Twin-object platform: a generic proxy-based system for communication customization in mobile computing
暂无分享,去创建一个
[1] Gabriel Montenegro,et al. End-to-end Performance Implications of Slow Links , 2001, RFC.
[2] Jochen Seitz,et al. Π2 -- a generic proxy platform for wireless access and mobility in CORBA , 2000, PODC '00.
[3] Bruce Zenel. A general purpose proxy filtering mechanism applied to the mobile environment , 1999, Wirel. Networks.
[4] George Samaras,et al. WebExpress: A client/intercept based system for optimizing Web browsing in a wireless environment , 1998, Mob. Networks Appl..
[5] Suresh Singh,et al. M-TCP: TCP for mobile cellular networks , 1997, CCRV.
[6] Steven McCanne,et al. BPF+: exploiting global data-flow optimization in a generalized packet filter architecture , 1999, SIGCOMM '99.
[7] Charles E. Perkins,et al. Service Location Protocol, Version 2 , 1999, RFC.
[8] Sergio Loureiro,et al. Mobile code security , 2000 .
[9] Van Jacobson,et al. Compressing TCP/IP Headers for Low-Speed Serial Links , 1990, RFC.
[10] Srinivasan Seshan,et al. Improving reliable transport and handoff performance in cellular wireless networks , 1995, Wirel. Networks.
[11] Michael J. Jipping,et al. Investigating wired and wireless networks using a java-based programmable sniffer , 2004, ITiCSE '04.
[12] Jeff Wilson,et al. Securing a wireless network , 2002, SIGUCCS '02.
[13] Jeffrey C. Mogul,et al. The packer filter: an efficient mechanism for user-level network code , 1987, SOSP '87.
[14] Ned Freed,et al. Behavior of and Requirements for Internet Firewalls , 2000, RFC.
[15] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[16] Mani B. Srivastava,et al. Active Base Stations and Nodes for Wireless Networks , 2003, Wirel. Networks.
[17] B. R. Badrinath,et al. I-TCP: indirect TCP for mobile hosts , 1995, Proceedings of 15th International Conference on Distributed Computing Systems.
[18] Jason Nieh,et al. Web browsing performance of wireless thin-client computing , 2003, WWW '03.
[19] Eric Eide,et al. Bees: a secure, resource-controlled, Java-based execution environment , 2003, 2003 IEEE Conference onOpen Architectures and Network Programming..
[20] Gary McGraw,et al. Statically Scanning Java Code: Finding Security Vulnerabilities , 2000, IEEE Software.
[21] Eric A. Brewer,et al. Adapting to network and client variability via on-demand dynamic distillation , 1996, ASPLOS VII.
[22] Kimmo E. E. Raatikainen,et al. Optimizing World-Wide Web for weakly connected mobile workstations: An indirect approach , 1995, Second International Workshop on Services in Distributed and Networked Environments.
[23] José Legatheaux Martins,et al. Flexible data storage for mobile computing , 1999, SAC '99.
[24] Kimmo E. E. Raatikainen,et al. Connecting Mobile Workstations to the Internet Over a Digital Cellular Telephone Network , 1994, Mobidata.