Sciweavers

1958 search results - page 212 / 392
» Adaptive Mobile Guides
Sort
View
CCS
2001
ACM
15 years 9 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
SENSYS
2010
ACM
15 years 2 months ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...
AROBOTS
2008
158views more  AROBOTS 2008»
15 years 4 months ago
Learning traversability models for autonomous mobile vehicles
Autonomous mobile robots need to adapt their behavior to the terrain over which they drive, and to predict the traversability of the terrain so that they can effectively plan thei...
Michael Shneier, Tommy Chang, Tsai Hong, William P...
AAAI
2004
15 years 5 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
CHI
1999
ACM
15 years 8 months ago
Nomadic Radio: Scaleable and Contextual Notification for Wearable Audio Messaging
Mobile workers need seamless access to communication and information services on portable devices. However current solutions overwhelm users with intrusive and ambiguous notificat...
Nitin "Nick" Sawhney, Chris Schmandt