Sciweavers

120 search results - page 3 / 24
» Group detection in mobility traces
Sort
View
MIS
2007
Springer
159views Multimedia» more  MIS 2007»
13 years 4 months ago
The application of fluid mobility modelling in wireless cellular networks
Mobility models, synthetic or trace, try to accurately model the movement of a single user or a group of users. Models are used in simulators and emulators to investigate the cons...
Ronan J. Skehill, Sean McGrath
ICRA
2008
IEEE
162views Robotics» more  ICRA 2008»
13 years 11 months ago
Vision-based estimation of slip angle for mobile robots and planetary rovers
— For a mobile robot it is critical to detect and compensate for slippage, especially when driving in rough terrain environments. Due to its highly unpredictable nature, drift la...
Giulio Reina, Genya Ishigami, Keiji Nagatani, Kazu...
MOBIHOC
2008
ACM
14 years 4 months ago
Using persistent homology to recover spatial information from encounter traces
In order to better understand human and animal mobility and its potential effects on Mobile Ad-Hoc networks and Delay-Tolerant Networks, many researchers have conducted experiment...
Brenton D. Walker
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
13 years 9 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
MADNES
2005
Springer
13 years 10 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis