Sciweavers

1266 search results - page 11 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
PPAM
2005
Springer
14 years 24 days ago
Enabling Remote Method Invocations in Peer-to-Peer Environments: RMIX over JXTA
In this paper, we present a peer-to-peer (P2P) system with remote method invocations, combining RMIX and JXTA technologies, and underpinning the H2O distributed resource sharing pl...
Pawel Jurczyk, Maciej Golenia, Maciej Malawski, Da...
OTM
2005
Springer
14 years 24 days ago
Empirical Evaluation of Dynamic Local Adaptation for Distributed Mobile Applications
Distributed mobile applications operate on devices with diverse capabilities, in heterogeneous environments, where parameters such as processor, memory and network utilisation, are...
Pablo Rossi, Caspar Ryan
VR
2007
IEEE
14 years 1 months ago
Variability-Aware Latency Amelioration in Distributed Environments
Application designers of collaborative distributed Virtual Environments must account for the influence of the network connection and its detrimental effects on user performance. ...
Alexey Tumanov, Robert S. Allison, Wolfgang St&uum...
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
14 years 8 days ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
IPPS
1998
IEEE
13 years 11 months ago
An Architecture for Network Resource Monitoring in a Distributed Environment
As part of its HiPer-D Program, the United States Navy is developing an experimental distributed system which achieves survivability by dynamically reconfiguring the system using ...
Philip M. Irey IV, Robert W. Hott, David T. Marlow