-
1
-
-
0344128050
-
-
Michigan State University, East Lansing
-
F. Zhu, M. Mutka, and L. Ni, "Classification of Service Discovery in Pervasive Computing Environments," Michigan State University, East Lansing, available at http://www.cse.msu.edu/~zhufeng/ServiceDiscoverySurvey.pdf MSU-CSE-02-24.
-
Classification of Service Discovery in Pervasive Computing Environments
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
2
-
-
85094635733
-
An architecture for a secure service discovery service
-
Seattle, WA
-
S. Czerwinski, B. Y. Zhao, T. Hodes, A. Joseph, and R. Katz, "An Architecture for a Secure Service Discovery Service," presented at Fifth Annual International Conference on Mobile Computing and Networks (MobiCom '99), Seattle, WA, 1999.
-
(1999)
Fifth Annual International Conference on Mobile Computing and Networks (MobiCom '99)
-
-
Czerwinski, S.1
Zhao, B.Y.2
Hodes, T.3
Joseph, A.4
Katz, R.5
-
3
-
-
0842304770
-
Home network security
-
C. Ellison, "Home Network Security," Intel Technology Journal, vol. 06, pp. 37-48, 2002.
-
(2002)
Intel Technology Journal
, vol.6
, pp. 37-48
-
-
Ellison, C.1
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Communications of ACM, pp. 422-426, 1970.
-
(1970)
Communications of ACM
, pp. 422-426
-
-
Bloom, B.1
-
6
-
-
0008284295
-
-
Sun Microsystem
-
Sun Microsystems, "Jini™ Architecture Specification," Sun Microsystem, available at http://wwws.sun.com/software/jini/specs/December, 2001.
-
(2001)
Jini™ Architecture Specification
-
-
-
8
-
-
2642566395
-
Discovering named instances of abstract services using DNS
-
S. Cheshire, "Discovering Named Instances of Abstract Services using DNS," Apple Computer, 2002, available at http://files.dns-sd.org/draft- cheshire-dnsext-dns-sd.txt.
-
(2002)
Apple Computer
-
-
Cheshire, S.1
-
9
-
-
0004345557
-
-
February 22
-
Bluetooth SIG, "Specification of the Bluetooth System - Core," available at http://www.bluetooth.org/docs/Bluetooth_V11_Core 22Feb01.p df, February 22, 2001.
-
(2001)
Specification of the Bluetooth System - Core
-
-
-
10
-
-
20844461994
-
-
The Salutation Consortium Inc., June 1
-
Salutation Consortium, "Salutation Architecture Specification," The Salutation Consortium Inc., available at ftp://ftp.salutation.org/salute/ sa20e1a21.ps June 1, 1999.
-
(1999)
Salutation Architecture Specification
-
-
-
11
-
-
0004077942
-
-
June
-
E. Guttman, C. Perkins, J. Veizades, and M. Day, "Service Location Protocol, Version 2," available at http://www.ietf.org/rfc/rfc2608.txt, June 1999.
-
(1999)
Service Location Protocol, Version 2
-
-
Guttman, E.1
Perkins, C.2
Veizades, J.3
Day, M.4
-
12
-
-
0035428326
-
Service discovery in DEAPspace
-
M. Nidd, "Service Discovery in DEAPspace," IEEE Personal Communications, pp. 39-45, 2001.
-
(2001)
IEEE Personal Communications
, pp. 39-45
-
-
Nidd, M.1
-
13
-
-
0001749548
-
The design and implementation of an intentional naming system
-
Kiawah Island, SC
-
W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley, "The design and implementation of an intentional naming system," presented at 17th ACM Symposium on Operating Systems Principles (SOSP '99), Kiawah Island, SC, 1999.
-
(1999)
17th ACM Symposium on Operating Systems Principles (SOSP '99)
-
-
Adjie-Winoto, W.1
Schwartz, E.2
Balakrishnan, H.3
Lilley, J.4
-
14
-
-
84958951042
-
Ins/twine: A scalable peer-to-peer architecture for intentional resource discovery
-
Zurich, Switzerland
-
M. Balazinska, H. Balakrishnan, and D. Karger, "INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery," presented at Pervasive 2002 - International Conference on Pervasive Computing, Zurich, Switzerland, 2002.
-
(2002)
Pervasive 2002 - International Conference on Pervasive Computing
-
-
Balazinska, M.1
Balakrishnan, H.2
Karger, D.3
-
16
-
-
0003593599
-
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, "SPKI Certificate Theory," 1999, available at http://www.ietf.org/rfc/ rfc2693.txt.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
17
-
-
0034206002
-
Summary cache: A scalable wide-area web cache sharing protocol
-
L. Fan, P. Cao, J. Almeida, and A. Broder, "Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol," IEEE/ACM Transactions on Networking, vol. 8, pp. 281-293, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.4
-
18
-
-
0001831930
-
The resurrecting duckling: Security issues for Ad-hoc wireless networks
-
Cambridge, UK
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," presented at 7th International Workshop on Security protocols, Cambridge, UK, 1999.
-
(1999)
7th International Workshop on Security Protocols
-
-
Stajano, F.1
Anderson, R.2
-
20
-
-
84937431479
-
The personal server - Changing the way we think about ubiquitous computing
-
Goteborg, Sweden
-
R. Want, T. Pering, G. Danneels, M. Kumar, M. Sundar, and J. Light, "The Personal Server - Changing the Way We Think about Ubiquitous Computing," presented at 4th International Conference on Ubiquitous Computing, Goteborg, Sweden, 2002.
-
(2002)
4th International Conference on Ubiquitous Computing
-
-
Want, R.1
Pering, T.2
Danneels, G.3
Kumar, M.4
Sundar, M.5
Light, J.6
-
23
-
-
24744450314
-
Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services
-
Fort Worth, Texas
-
F. Zhu, M. Mutka, and L. Ni, "Splendor: A Secure, Private, and Location-aware Service Discovery Protocol Supporting Mobile Services," presented at 1st IEEE Annual Conference on Pervasive Computing and Communications, Fort Worth, Texas, 2003.
-
(2003)
1st IEEE Annual Conference on Pervasive Computing and Communications
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
24
-
-
2642549364
-
-
iButton home page, available at http://www.ibutton.com/.
-
iButton Home Page
-
-
|