Sciweavers

2663 search results - page 508 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
GI
2004
Springer
14 years 1 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
MIDDLEWARE
2004
Springer
14 years 1 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
OOPSLA
2004
Springer
14 years 1 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
CGO
2010
IEEE
14 years 1 months ago
Contention aware execution: online contention detection and response
Cross-core application interference due to contention for shared on-chip and off-chip resources pose a significant challenge to providing application level quality of service (Qo...
Jason Mars, Neil Vachharajani, Robert Hundt, Mary ...
MIR
2010
ACM
255views Multimedia» more  MIR 2010»
14 years 1 months ago
Sharing of baseball event through social media
As real-time broadcasting services are becoming more popular, many people are sharing live events with remote users. Despite the success of real-time broadcasting services, a numb...
Hogun Park, Sun-Bum Youn, Eugene Hong, Changhyeon ...