Sciweavers

516 search results - page 102 / 104
» An approach to mobile collaborative mapping
Sort
View
IJNSEC
2006
134views more  IJNSEC 2006»
14 years 10 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
JFR
2006
140views more  JFR 2006»
14 years 10 months ago
Improving robot navigation through self-supervised online learning
In mobile robotics, there are often features that, while potentially powerful for improving navigation, prove difficult to profit from as they generalize poorly to novel situations...
Boris Sofman, Ellie Lin, J. Andrew Bagnell, John C...
WISEC
2010
ACM
14 years 8 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
CHI
2009
ACM
15 years 10 months ago
Blobby: how to guide a blind person
For the majority of blind people, walking in unknown places is a very difficult, or even impossible, task to perform, when without help. The adoption of the white cane is the main...
Hugo Nicolau, Joaquim A. Jorge, Tiago João ...
ICTAI
2006
IEEE
15 years 4 months ago
On the Relationships between Clustering and Spatial Co-location Pattern Mining
The goal of spatial co-location pattern mining is to find subsets of spatial features frequently located together in spatial proximity. Example co-location patterns include servi...
Yan Huang, Pusheng Zhang