A virtual fence is created by applying an aversive stimulus to an animal when it approaches a predefined boundary. It is implemented by a small animal-borne computer system with a...
Zack J. Butler, Peter I. Corke, Ronald A. Peterson...
This paper addresses the energy consumption of forward error correction (FEC) protocols as used to improve quality-of-service (QoS) for wireless computing devices. The paper also ...
Zhinan Zhou, Philip K. McKinley, Seyed Masoud Sadj...
— As people move through their environments, they do not move randomly. Instead, they are often engaged in typical motion patterns, related to specific locations they might be i...
Behavior of current communication protocols as well as current and future networked applications is of fundamental importance for technical and commercial success of Mobile Intern...
Markku Kojo, Andrei Gurtov, Jukka Manner, Pasi Sar...
Video retargeting aims at transforming an existing video in order to display it appropriately on a target device, often in a lower resolution, such as a mobile phone. To preserve a...
Gang Hua, Cha Zhang, Zicheng Liu, Zhengyou Zhang, ...