Invisibility Design Constraints
Scaling
- reconfiguration
- code and algorithms for resource constrained (extreme) devices
- delivery of mobile code to extreme devices
- negotiation
- security, integrity
- discovery and exploitation of network resources
- computation, memory, communication, global information
- distributed network access
- serving history, real-time, and control information.