Sciweavers

4383 search results - page 806 / 877
» Mobile Environmental Applications
Sort
View
ICOIN
2001
Springer
15 years 4 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
IH
2001
Springer
15 years 4 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
ISRR
2001
Springer
105views Robotics» more  ISRR 2001»
15 years 4 months ago
Towards Robust Data Association and Feature Modeling for Concurrent Mapping and Localization
One of the most challenging aspects of concurrent mapping and localization (CML) is the problem of data association. Because of uncertainty in the origins of sensor measurements, i...
John J. Leonard, Paul M. Newman, Richard J. Rikosk...
MMB
2001
Springer
131views Communications» more  MMB 2001»
15 years 4 months ago
Seawind: a Wireless Network Emulator
Behavior of current communication protocols as well as current and future networked applications is of fundamental importance for technical and commercial success of Mobile Intern...
Markku Kojo, Andrei Gurtov, Jukka Manner, Pasi Sar...
NSF
2001
Springer
225views Computer Vision» more  NSF 2001»
15 years 4 months ago
Content-Based Networking: A New Communication Infrastructure
Abstract. We argue that the needs of many classes of modern applications, especially those targeted at mobile or wireless computing, demand the services of content-based publish/su...
Antonio Carzaniga, Alexander L. Wolf