Sciweavers

4998 search results - page 774 / 1000
» The case for intentional networking
Sort
View
PPAM
2005
Springer
14 years 2 months ago
Enabling Remote Method Invocations in Peer-to-Peer Environments: RMIX over JXTA
In this paper, we present a peer-to-peer (P2P) system with remote method invocations, combining RMIX and JXTA technologies, and underpinning the H2O distributed resource sharing pl...
Pawel Jurczyk, Maciej Golenia, Maciej Malawski, Da...
SAFECOMP
2005
Springer
14 years 2 months ago
Control and Data Flow Testing on Function Block Diagrams
As programmable logic controllers(PLCs) have been used in safety-critical applications, testing of PLC applications has become important. The previous PLC-based software testing te...
Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha
SPW
2005
Springer
14 years 2 months ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund
DOLAP
2004
ACM
14 years 2 months ago
Aggregate queries in peer-to-peer OLAP
A peer-to-peer (P2P) data management system consists essentially of a network of peer systems, each maintaining full autonomy over its own data resources. Data exchange between pe...
Mauricio Minuto Espil, Alejandro A. Vaisman
MOBICOM
2004
ACM
14 years 2 months ago
Reducing MAC layer handoff latency in IEEE 802.11 wireless LANs
With the growth of IEEE 802.11-based wireless LANs, VoIP and similar applications are now commonly used over wireless networks. Mobile station performs a handoff whenever it move...
Sangho Shin, Andrea G. Forte, Anshuman Singh Rawat...