One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
The paper presents the self-localization approach used by the World Champion in the Sony Four-Legged Robot League 2004. The method is based on a particle filter that makes use of ...
Abstract. We present an improvement to ultrasound–based indoor location systems like Cricket [1]. By encoding and modulating the ultrasound pulses, we are able to achieve greater...
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original imag...
Abstract—Handoff procedure in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the required quality of service (QoS). We hav...