Sciweavers

370 search results - page 64 / 74
» Design for Privacy in Ubiquitous Computing Environments
Sort
View
MOBIHOC
2003
ACM
14 years 7 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
FGCN
2008
IEEE
131views Communications» more  FGCN 2008»
14 years 2 months ago
Object Tracking of Mobile Robot Using Moving Color and Shape Information for the Aged Walking
A mobile robot with various types of sensors via ubiquitous networks is introduced. We designed a mobile robot composed of TCP/IP network, wireless camera and several sensors in a...
Sanghoon Kim, Sangmu Lee, Seungjong Kim
DATE
2010
IEEE
155views Hardware» more  DATE 2010»
14 years 1 months ago
Scheduling and energy-distortion tradeoffs with operational refinement of image processing
— Ubiquitous image processing tasks (such as transform decompositions, filtering and motion estimation) do not currently provide graceful degradation when their clock-cycles budg...
Davide Anastasia, Yiannis Andreopoulos
CASCON
1996
109views Education» more  CASCON 1996»
13 years 9 months ago
A system for the seamless integration of personal messages using agents developed on a lotus notes platform
We introduce a seamless messaging system for the management of personal messages. The aim of it is to intercept, filter, interpret, and deliver multi-modal messages (voice, fax, a...
Ramiro Liscano, Roger Impey, Paul Gordon, Suhayya ...
EUROSYS
2011
ACM
12 years 11 months ago
CloneCloud: elastic execution between mobile device and cloud
Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity wi...
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, May...