Sciweavers

697 search results - page 88 / 140
» Application-Aware Adaptation for Mobile Computing
Sort
View
ADHOCNOW
2006
Springer
15 years 3 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
ICPR
2002
IEEE
15 years 2 months ago
3D Reconstruction of Indoor and Outdoor Scenes Using a Mobile Range Scanner
This paper describes 3D mapping of indoor and outdoor environment using a mobile range scanner. In the raw range data preprocessing stage, we propose to use area decreasing flow ...
Yiyong Sun, Joon Ki Paik, Andreas Koschan, Mongi A...
CE
2008
122views more  CE 2008»
14 years 10 months ago
Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For...
G. D. Chen, C. K. Chang, C. Y. Wang
CHI
2006
ACM
15 years 10 months ago
Interweaving mobile games with everyday life
We introduce a location?based game called Feeding Yoshi that provides an example of seamful design, in which key characteristics of its underlying technologies--the coverage and s...
Marek Bell, Matthew Chalmers, Louise Barkhuus, Mal...
ICNP
2005
IEEE
15 years 3 months ago
Landmark Guided Forwarding
In this paper we focus on the problems of maintaining Ad Hoc network connectivity in the presence of node mobility whilst providing globally efficient and robust routing. The com...
Menghow Lim, Adam Chesterfield, Jon Crowcroft, Jul...