Sciweavers

1266 search results - page 156 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ANSS
2002
IEEE
15 years 9 months ago
Performance Analysis for Data Service in Third Generation Mobile Telecommunication Networks
The data traffic in wireless networks for the third generation (3G) mobile telecommunication systems should take into account a variety of services (voice, data, video) and envir...
Aloizio Pereira da Silva, Geraldo Robson Mateus
ISADS
2003
IEEE
15 years 9 months ago
Message Logging and Recovery in Wireless CORBA Using Access Bridge
The emerging mobile wireless environment poses exciting challenges for distributed fault tolerant (FT) computing. This paper proposes a message loggingand recovery protocol on the...
Xinyu Chen, Michael R. Lyu
CCS
2006
ACM
15 years 7 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang
EOR
2008
90views more  EOR 2008»
15 years 4 months ago
Quality of service statistics over heterogeneous networks: Analysis and applications
Heterogeneous wireless/wired networks and ubiquitous environments are gaining ever more attention by research community. To properly control and manage such puzzles a deep knowled...
Alessio Botta, Antonio Pescapè, Giorgio Ven...
CN
1999
107views more  CN 1999»
15 years 3 months ago
Programmable mobile networks
We present the design, implementation and evaluation of an open programmable mobile network based on distributed object technology called mobiware that dynamically exploits the in...
Andrew T. Campbell, Michael E. Kounavis, Raymond R...