메뉴 건너뛰기




Volumn 47, Issue 4, 2004, Pages 475-494

Smart messages: A distributed computing platform for networks of embedded systems

Author keywords

[No Author keywords available]

Indexed keywords

CACHE MEMORY; COMPUTER OPERATING SYSTEMS; DATA COMMUNICATION SYSTEMS; EMBEDDED SYSTEMS; INTERFACES (COMPUTER); SECURITY OF DATA; STORAGE ALLOCATION (COMPUTER); TELECOMMUNICATION NETWORKS; TELECOMMUNICATION TRAFFIC;

EID: 3142721239     PISSN: 00104620     EISSN: None     Source Type: Journal    
DOI: 10.1093/comjnl/47.4.475     Document Type: Article
Times cited : (47)

References (59)
  • 6
    • 3142680837 scopus 로고    scopus 로고
    • "Linux Devices". http://www.linuxdevices.com.
    • Linux Devices
  • 10
    • 0041851150 scopus 로고    scopus 로고
    • Active network vision reality: Lessons from a capsule-based system
    • Charleston, SC, December, ACM Press, New York, NY
    • Wetherall, D. (1999) Active network vision reality: lessons from a capsule-based system. In Proc. 17th ACM Symp. on Operating Systems Principles (SOSP 1999), Charleston, SC, December, pp. 64-79. ACM Press, New York, NY.
    • (1999) Proc. 17th ACM Symp. on Operating Systems Principles (SOSP 1999) , pp. 64-79
    • Wetherall, D.1
  • 16
    • 0004159391 scopus 로고    scopus 로고
    • Mobile agents: Motivations and state-of-the-art systems
    • Technical Report. ftp://ftp.cs.dartmouth.edu/TR/TR2000-365.ps.Z. Bradshaw, J.M. (ed.), AAAI/MIT Press, in press
    • Gray, R.S., Kotz, D., Cybenko, G. and Rus, D. (2000) Mobile Agents: Motivations and State-of-the-Art Systems. Technical Report. ftp://ftp.cs.dartmouth.edu/TR/TR2000-365.ps.Z. In Bradshaw, J.M. (ed.), Handbook of Agent Technology. AAAI/MIT Press, in press.
    • (2000) Handbook of Agent Technology
    • Gray, R.S.1    Kotz, D.2    Cybenko, G.3    Rus, D.4
  • 17
  • 18
    • 3142701345 scopus 로고    scopus 로고
    • XML
    • "XML," http://www.w3.org/XML/.
  • 19
    • 3142666090 scopus 로고    scopus 로고
    • "JavaSpaces," http://wwws.sun.com/software/jini/specs/jini1.1html/js-title.html.
    • JavaSpaces
  • 22
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B. (1970) Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7), 422-426.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 23
    • 2442549069 scopus 로고    scopus 로고
    • Using trust for secure collaboration in uncertain environments
    • Cahill, V. et al. (2003) Using trust for secure collaboration in uncertain environments. In Pervasive Comput., IEEE, 2(3), 52-61.
    • (2003) Pervasive Comput., IEEE , vol.2 , Issue.3 , pp. 52-61
    • Cahill, V.1
  • 24
    • 0002992633 scopus 로고    scopus 로고
    • D'Agents: Security in a multiple-language, mobile-agent system
    • Vigna, Giovanni (ed.), Springer-Verlag, London, UK
    • Gray, R., Kotz, D., Cybenko, G. and Rus, D. (1998) D'Agents: security in a multiple-language, mobile-agent system. In Vigna, Giovanni (ed.), Mobile Agents and Security, Vol. 1419 of Lecture Notes in Computer Science, pp. 154-187. Springer-Verlag, London, UK.
    • (1998) Mobile Agents and Security of Lecture Notes in Computer Science , vol.1419 , pp. 154-187
    • Gray, R.1    Kotz, D.2    Cybenko, G.3    Rus, D.4
  • 27
    • 0003935679 scopus 로고    scopus 로고
    • Technical Report SMLI TR-98-70, Sun Microsystems Laboratories, Palo Alto, CA, December
    • Agesen, O. (1998) GC points in a threaded environment. Technical Report SMLI TR-98-70, Sun Microsystems Laboratories, Palo Alto, CA, December.
    • (1998) GC Points in a Threaded Environment
    • Agesen, O.1
  • 28
    • 84978970834 scopus 로고    scopus 로고
