Sciweavers

1019 search results - page 42 / 204
» Mobile media search
Sort
View
INFOCOM
2010
IEEE
14 years 12 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
ICC
2009
IEEE
124views Communications» more  ICC 2009»
15 years 8 months ago
Towards a GNU/Linux IEEE 802.21 Implementation
—Multiaccess mobile devices and overlapping wireless network deployments have emerged as a next generation network fixture. To make the most of all available networks, mobile de...
Esa Piri, Kostas Pentikousis
DAGSTUHL
2006
15 years 2 months ago
6D SLAM with Cached kd-tree Search
6D SLAM (Simultaneous Localization and Mapping) or 6D Concurrent Localization and Mapping of mobile robots considers six degrees of freedom for the robot pose, namely, the x, y and...
Andreas Nüchter, Kai Lingemann, Joachim Hertz...
WAOA
2005
Springer
92views Algorithms» more  WAOA 2005»
15 years 7 months ago
The Conference Call Search Problem in Wireless Networks
Cellular telephony systems, where locations of mobile users are unknown at some times, are becoming more common. In such systems, mobile users are roaming in a zone and a user repo...
Leah Epstein, Asaf Levin
HICSS
2007
IEEE
153views Biometrics» more  HICSS 2007»
15 years 7 months ago
Mobile TV - To Live or Die by Content
Mobile TV is described as a natural and evolutionary next step as mobile phones get more multimedia features. Mobile network operators expect mobile TV to support the adoption of ...
Christer Carlsson, Pirkko Walden