Sciweavers

7991 search results - page 1385 / 1599
» Using More Reasoning to Improve
Sort
View
JCIT
2010
185views more  JCIT 2010»
14 years 5 months ago
GPS/TDOA Hybrid Location Algorithm Based on Federal Kalman Filter
Generally, accuracy of GPS(Global Positioning System) is higher than that of cellular network. But in tall building urban area or indoor, relatively weak GPS signal makes the posi...
Cui-Xia Li, Wei-Ming Liu, Zi-Nan Fu
JDCTA
2010
125views more  JDCTA 2010»
14 years 5 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
JDCTA
2010
150views more  JDCTA 2010»
14 years 5 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
MICRO
2010
IEEE
111views Hardware» more  MICRO 2010»
14 years 5 months ago
Putting Faulty Cores to Work
Since the non-cache parts of a core are less regular, compared to on-chip caches, tolerating manufacturing defects in the processing core is a more challenging problem. Due to the ...
Amin Ansari, Shuguang Feng, Shantanu Gupta, Scott ...
PRESENCE
2010
181views more  PRESENCE 2010»
14 years 5 months ago
The Effect of Viewing a Self-Avatar on Distance Judgments in an HMD-Based Virtual Environment
Few HMD-based virtual environment systems display a rendering of the user's own body. Subjectively, this often leads to a sense of disembodiment in the virtual world. We expl...
Betty J. Mohler, Sarah H. Creem-Regehr, William B....
« Prev « First page 1385 / 1599 Last » Next »