Sciweavers

8468 search results - page 1355 / 1694
» The Technology of Data Stashing
Sort
View
LOCA
2009
Springer
15 years 5 months ago
Improving Location Fingerprinting through Motion Detection and Asynchronous Interval Labeling
Abstract. Wireless signal strength fingerprinting has become an increasingly popular technique for realizing indoor localization systems using existing WiFi infrastructures. Howev...
Philipp Bolliger, Kurt Partridge, Maurice Chu, Mar...
MDM
2009
Springer
201views Communications» more  MDM 2009»
15 years 5 months ago
OntoMobiLe: A Generic Ontology-Centric Service-Oriented Architecture for Mobile Learning
Creation of pedagogical learning models to handle the specificity of mobile learning and the inherent constraints of mobile devices is a fundamental challenge in mobile learning. ...
Keng Y. Yee, Wee Tiong Ang, Flora S. Tsai, Rajaram...
MKM
2009
Springer
15 years 5 months ago
A Linear Grammar Approach to Mathematical Formula Recognition from PDF
Many approaches have been proposed over the years for the recognition of mathematical formulae from scanned documents. More recently a need has arisen to recognise formulae from PD...
Josef B. Baker, Alan P. Sexton, Volker Sorge
NBIS
2009
Springer
15 years 5 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
QUACON
2009
Springer
15 years 5 months ago
A Context Quality Model to Support Transparent Reasoning with Uncertain Context
Much research on context quality in context-aware systems divides into two strands: (1) the qualitative identication of quality measures and (2) the use of uncertain reasoning tec...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon Dobso...
« Prev « First page 1355 / 1694 Last » Next »