Sciweavers

1295 search results - page 46 / 259
» Palimpsests of Time and Place
Sort
View
IJMC
2008
103views more  IJMC 2008»
14 years 12 months ago
Enhancing mobile advertising via Bluetooth technology
: This paper presents a Multimedia Message Transmitter Tool (MMTT) that provides businesses with the opportunity to use Bluetooth wireless connectivity delivering the relevant info...
Sahar A. Idwan, Suad Alramouni, Mosleh Al-Adhaileh...
IJRR
2011
78views more  IJRR 2011»
14 years 6 months ago
Online and Incremental Appearance-based SLAM in Highly Dynamic Environments
This paper presents a novel method for online and incremental appearance-based localization and mapping in a highly dynamic environment. Using position-invariant robust features (...
Aram Kawewong, Noppharit Tongprasit, Sirinart Tang...
ICPR
2008
IEEE
15 years 6 months ago
The Fourier Analysis of 2DT movement with particular reference to hand gesture recognition
This paper describes the mathematical underpinning used to analyse two dimensional movements with time using Fourier Analysis techniques. Interpreting the complex harmonic compone...
Peter R. G. Harding, Tim J. Ellis
ATMOS
2010
130views Optimization» more  ATMOS 2010»
14 years 10 months ago
Fast Detour Computation for Ride Sharing
Today’s ride sharing services still mimic a better billboard. They list the offers and allow to search for the source and target city, sometimes enriched with radial search. So...
Robert Geisberger, Dennis Luxen, Sabine Neubauer, ...
IWSEC
2010
Springer
14 years 10 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo