Sciweavers

540 search results - page 85 / 108
» Evaluation of Datacasting in the Mobile Environment
Sort
View
ISMAR
2003
IEEE
15 years 5 months ago
ID CAM: A Smart Camera for Scene Capturing and ID Recognition
An ID recognition system is described that uses optical beacons and a high-speed image sensor. The ID sensor captures a scene like an ordinary camera and recognizes the ID of a be...
Nobuyuki Matsushita, Daisuke Hihara, Teruyuki Ushi...
GI
2001
Springer
15 years 4 months ago
Infrastructure for Pervasive Computing: Challenges
: As mobile and embedded computing devices become more pervasive, it is becoming obvious that the nature of interactions between users and computers must evolve. Applications need ...
Karen Henricksen, Jadwiga Indulska, Andry Rakotoni...
ISWC
1998
IEEE
15 years 4 months ago
Preliminary Investigation of Wearable Computers for Task Guidance in Aircraft Inspection
This paper describes a preliminary investigation of how the capabilities of wearable computers may be used to provide task guidance in mobile environments. Specifically, this stud...
Jennifer J. Ockerman, Amy R. Pritchett
ISER
2000
Springer
133views Robotics» more  ISER 2000»
15 years 3 months ago
Merging Gaussian Distributions for Object Localization in Multi-robot Systems
: We present a method for representing, communicating, and fusing distributed, noisy, and uncertain observations of an object by multiple robots. The approach relies on re-paramete...
Ashley W. Stroupe, Martin C. Martin, Tucker R. Bal...
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 26 days ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...