Sciweavers

5446 search results - page 280 / 1090
» Mobile computing
Sort
View
107
Voted
CHI
2007
ACM
16 years 4 months ago
Location, location, location: a study of bluejacking practices
We present an initial exploration of bluejacking, the practice of using Bluetooth-enabled mobile phones to send unsolicited messages to other Bluetooth-enabled mobile phones withi...
Jennifer Thom-Santelli, Alex Ainslie, Geri Gay
135
Voted
MOBIHOC
2006
ACM
16 years 3 months ago
Performance analysis of mobility-assisted routing
Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established. Mobility was considered a necessary evil that inval...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
112
Voted
EUSAI
2004
Springer
15 years 9 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira
133
Voted
CHI
2006
ACM
16 years 4 months ago
A large scale study of wireless search behavior: Google mobile search
We present a large scale study of search patterns on Google's mobile search interface. Our goal is to understand the current state of wireless search by analyzing over 1 Mill...
Maryam Kamvar, Shumeet Baluja
142
Voted
ICPR
2006
IEEE
16 years 4 months ago
Monocular Vision Based SLAM for Mobile Robots
This paper describes a new vision based method for the Simultaneous Localization and Mapping of mobile robots. The only data used is a video input from a moving calibrated monocul...
E. Mouragnon, Fabien Dekeyser, Maxime Lhuillier, M...