There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
:We present a comparison of an extended Kalman lter and an adaptation of bundle adjustment from computer vision for mobile robot localization and mapping using a bearing-only senso...
Direct-touch interaction on mobile phones revolves around screens that compete for visual attention with users‟ realworld tasks and activities. This paper investigates the impac...
Andrew Bragdon, Eugene Nelson, Yang Li, Ken Hinckl...
In this paper, we present new results in performance analysis of super-resolution (SR) image reconstruction. We investigate bounds on the improvement in resolution that can be ach...