    • CarNet: A scalable ad hoc wireless network system
    • Kolding, Denmark, September, ACM Press, New York, NY
    • Morris, R., Jannotti, J., Kaashoek, F., Li, J. and Decouto, D. (2000) CarNet: a scalable ad hoc wireless network system. In Proc. 9th ACM SIGOPS European Workshop, Kolding, Denmark, September, pp. 61-65. ACM Press, New York, NY.
    • (2000) Proc. 9th ACM SIGOPS European Workshop , pp. 61-65
    • Morris, R.1    Jannotti, J.2    Kaashoek, F.3    Li, J.4    Decouto, D.5
  • 29
    • 0036655344 scopus 로고    scopus 로고
    • Critical embedded automotive networks
    • Koopman, P. (2002) Critical embedded automotive networks. IEEE Micro, 22(4), 14-18.
    • (2002) IEEE Micro , vol.22 , Issue.4 , pp. 14-18
    • Koopman, P.1
  • 36
  • 42
    • 84979654159 scopus 로고    scopus 로고
    • GAIA: Enabling active spaces
    • Kolding, Denmark, September, ACM Press, New York, NY
    • Roman, M. and Campbell, R. (2000) GAIA: enabling active spaces. In Proc. 9th ACM SIGOPS European Workshop, Kolding, Denmark, September, pp. 229-234. ACM Press, New York, NY.
    • (2000) Proc. 9th ACM SIGOPS European Workshop , pp. 229-234
    • Roman, M.1    Campbell, R.2
  • 46
    • 3142754064 scopus 로고    scopus 로고
    • "Linux Kernel Procfs," http://www.kernelnewbies.org/documents/kdoc/procfs-guide/intro.html.
    • Linux Kernel Procfs
  • 49
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Imielinski, T. and Korth, H. (eds), Kluwer Academic Publishers
    • Johnson, D. and Maltz, D. (1996) Dynamic source routing in ad hoc wireless networks. In Imielinski, T. and Korth, H. (eds), Mobile Computing. Kluwer Academic Publishers. pp. 153-181.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.1    Maltz, D.2
  • 50
    • 0035836592 scopus 로고    scopus 로고
    • Security in the Ajanta mobile agent system
    • Karnik, N. and Tripathi, A. (2001) Security in the Ajanta mobile agent system. Software Practice and Experience, 31(4), 301-329.
    • (2001) Software Practice and Experience , vol.31 , Issue.4 , pp. 301-329
    • Karnik, N.1    Tripathi, A.2
  • 53
    • 84871153200 scopus 로고    scopus 로고
    • "Trusted Computing" http://www.cl.cam.ac.uk/rja14/tcpafaq.html.
    • Trusted Computing
  • 55
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Vigna, Giovanni (ed.), Springer-Verlag, London, UK
    • Hohl, F. (1998) Time limited blackbox security: protecting mobile agents from malicious hosts. In Vigna, Giovanni (ed.), Mobile Agents and Security, Vol. 1419 of Lecture Notes in Computer Science, pp. 92-113. Springer-Verlag, London, UK.
    • (1998) Mobile Agents and Security of Lecture Notes in Computer Science , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 57
    • 0026152309 scopus 로고
    • The spring kernel: A new paradigm for real-time systems
    • Stankovic J. and Ramamritham, K. (1991) The spring kernel: a new paradigm for real-time systems. IEEE Software, 8, 62-72.
    • (1991) IEEE Software , vol.8 , pp. 62-72
    • Stankovic, J.1    Ramamritham, K.2
  • 58
    • 0031642014 scopus 로고    scopus 로고
    • FARA - a framework for adaptive resource allocation in complex real-time systems
    • Denver, CO, May, IEEE Computer Society
    • Rosu, D., Schwan, K. and Yalamanchili, S. (1998) FARA - a framework for adaptive resource allocation in complex real-time systems. In Proc. 4th IEEE Real-Time Technology and Applications Symposium, Denver, CO, May, pp. 79-84. IEEE Computer Society.
    • (1998) Proc. 4th IEEE Real-Time Technology and Applications Symposium , pp. 79-84
    • Rosu, D.1    Schwan, K.2    Yalamanchili, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.