reporton the servicefailures experienced by Coda clien...
Brian Noble, Mahadev Satyanarayanan
CSE
2009
IEEE
15 years 8 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
ESAS
2007
Springer
15 years 8 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
ARCS
2006
Springer
15 years 8 months ago
Constraint-Based Deployment of Distributed Components in a Dynamic Network
Hierarchical software components offer interesting characteristics for the development of complex applications. However, supporting the deployment of such applications is difficult...
Didier Hoareau, Yves Mahéo
APSEC
2001
IEEE
15 years 8 months ago
Knowledge Scouts: Reducing Communication Barriers in a Distributed Software Development Project
As a result of globalization, mergers, acquisitions, and scarce skills, software development is increasingly more distributed. Distribution, however, introduces major communicatio...
Allen H. Dutoit, Joyce Johnstone, Bernd Brügg...