Sciweavers

5446 search results - page 989 / 1090
» Mobile computing
Sort
View
117
Voted
ICB
2009
Springer
185views Biometrics» more  ICB 2009»
15 years 9 months ago
Pose Invariant Palmprint Recognition
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...
Chhaya Methani, Anoop M. Namboodiri
105
Voted
NOSSDAV
2009
Springer
15 years 9 months ago
Fine-grained scalable streaming from coarse-grained videos
Scalable video is an attractive option for adapting the bandwidth consumption of streaming video to the available bandwidth. Fine-grained scalability can adapt most closely to the...
Pengpeng Ni, Alexander Eichhorn, Carsten Griwodz, ...
101
Voted
CDC
2008
IEEE
125views Control Systems» more  CDC 2008»
15 years 9 months ago
Continuous motion planning for information forecast
— This paper addresses planning of continuous paths for mobile sensors to improve long-term forecast performance. With the information gain defined by the mutual information bet...
Han-Lim Choi, Jonathan P. How
92
Voted
COMSWARE
2008
IEEE
15 years 9 months ago
Quantifying presence using calling patterns
—Presence technology is going to be an integral part of the next generation of communication technology. It can eliminate telephone tag between two parties (caller and callee), w...
Husain Husna, Santi Phithakkitnukoon, Enkh-Amgalan...
139
Voted
INFOCOM
2008
IEEE
15 years 9 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...