Sciweavers

5446 search results - page 379 / 1090
» Mobile computing
Sort
View
ICDCSW
2005
IEEE
15 years 10 months ago
Visual Code Widgets for Marker-Based Interaction
We present a set of graphical user interface elements, called widgets, for 2-dimensional visual codes. The proposed widgets are suitable for printing on paper as well as showing o...
Michael Rohs
JIFS
2007
82views more  JIFS 2007»
15 years 4 months ago
Anomaly detection in mobile communication networks using the self-organizing map
Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. In this paper we propose a...
Rewbenio A. Frota, Guilherme De A. Barreto, Jo&ati...
PERCOM
2007
ACM
16 years 4 months ago
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment
? Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
ECOOPW
1999
Springer
15 years 8 months ago
Mutual Protection of Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and op...
Volker Roth
FOCS
1991
IEEE
15 years 8 months ago
Walking an Unknown Street with Bounded Detour
A polygon with two distinguished vertices, s and g, is called a street iff the two boundary chains from s to g are mutually weakly visible. For a mobile robot with on-board vision...
Rolf Klein