Sciweavers

3016 search results - page 556 / 604
» Disappearing mobile devices
Sort
View
ADT
2010
13 years 7 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
CGF
2008
153views more  CGF 2008»
13 years 7 months ago
Context Aware Terrain Visualization for Wayfinding and Navigation
To assist wayfinding and navigation, the display of maps and driving directions on mobile devices is nowadays commonplace. While existing system can naturally exploit GPS informat...
Sebastian Möser, Patrick Degener, Roland Wahl...
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 7 months ago
Discovery of Convoys in Trajectory Databases
As mobile devices with positioning capabilities continue to proliferate, data management for so-called trajectory databases that capture the historical movements of populations of...
Hoyoung Jeung, Man Lung Yiu, Xiaofang Zhou, Christ...
CORR
2010
Springer
91views Education» more  CORR 2010»
13 years 7 months ago
Fundamental Limits of Wideband Localization - Part II: Cooperative Networks
The availability of positional information is of great importance in many commercial, governmental, and military applications. Localization is commonly accomplished through the use...
Yuan Shen, Henk Wymeersch, Moe Z. Win
CORR
2008
Springer
97views Education» more  CORR 2008»
13 years 7 months ago
Voice-controlled Debugging of Spreadsheets
Developments in Mobile Computing are putting pressure on the software industry to research new modes of interaction that do not rely on the traditional keyboard and mouse combinat...
Derek Flood, Kevin McDaid