Sciweavers

2580 search results - page 416 / 516
» Systems for human-powered mobile computing
Sort
View
WCNC
2008
IEEE
15 years 10 months ago
Fluid Model of the Outage Probability in Sectored Wireless Networks
— We establish a closed form formula of the other-cell interference factor f for omni-directional and sectored cellular networks, as a function of the location of the mobile. Tha...
Jean Marc Kelif, Marceau Coupechoux, Philippe Godl...
HRI
2006
ACM
15 years 10 months ago
How may I serve you?: a robot companion approaching a seated person in a helping context
This paper presents the combined results of two studies that investigated how a robot should best approach and place itself relative to a seated human subject. Two live Human Robo...
Kerstin Dautenhahn, Michael L. Walters, Sarah Wood...
ICALT
2005
IEEE
15 years 9 months ago
Integrating Wireless Technology in Pocket Electronic Dictionary to Enhance Language Learning
We believe that with regard to the information technology applications in education, one student one computing device will be the future and long-term trend. Many related studies ...
Jen-Kai Liang, Tzu-Chien Liu, Hsue-Yie Wang, Tak-W...
ISCC
1999
IEEE
127views Communications» more  ISCC 1999»
15 years 8 months ago
A Modular Location-Aware Service and Application Platform
Location-Aware applications for supporting the mobile user as well as logistics of movable objects have proven significant relevance for future telecommunication and computing. Ba...
Tom Pfeifer, Radu Popescu-Zeletin
CN
2007
172views more  CN 2007»
15 years 4 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi