Default Cover Image

24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings.

Mar. 23 2004 to Mar. 24 2004

Hachioji, Tokyo, Japan

ISBN: 0-7695-2087-1

Volume:

Table of Contents

Message from the DARES ChairFreely available from IEEE.pp. 0_18-0_18
Message from the WWAN ChairFreely available from IEEE.pp. 0_22-0_22
Workshop Committee membersFreely available from IEEE.pp. 0_24-1_5
Session 1: Mobile Data Management
Log-Structured Storage for Efficient Weakly-Connected ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 458-463
Session 1: Mobile Data Management
Designing a Video Data Management System for Monitoring Cameras with Intuitive InterfaceFull-text access may be available. Sign in or learn about subscription options.pp. 464-469
Session 1: Mobile Data Management
Indexing Continual Range Queries with Covering Tiles for Fast Locating of Moving ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 470-475
Session 2: Mobile Data Management (2)
An Efficient Scheduling Method for Query-Set-Based Broadcasting in Mobile EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 478-483
Session 2: Mobile Data Management (2)
Using Lock-Based Checking Protocol for Efficient Data Broadcast in Mobile EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 484-489
Session 2: Mobile Data Management (2)
Correct Execution of Continuous Monitoring Queries in Wireless Sensor SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 490-495
Session 3: Wireless and Sensor Networks
A System Architecture for Seamless NavigationFull-text access may be available. Sign in or learn about subscription options.pp. 498-504
Session 3: Wireless and Sensor Networks
A Multi-Channel MAC Protocol Using Maximal Matching for Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 505-510
Session 3: Wireless and Sensor Networks
Price-Based Channel Time Allocation in Wireless LANsFull-text access may be available. Sign in or learn about subscription options.pp. 511-517
Session 4: Mobile P2P
A Light-Weight Component Model for Peer-to-Peer ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 520-527
Session 4: Mobile P2P
Peer-to-Peer Cooperative Caching in Mobile EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 528-533
Session 4: Mobile P2P
Jelly: A Dynamic Hierarchical P2P Overlay Network with Load Balance and LocalityFull-text access may be available. Sign in or learn about subscription options.pp. 534-540
Session 5: Code Mobility, Mobile Agents, Cooperation
MobileScope: A Programming Language with Objective MobilityFull-text access may be available. Sign in or learn about subscription options.pp. 542-547
Session 5: Code Mobility, Mobile Agents, Cooperation
A Reliable and Secure Connection Migration Mechanism for Mobile AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 548-553
Session 5: Code Mobility, Mobile Agents, Cooperation
Decomposition of Fundamental Problems for Cooperative Autonomous Mobile SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 554-560
Session 6: Resource Sharing, Location Awareness
A Method for Selecting Output Data from Ubiquitous Terminals in a Ubiquitous Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 562-567
Session 6: Resource Sharing, Location Awareness
A Metadata-Based Approach to Personalized Mobile Resource SharingFull-text access may be available. Sign in or learn about subscription options.pp. 568-573
Session 6: Resource Sharing, Location Awareness
Large-Scale Location Estimation over GSM Networks: The Gear ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 574-579
Session 7: Security
Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 582-587
Session 7: Security
Ant-Based Adaptive Trust Evidence Distribution in MANETFull-text access may be available. Sign in or learn about subscription options.pp. 588-593
Showing 25 out of 25