A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
Roam: A Scalable Replication System for Mobility
2004
Journal on spesial topics in mobile networks and applications
Roam is a replication system designed to satisfy the requirements of the mobile user. Roam is based on the Ward Model, a replication architecture for mobile environments. ...
Using the Ward Model and new distributed algorithms, Roam provides a scalable replication solution for the mobile user. ...
The concepts and ideas behind Roam are applicable beyond the realm of file replication. ...
doi:10.1023/b:mone.0000034707.26695.e8
fatcat:dzf3idmpyfdt7a5h7fdc65phim
A peer-to-peer approach to wireless LAN roaming
2003
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03
We make the case for a Global Confederation of Peer-to-Peer (P2P) Wireless Local Area Networks. ...
The ubiquitous Internet access that the roaming users of these domains could enjoy compensates for their home domain's cost of providing access to visitors. ...
components on several different peer nodes, ensuring system fault-tolerance and scalability. ...
doi:10.1145/941326.941329
dblp:conf/wmash/EfstathiouP03
fatcat:l6jetebefndsxldqwgjfwfpx7q
A peer-to-peer approach to wireless LAN roaming
2003
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03
We make the case for a Global Confederation of Peer-to-Peer (P2P) Wireless Local Area Networks. ...
The ubiquitous Internet access that the roaming users of these domains could enjoy compensates for their home domain's cost of providing access to visitors. ...
components on several different peer nodes, ensuring system fault-tolerance and scalability. ...
doi:10.1145/941327.941329
fatcat:zmbyhiofdjar3avor662a2sugi
Roaming honeypots for mitigating service-level denial-of-service attacks
2004
24th International Conference on Distributed Computing Systems, 2004. Proceedings.
In particular, against external attacks, our roaming honeypots scheme provides service response time that is independent of attack load for a fixed number of attack machines. ...
Honeypots have been proposed to act as traps for malicious attackers. ...
address and/or a different port number, are used for mobility support and fault, or attack, tolerance. ...
doi:10.1109/icdcs.2004.1281598
dblp:conf/icdcs/KhattabSMMZ04
fatcat:jektusq5vrgt7c3jvwsjtr6b4u
Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks
2016
International Journal of Network Security
We propose a Random Roaming Authentication Protocol (RanRAP) for BSNs with these cloud-assisted infrastructure. ...
Thus some new security problems are proposed, such as the light weight-secure authentication caused by limited resource, re-authentication in foreign zone caused by mobility, and composablilty security ...
From August 1989 to July 1992, he was the head of, and a professor in, the Institute of Computer Science and Information Engineering at the National Chung Cheng University, Chiayi, Taiwan. ...
dblp:journals/ijnsec/XieJWC16
fatcat:orm4c4eqkzaefb35tmdzwk6z4q
Using mobile agents as roaming security guards to test and improve security of hosts and networks
2004
Proceedings of the 2004 ACM symposium on Applied computing - SAC '04
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. ...
ACKNOWLEGMENTS The MAST project is sponsored by the National Science Foundation (NSF) under the Strategic Technologies for the Internet program, award number 0230927. ...
The concern of having multiple copies of the same server is basically for scalability. In MAST, services are looked up via SLP. ...
doi:10.1145/967900.967920
dblp:conf/sac/CarvalhoCSBF04
fatcat:olavzkpj6jfvzkanr3ygigseuu
Follow the Leader: a Scalable Approach for Realistic Group Behavior of Roaming NPCs in MMO Games
2013
Advances in Artificial Life, ECAL 2013
This paper addresses the problem of defining a smart, more challenging, and natural movement model for NPCs. ...
Unfortunately, standard NPCs behavior, i.e., patrolling between rally points, does not put a significant challenge to players once its deterministic movement pattern is discovered. ...
In particular, mobs (shorthand for "mobiles") are NPCs roaming the map and typically implement monsters to be defeated or avoided. ...
doi:10.7551/978-0-262-31709-2-ch101
dblp:conf/ecal/MaggioriniRP13
fatcat:nbt3johwubhvpbnxj55qb3z5nm
P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go
2021
Sensors
This paper presents P4G2Go, a novel privacy-preserving scheme that provides strong security and privacy assertions for roaming consumers against honest but curious entities of the smart grid. ...
One such example is when a landlord rents their property for a specific period to tenants. Then the electricity bill could be redirected from the landlord's utility to the tenant's utility. ...
