Sciweavers

5446 search results - page 304 / 1090
» Mobile computing
Sort
View
ICDS
2007
IEEE
15 years 10 months ago
New Approach for Cellular Network Improvement
— In an attempt to optimize network performance of delivered 2G and 3G services and reduce operating costs, today's mobile operators are searching for aggregation and concen...
Stanislav Milanovic
LISA
2008
15 years 6 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
AINA
2006
IEEE
15 years 10 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
WACV
2012
IEEE
13 years 11 months ago
A new upsampling method for mobile LiDAR data
We present a novel method to upsample mobile LiDAR data using panoramic images collected in urban environments. Our method differs from existing methods in the following aspects: ...
Ruisheng Wang, Jeff Bach, Jane Macfarlane, Frank P...
WMCSA
2008
IEEE
15 years 10 months ago
Seeing our signals: combining location traces and web-based models for personal discovery
E. Agapie, Gong Chen, D. Houston, Eric Howard, J. ...