Sciweavers

2347 search results - page 91 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
AMDO
2006
Springer
15 years 1 months ago
Ballistic Hand Movements
Common movements like reaching, striking, etc. observed during surveillance have highly variable target locations. This puts appearance-based techniques at a disadvantage for model...
Shiv Naga Prasad Vitaladevuni, Vili Kellokumpu, La...
BSN
2006
IEEE
15 years 1 months ago
eWatch: A Wearable Sensor and Notification Platform
The eWatch is a wearable sensing, notification, and computing platform built into a wrist watch form factor making it highly available, instantly viewable, ideally located for sen...
Uwe Maurer, Anthony Rowe, Asim Smailagic, Daniel P...
CN
2010
103views more  CN 2010»
14 years 10 months ago
Anti-localization anonymous routing for Delay Tolerant Network
This paper focuses on the problem of how to allow a source to send a message without revealing its physical location and proposes an anti-localization routing protocol, ALAR, to a...
Xiaofeng Lu, Pan Hui, Don Towsley, Juahua Pu, Zhan...
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 10 months ago
Data-driven Co-clustering Model of Internet Usage in Large Mobile Societies
Design and simulation of future mobile networks will center around human interests and behavior. We propose a design paradigm for mobile networks driven by realistic models of use...
Saeed Moghaddam, Ahmed Helmy, Sanjay Ranka, Manas ...
DISOPT
2008
118views more  DISOPT 2008»
14 years 10 months ago
Approximation algorithm for minimizing total latency in machine scheduling with deliveries
We study the problem of minimizing total latency in machine scheduling with deliveries, which is defined as follows. There is a set of n jobs to be processed by a single machine a...
Asaf Levin, Michal Penn