Sciweavers

561 search results - page 66 / 113
» Disconnected Operations in Mobile Environments
Sort
View
MOBICOM
1996
ACM
15 years 7 months ago
Building Reliable Mobile-Aware Applications Using the Rover Toolkit
This paper discusses extensions to the Rover toolkit for constructing reliable mobile-aware applications. The extensions improve upon the existing failure model, which only addres...
Anthony D. Joseph, M. Frans Kaashoek
163
Voted
MTA
2008
132views more  MTA 2008»
15 years 3 months ago
Peer to peer video streaming in Bluetooth overlays
As Bluetooth is available in most personal and portable terminals (eg, cellular phone, PDA, videocamera, laptop, etc) P2P video streaming through Bluetooth networks is now a reali...
Sewook Jung, Alexander Chang, Mario Gerla
144
Voted
IROS
2009
IEEE
141views Robotics» more  IROS 2009»
15 years 10 months ago
Robust on-line model-based object detection from range images
— A mobile robot that accomplishes high level tasks needs to be able to classify the objects in the environment and to determine their location. In this paper, we address the pro...
Bastian Steder, Giorgio Grisetti, Mark Van Loock, ...
TMC
2012
13 years 5 months ago
Message Drop and Scheduling in DTNs: Theory and Practice
Abstract—In order to achieve data delivery in Delay Tolerant Networks (DTN), researchers have proposed the use of store-carryand-forward protocols: a node there may store a messa...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...
153
Voted
EUROSYS
2011
ACM
14 years 7 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...