Sciweavers

1152 search results - page 86 / 231
» mobility 2009
Sort
View
102
Voted
NETWORK
2007
93views more  NETWORK 2007»
15 years 3 days ago
Modeling VoIP Call Holding Times for Telecommunications
Voice over IP is one of the most popular applications in broadband access networks. It is anticipated that the characteristics of call holding times (CHTs) for VoIP calls will be ...
Whai-En Chen, Hui-Nien Hung, Yi-Bing Lin
128
Voted
IROS
2009
IEEE
166views Robotics» more  IROS 2009»
15 years 7 months ago
Independent navigation of multiple mobile robots with hybrid reciprocal velocity obstacles
Abstract— We present an approach for smooth and collisionfree navigation of multiple mobile robots amongst each other. Each robot senses its surroundings and acts independently w...
Jamie Snape, Jur P. van den Berg, Stephen J. Guy, ...
120
Voted
ACMACE
2009
ACM
15 years 1 months ago
Developing multiplayer pervasive games and networked interactive installations using ad hoc mobile sensor nets
We here present Fun in Numbers (FinN), a framework for developing pervasive applications and interactive installations for entertainment and educational purposes. Using ad hoc mob...
Orestis Akribopoulos, Marios Logaras, Nikos Vasila...
112
Voted
ICC
2009
IEEE
136views Communications» more  ICC 2009»
15 years 7 months ago
Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks
—The connected dominating set (CDS) has been commonly used for routing and broadcast in mobile ad hoc networks (MANETs). Considering the applications of MANETs, it is generally p...
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku
MHCI
2009
Springer
15 years 7 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi