Sciweavers

683 search results - page 118 / 137
» Exploiting Logical Mobility in Mobile Computing Middleware
Sort
View
119
Voted
ICCV
2009
IEEE
16 years 8 months ago
Compact Signatures for High-Speed Interest Point Description and Matching
Prominent feature point descriptors such as SIFT and SURF allow reliable real-time matching but at a compu- tational cost that limits the number of points that can be handled on...
Michael Calonder, Vincent Lepetit, Pascal Fua, Kur...
156
Voted
AGS
2009
Springer
15 years 10 months ago
Two Case Studies for Jazzyk BSM
Recently, we introduced Behavioural State Machines (BSM ), a novel programming framework for development of cognitive agents with Jazzyk, its associated programming language and in...
Michael Köster, Peter Novák, David Mai...
133
Voted
AINA
2004
IEEE
15 years 7 months ago
MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks
This paper presents a novel effective scheme of configuring Wireless Personal Area Networks (WPANs), called Master-driven Connection Control (MaCC). WPANs are based on a new wirel...
Makoto Takizawa, Hiroto Aida, Masato Saito, Yoshit...
142
Voted
ICCS
2007
Springer
15 years 9 months ago
Enhanced Situational Awareness: Application of DDDAS Concepts to Emergency and Disaster Management
Abstract. We describe a prototype emergency and disaster information system designed and implemented using DDDAS concepts. The system is designed to use real-time cell phone callin...
Gregory R. Madey, Albert-László Bara...
142
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...