Sciweavers

147 search results - page 28 / 30
» Using mobiles for on campus location tracking
Sort
View
119
Voted
ASSETS
2008
ACM
14 years 11 months ago
Computer vision-based clear path guidance for blind wheelchair users
We describe a system for guiding blind and visually impaired wheelchair users along a clear path that uses computer vision to sense the presence of obstacles or other terrain feat...
Volodymyr Ivanchenko, James Coughlan, William Gerr...
ESAS
2006
Springer
15 years 1 months ago
Impact of Pseudonym Changes on Geographic Routing in VANETs
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and priv...
Elmar Schoch, Frank Kargl, Tim Leinmüller, St...
96
Voted
HCI
2009
14 years 7 months ago
Acquiring a Physical World and Serving Its Mirror World Simultaneously
A mirror world, which is a virtual space modeling a physical space, attracts enormous interests from VR community recently. Various applications such as Second Life, Google Earth a...
Sengpyo Hong, Jong-gil Ahn, Heedong Ko, Jinwook Ki...
CIKM
2001
Springer
15 years 2 months ago
Tempus Fugit: A System for Making Semantic Connections
Tempus Fugit (“Time Flies”) is the first of a new generation of Personal Information Management (PIM) systems. A PIM system incorporates an electronic calendar, “to-do” li...
Daniel Alexander Ford, Joann Ruvolo, Stefan Edlund...
IJNSEC
2006
134views more  IJNSEC 2006»
14 years 9 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu