Sciweavers

1805 search results - page 277 / 361
» Understanding Code Mobility
Sort
View
CORR
2010
Springer
158views Education» more  CORR 2010»
14 years 8 months ago
Counting in Graph Covers: A Combinatorial Characterization of the Bethe Entropy Function
We present a combinatorial characterization of the Bethe entropy function of a factor graph, such a characterization being in contrast to the original, analytical, definition of th...
Pascal O. Vontobel
IROS
2007
IEEE
142views Robotics» more  IROS 2007»
15 years 5 months ago
GPS moving performance on open sky and forested paths
— In this paper we present a systematic study of the performance of seven different configurations of GPS on a moving vehicle using three different GPS receivers. The seven diff...
Luis Yoichi Morales Saiki, Takashi Tsubouchi
CODES
2006
IEEE
15 years 5 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
MUM
2004
ACM
170views Multimedia» more  MUM 2004»
15 years 4 months ago
Multiple embedding using robust watermarks for wireless medical images
Within the expanding paradigm of medical imaging and wireless communications there is increasing demand for transmitting diagnostic medical imagery over error-prone wireless commu...
Dominic Osborne, Derek Abbott, Matthew Sorell, Der...
SAC
2004
ACM
15 years 4 months ago
A declarative framework for adaptable applications in heterogeneous environments
In this paper we present an approach for developing adaptable software applications. The problem we are facing is that of a (possibly mobile) user who wants to download and execut...
Paola Inverardi, Fabio Mancinelli, Monica Nesi