• Nenhum resultado encontrado

[PDF] Top 20 A Tunable Checkpointing Algorithm for Distributed Mobile Applications

Has 8941 "A Tunable Checkpointing Algorithm for Distributed Mobile Applications" found on our website. Below are the top 20 most common "A Tunable Checkpointing Algorithm for Distributed Mobile Applications".

A Tunable Checkpointing Algorithm for Distributed Mobile Applications

A Tunable Checkpointing Algorithm for Distributed Mobile Applications

... a distributed checkpointing algorithm is to efficiently restore the execution state of distributed applications in face of hardware or software ...our checkpointing ... See full document

9

Soft-Checkpointing Based Coordinated Checkpointing Protocol for Mobile Distributed Systems

Soft-Checkpointing Based Coordinated Checkpointing Protocol for Mobile Distributed Systems

... minimum-process checkpointing, some processes may not be included in the minimum set for several checkpoint initiations due to typical dependency pattern; and they may starve for ...In Mobile Systems, the ... See full document

7

MOBILE ELEMENTS SCHEDULING FOR PERIODIC SENSOR APPLICATIONS

MOBILE ELEMENTS SCHEDULING FOR PERIODIC SENSOR APPLICATIONS

... not distributed to cover the entire ...dominating algorithm to partition the MST results in introducing dependence between the TP performance and the structure of the ... See full document

16

A Framework for Creating Applications for Different Mobile Operating Systems

A Framework for Creating Applications for Different Mobile Operating Systems

... the mobile applications market is a market of the future, and is already a great opportunity for ...of mobile Operating System (OS), tools for development of cross platform mobile ... See full document

132

A Blockchain System for Mobile Health Applications and Services

A Blockchain System for Mobile Health Applications and Services

... Although in a very early stage, homomorphic encryption shows great promise in securing sensible encrypted data while it is being processed. It allows encrypted data to be used in calculations and have the same output as ... See full document

78

Mobile ID in physical access control applications

Mobile ID in physical access control applications

... Smart locks are a new class of access control systems that have emerged in the last couple of years. Many of the major lock manufacturers have started to focus its R&D to develop these types of system, among them ... See full document

89

Model-driven generative programming for BIS mobile applications

Model-driven generative programming for BIS mobile applications

... Android mobile device emulator, and lastly using the Eclipse IDE environment with the ADT ...basic mobile functionalities, like rotating the screen and locking and unlocking the phone, test the views state ... See full document

142

Effective Complex Data Retrieval Mechanism for Mobile Applications

Effective Complex Data Retrieval Mechanism for Mobile Applications

... the mobile devices own a limited memory and a low computational capacity than the ...the mobile devices should be small and achieve good filtering efficiency as ...the mobile devices based on ... See full document

6

Fault Tolerant Distributed and Fixed Hierarchical Mobile IP

Fault Tolerant Distributed and Fixed Hierarchical Mobile IP

... The fault tolerance of GFA0, having healthy RFAs, can be achieved by reconfiguring the visitor lists of healthy RFAs. The healthy RFAs add the entries of the failure-affected mobile hosts from respective RFA ... See full document

19

Ubiquitous computing approach for mobile health applications

Ubiquitous computing approach for mobile health applications

... publishing applications, especially those based on SGML, but the web document architecture does not use them ...publishing applications that historically used more of the functionality could change too, ... See full document

106

Opposite Degree Algorithm and Its Applications

Opposite Degree Algorithm and Its Applications

... applied in some engineering fields, such as metal wear safety prediction [1], the settlement of soft. soil foundation prediction [2][r] ... See full document

3

Remote Nodes Management Using RMI

Remote Nodes Management Using RMI

... Our sincere thanks to Sakshi “Geeta” Surve, who is an assistant professor at the Thadomal Shahani Engineering College, Computer Engineering department, Mumbai University, Mumbai, India; for her constant support, guidance ... See full document

5

Security Optimization for Distributed Applications Oriented on Very Large Data Sets

Security Optimization for Distributed Applications Oriented on Very Large Data Sets

... in distributed applications, the actual process must be going on the server, so, until reaches the stage of processing, user’s login credentials are travelling throughout an unsecure area over the ... See full document

14

A real-time distributed software infrastructure for cooperating mobile autonomous robots

A real-time distributed software infrastructure for cooperating mobile autonomous robots

... Cooperating mobile autonomous robots have been generating a growing interest in fields such as rescue, demining and ...These applications require a real time middleware and wireless communication protocol ... See full document

6

Distributed, Modular, Network Enabled Architecture For Process  Control Military Applications

Distributed, Modular, Network Enabled Architecture For Process Control Military Applications

... VI. FUTURE SCOPE OF WORK In future, the hardware will be realized using MIL Grade components and proper care will be taken in packaging in order to withstand harsh environmental conditions. Subsequently, the designed ... See full document

4

Main drivers for microtransactions as impulse purchases in e-commerce

Main drivers for microtransactions as impulse purchases in e-commerce

... The types of consumers who make microtransactions and their motivations have also been assessed. These can give potential insights and indications regarding microtransaction motivations by players. Conclusions drawn ... See full document

91

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

... broadcasting algorithm using minimized forward node list algorithm which uses 2-hop neighborhood information more effectively to reduce redundant transmissions in asymmetric Mobile Ad hoc networks ... See full document

6

Trajectory Planning of Mobile robot in Unstructured
Environment for Multiple Objects

Trajectory Planning of Mobile robot in Unstructured Environment for Multiple Objects

... practical applications known and unknown objects need to be considered ...Novel algorithm has been developed which incorporates local path planner, optimization and navigation ... See full document

12

NCLUDINGC ONTEXT IN A ROUTING ALGORITHM FOR THEI NTERNET OFT HINGS

NCLUDINGC ONTEXT IN A ROUTING ALGORITHM FOR THEI NTERNET OFT HINGS

... routing algorithm (ARA) attempts to reduce the overhead in the network by simulating the food searching behaviour of the ...This algorithm is based on two phases, the first sends a Forward Ant (FANT) to the ... See full document

116

On Some Security Issues in Pervasive Computing - Light Weight Cryptography

On Some Security Issues in Pervasive Computing - Light Weight Cryptography

... Elliptic curve cryptography is another interesting area when it comes to less memory requirements and computational costs. ECC applied algorithms are of great use in environments where the level of security is medium and ... See full document

7

Show all 8941 documents...