: This paper presents a Multimedia Message Transmitter Tool (MMTT) that provides businesses with the opportunity to use Bluetooth wireless connectivity delivering the relevant info...
Sahar A. Idwan, Suad Alramouni, Mosleh Al-Adhaileh...
This paper presents a novel method for online and incremental appearance-based localization and mapping in a highly dynamic environment. Using position-invariant robust features (...
This paper describes the mathematical underpinning used to analyse two dimensional movements with time using Fourier Analysis techniques. Interpreting the complex harmonic compone...
Today’s ride sharing services still mimic a better billboard. They list the offers and allow to search for the source and target city, sometimes enriched with radial search. So...
Robert Geisberger, Dennis Luxen, Sabine Neubauer, ...
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...