메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages

Fractal: A mobile code based framework for dynamic application protocol adaptation in pervasive computing

Author keywords

[No Author keywords available]

Indexed keywords

CONTENT DISTRIBUTION NETWORKS (CDN); GZIP; HETEROGENEOUS DEVICES; PERVASIVE COMPUTING;

EID: 33746289377     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPDPS.2005.230     Document Type: Conference Paper
Times cited : (7)

References (56)
  • 1
    • 84858913467 scopus 로고    scopus 로고
    • Akamai Technologies Inc. Edgesuite services, http://www.akamai.com/html/en/sv/ edgesuite_over.html.
  • 2
    • 0001061636 scopus 로고    scopus 로고
    • An active service framework and its application to real-time multimedia transcoding
    • Aug.
    • E. Amir, S. McCanne, and R. Katz. An Active Service Framework and its Application to Real-time Multimedia Transcoding. Proc. of the SIGCOMM'98, Aug. 1998.
    • (1998) Proc. of the SIGCOMM'98
    • Amir, E.1    McCanne, S.2    Katz, R.3
  • 6
    • 4544348737 scopus 로고    scopus 로고
    • The state-on-demand execution for adaptive component-based mobile agent systems
    • July
    • Y. Chow, W. Zhu, C. Wang, and F. C. Lau. The state-on-demand execution for adaptive component-based mobile agent systems. Proc. of ICPADS, July 2004.
    • (2004) Proc. of ICPADS
    • Chow, Y.1    Zhu, W.2    Wang, C.3    Lau, F.C.4
  • 8
    • 84858918871 scopus 로고    scopus 로고
    • Dicom standard, http://medical.nema.org.
  • 10
    • 0003629991 scopus 로고
    • FIPS 180-1, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, Apr.
    • FIPS 180-1, Secure Hash Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, Apr. 1995.
    • (1995) Secure Hash Standard
  • 11
    • 0032138638 scopus 로고    scopus 로고
    • Adapting to network and client variation using infrastructural proxies: Lessons and prospectives
    • Aug.
    • A. Fox, S. Gribble, Y. Chawathe, and E. A. Brewer. Adapting to Network and Client Variation Using Infrastructural Proxies: Lessons and Prospectives. IEEE Personal Communication, Aug. 1998, http://www.cs.washington.edu/ homes/gribble/papers/adapt.ps.zip.
    • (1998) IEEE Personal Communication
    • Fox, A.1    Gribble, S.2    Chawathe, Y.3    Brewer, E.A.4
  • 16
    • 84887507059 scopus 로고    scopus 로고
    • Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
    • L. Gong et al. Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2. Proc. Usenix Symp. Internet Technologies and Systems, Usenix Assn., 1997.
    • (1997) Proc. Usenix Symp. Internet Technologies and Systems, Usenix Assn.
    • Gong, L.1
  • 19
    • 4544290903 scopus 로고    scopus 로고
    • Nwslite: A light-weight prediction utility for mobile devices
    • Jun
    • S. Gurun, C. Krintz, and R. Wolski. Nwslite: A light-weight prediction utility for mobile devices. Proc. of MobiSys'04, Jun 2004.
    • (2004) Proc. of MobiSys'04
    • Gurun, S.1    Krintz, C.2    Wolski, R.3
  • 20
    • 84858923171 scopus 로고    scopus 로고
    • Gzip tool, http://www.gzip.org.
    • Gzip Tool
  • 22
    • 0025722247 scopus 로고
    • The x-Kernel: An architecture for implementing network protocols
    • Jan.
    • N. C. Hutchinson and L. L. Peterson. The x-Kernel: An Architecture for implementing Network Protocols. IEEE Transactions on Software Engineering 17(1):64-76, Jan. 1991.
    • (1991) IEEE Transactions on Software Engineering , vol.17 , Issue.1 , pp. 64-76
    • Hutchinson, N.C.1    Peterson, L.L.2
