Sciweavers

683 search results - page 76 / 137
» Exploiting Logical Mobility in Mobile Computing Middleware
Sort
View
IJDSN
2007
111views more  IJDSN 2007»
14 years 9 months ago
Architecture of Wireless Sensor Networks with Mobile Sinks: Multiple Access Case
We propose to develop wireless Sensor Networks with Mobile Sinks (MSSN), under high sensor node density, where multiple sensor nodes need to share one single communication channel...
Liang Song, Dimitrios Hatzinakos
TMC
2010
109views more  TMC 2010»
14 years 8 months ago
Uncertainty Modeling and Reduction in MANETs
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Feng Li, Jie Wu
IROS
2007
IEEE
144views Robotics» more  IROS 2007»
15 years 4 months ago
Faster and more accurate face detection on mobile robots using geometric constraints
— We develop a framework to allow generic object detection algorithms to exploit geometric information commonly available to robot vision systems. Robot systems take pictures wit...
Michael Dixon, Frederick Heckel, Robert Pless, Wil...
JUCS
2010
97views more  JUCS 2010»
14 years 8 months ago
Supporting Mobile Users in Selecting Target Devices
: The availability of applications able to exploit multi-device environments is steadily increasing. Rather than using all devices in the same way, users tend to assign different r...
Giuseppe Ghiani, Fabio Paternò
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Proxy-based Hand-off of Web Sessions for User Mobility
The proliferation of different kinds of mobile devices, ranging from personal wireless devices, such as PDAs and smart phones, to small notebooks, is enabling ubiquitous personal ...
Gerardo Canfora, Giuseppe Di Santo, Gabriele Ventu...