In the latter case, a mobile user wants to access the roaming network and get charged by their home operator. ...
doi:10.3390/s21082686
pmid:33920337
fatcat:be7kfo5cjrelnmsfe6rnqxatlm
One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity
2014
International Journal of Network Security
Key Establishment for Wireless Roaming (KE-WR) is expected to ensure a mobile user to establish a fresh session key with a foreign WSP and also roam from one foreign network domain to another while enjoying ...
Second, this article proposes a novel suite of One-Pass Key Establishment Protocols for Wireless Roaming. ...
Generally, A number of popular roaming solutions, such as Global System for Mobile Communications (GSM), Universal Mobile Telecommunication System (UMTS) and Mobile IP Networks, all depend on an authentication ...
dblp:journals/ijnsec/WangWH14
fatcat:hmz7occnvvbrvmuwuo3va3wmhy
A Fault-Tolerant Mobile Computing Model Based On Scalable Replica
2014
International Journal of Interactive Multimedia and Artificial Intelligence
Roam is a replication system designed to satisfy the requirements of the mobile user. Roam is based on the Ward Model, replication architecture for mobile environments. ...
Using the Ward Model and new distributed algorithms, Roam provides a scalable replication solution for the mobile user. ...
CONCLUSION In this paper we proposed a number of significant problems in large scale replication, and produced a scalable replication system for mobile environments. ...
doi:10.9781/ijimai.2014.267
fatcat:qbgzypxt3rfglpm73mdldssele
IJIMAI Editor's Note - Vol. 2 Issue 6
2014
International Journal of Interactive Multimedia and Artificial Intelligence
Using the Ward Model and new distributed algorithms, Roam provides a scalable replication solution for the mobile user. ...
Roam is a replication system designed to satisfy the requirements of the mobile user. Roam is based on the Ward Model, replication architecture for mobile environments. ...
doi:10.9781/ijimai.2014.260
fatcat:ik3lehj77nf5xhrkkvbwal7qou
Mobility in Databases and Distributed Systems: Summing up Achievements of the Past Decade
2004
Journal on spesial topics in mobile networks and applications
databases and systems to cater for mobility. ...
The year 1999 was a milestone in a sense that it marked the end of an era in mobile database management research where focus was on human interaction and on extending classical concepts of distributed ...
The proposed system, called Roam, offers a scalable replication scheme for mobile users. The authors present the motivation, design and implementation of Roam as well as study its performance. ...
doi:10.1023/b:mone.0000034761.69017.08
fatcat:vrv4qeyykbcupclhszakhz55ki
A NOVEL REPLICATION STRATEGY FOR LARGE-SCALE MOBILE DISTRIBUTED DATABASE SYSTEMS
2011
Journal of Engineering Science and Technology
The paper addresses this problem for large scale mobile distributed database systems. Our solution represents a new binary hybrid replication strategy in terms of its components and approach. ...
An important challenge to database researchers in mobile computing environments is to provide a data replication solution that maintains the consistency of replicated data. ...
ROAM [13, 14] is an optimistic replication system that provides a scalable replication solution for the mobile user. ROAM is based on the Ward Model [15] . ...
doaj:cfca9edd6d494b078c9ef336e87b4083
fatcat:pzo5lhwymvawta5icb3lsdstyu
A New Optimistic Replication Strategy For Large-Scale Mobile Distributed Database Systems
2010
International Journal of Database Management Systems
This paper proposes a new optimistic replication strategy for maintaining the eventual consistency in large-scale mobile distributed database systems. ...
Also, the results showed that the horizontal extension provided by the proposed strategy is more suitable than the vertical extension for large scale mobile distributed database systems. ...
Roam [7, 8] is an optimistic replication system that provides a scalable replication solution for the mobile user. ROAM is based on the Ward Model [6] . ...
doi:10.5121/ijdms.2010.2408
fatcat:4ygmml33pzdchj24r6k22ftyzy
On the Interoperability of Decentralized Exposure Notification Systems
[article]
2020
arXiv
pre-print
This report also proposes an API and a backend implementation architecture for EN interoperability. ...
This report summarizes the requirements and proposes a high-level solution for interoperability across recently proposed COVID-19 exposure notification efforts. ...
Acknowledgements The author is grateful to Luca De Feo, Dennis Jackson, Dennis Potashnik, Navaneeth Rameshan, Martin Schmatz, Marc Stoecklin and Carmela Troncoso, for useful discussions. ...
arXiv:2006.13087v1
fatcat:hjnkfilqgfhixbqfvj3kxeqwqu
« Previous
Showing results 1 — 15 out of 1,466 results