Sciweavers

1506 search results - page 241 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
VR
2003
IEEE
164views Virtual Reality» more  VR 2003»
14 years 2 months ago
VIS-Tracker: A Wearable Vision-Inertial Self-Tracker
We present a demonstrated and commercially viable self-tracker, using robust software that fuses data from inertial and vision sensors. Compared to infrastructurebased trackers, s...
Eric Foxlin, Leonid Naimark
ATAL
2006
Springer
14 years 14 days ago
A utility-based sensing and communication model for a glacial sensor network
This paper reports on the development of a utility-based mechanism for managing sensing and communication in cooperative multi-sensor networks. The specific application considered...
Paritosh Padhy, Rajdeep K. Dash, Kirk Martinez, Ni...
IDTRUST
2009
ACM
14 years 3 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
INFOCOM
2010
IEEE
13 years 7 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
SUTC
2010
IEEE
14 years 18 days ago
Adaptive Activity Spotting Based on Event Rates
—To date many activity spotting approaches are static: once the system is trained and deployed it does not change anymore. There are substantial shortcomings of this approach, sp...
Oliver Amft