Ubiquitous computing is increasingly becoming part of our lives. Various computing devices, having different sizes and capabilities, and using different software platforms are part...
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
We present a stereo-based obstacle avoidance system for mobile vehicles. The system operates in three steps. First, it models the surface geometry of supporting surface and remove...
Modeling environments with 3D feature based representations is a challenging issue in current mobile robotics. Fast and robust algorithms are required for applicability to navigati...
This paper studies the use of highly dynamic networks as infrastructures for persistent storage of data that offer services at specific geographical zones in a decentralized and...