Sciweavers

219 search results - page 19 / 44
» Types for Access Control in a Calculus of Mobile Resources
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 8 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed
AUIC
2001
IEEE
14 years 9 days ago
Adapting the Web Interface: An Adaptive Web Browser
The growing number of mobile computing devices with diverse characteristics creates a requirement for seamless (device independent) access to computing resources of distributed sy...
Karen Henricksen, Jadwiga Indulska
WIMOB
2008
IEEE
14 years 3 months ago
A Distributed Scheduling Algorithm with QoS Provisions in Multi-hop Wireless Mesh Networks
—Multi-hop wireless mesh networks (WMNs) are considered a promising technology to backhaul heterogeneous data traffic from wireless access networks to the wired Internet. WMNs a...
Chi Harold Liu, Athanasios Gkelias, Yun Hou, Kin K...
ISCC
2000
IEEE
14 years 1 months ago
On Multiple Traffic Type Integration over Wireless TDMA Channels
A new medium access control (MAC) protocol for mobile wireless communications is presented and investigated. We explore, via an extensive simulation study, the performance of the ...
Polychronis Koutsakis, Michael Paterakis