  • 26
  • 28
    • 33746276267 scopus 로고    scopus 로고
    • Ldap (v3) revision, 2004, http://www.ietf.org/ ids.by.wg/ldapbis.html.
    • (2004) Ldap (V3) Revision
  • 33
    • 0000880275 scopus 로고    scopus 로고
    • Adapting multimedia internet content for universal access
    • Mar.
    • R. Mohan, J. R. Simth, and C. Li. Adapting Multimedia Internet Content for Universal Access. IEEE Transactions on Multimedia 1(1):104-114, Mar. 1999.
    • (1999) IEEE Transactions on Multimedia , vol.1 , Issue.1 , pp. 104-114
    • Mohan, R.1    Simth, J.R.2    Li, C.3
  • 35
    • 0004131498 scopus 로고
    • P. Neumann, editor. Addison Wesley
    • P. Neumann, editor. Computer Related Risks. Addison Wesley, 1995.
    • (1995) Computer Related Risks
  • 36
    • 0004263197 scopus 로고    scopus 로고
    • Ph.D. thesis, School of Computer Science, Carnegie Mellon University, May
    • B. D. Noble. Mobile Data Access. Ph.D. thesis, School of Computer Science, Carnegie Mellon University, May 1998, http://mobility.eecs.umich.edu/ papers/diss.pdf.
    • (1998) Mobile Data Access
    • Noble, B.D.1
  • 40
    • 84858913469 scopus 로고    scopus 로고
    • Planetlab, http://planet-lab.org/.
  • 42
    • 0003676885 scopus 로고
    • Fingerprinting by random polynomials
    • Harvard Aiken Computation laboratory
    • M. O. Rabin. Fingerprinting by random polynomials. Tech. Rep. TR-15-81, Harvard Aiken Computation laboratory, 1981.
    • (1981) Tech. Rep. , vol.TR-15-81
    • Rabin, M.O.1
  • 44
    • 0033651715 scopus 로고    scopus 로고
    • A protocol independent technique for eliminating redundant network traffic
    • Aug.
    • N. T. Spring and D. Wetherall. A protocol independent technique for eliminating redundant network traffic. Proc. of ACM SIGCOMM'00, pp. 87-95, Aug. 2000.
    • (2000) Proc. of ACM SIGCOMM'00 , pp. 87-95
    • Spring, N.T.1    Wetherall, D.2
  • 45
    • 85084161003 scopus 로고    scopus 로고
    • Transformer tunnels: A framework for providing route-specific adaptations
    • June
    • P. Sudame and B. Badrinath. Transformer Tunnels: A Framework for Providing Route-Specific Adaptations. Proc. of the USENIX Technical Conf., June 1998.
    • (1998) Proc. of the USENIX Technical Conf.
    • Sudame, P.1    Badrinath, B.2
  • 46
    • 0034986779 scopus 로고    scopus 로고
    • On providing support for protocol adaptation in mobile wireless networks
    • P. Sudame and B. Badrinath. On providing support for protocol adaptation in mobile wireless networks. Mobile Networks and Applications (MONET) 6(1):43-55, 2001.
    • (2001) Mobile Networks and Applications (MONET) , vol.6 , Issue.1 , pp. 43-55
    • Sudame, P.1    Badrinath, B.2
  • 48
    • 0030124838 scopus 로고    scopus 로고
    • Towards an active network architecture
    • Apr.
    • D. Tennenhouse and D. Wetherall. Towards an Active Network Architecture. Computer Communications Review 26(2), Apr. 1996, http://www.tns.lcs.mit.edu/ publications/ccr96.html.
    • (1996) Computer Communications Review , vol.26 , Issue.2
    • Tennenhouse, D.1    Wetherall, D.2
  • 50
    • 0003570191 scopus 로고    scopus 로고
    • The rsync algorithm
    • Department of Computer Science, Australian National University
    • P. Tridgell and P. Mackerras. The rsync algorithm. Tech. Rep. TR-CS-96-05, Department of Computer Science, Australian National University, 1996.
    • (1996) Tech. Rep. , vol.TR-CS-96-05
    • Tridgell, P.1    Mackerras, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.