Sciweavers

737 search results - page 39 / 148
» Generative approaches for application tailoring of mobile de...
Sort
View
ESAS
2007
Springer
13 years 12 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
DSS
2007
113views more  DSS 2007»
13 years 8 months ago
An information delivery system with automatic summarization for mobile commerce
Wireless access with handheld devices is a promising addition to the WWW and traditional electronic business. Handheld devices provide convenience and portable access to the huge ...
Christopher C. Yang, Fu Lee Wang
ICRA
2005
IEEE
156views Robotics» more  ICRA 2005»
14 years 1 months ago
Multi Robot Trajectory Generation for Single Source Explosion Parameter Estimation
— This paper addresses the problem of estimating the parameters of the advection-diffusion equation, which describes the propagation of an instantaneously released gas. A team of...
Vassilios N. Christopoulos, Stergios I. Roumelioti...
HICSS
2007
IEEE
154views Biometrics» more  HICSS 2007»
14 years 2 months ago
Gulliver-A Framework for Building Smart Speech-Based Applications
Speech recognition has matured over the past years to the point that companies can seriously consider its use. However, from a developer’s perspective we observe that speech inp...
Werner Kurschl, Stefan Mitsch, Rene Prokop, Johann...
AP2PC
2003
Springer
14 years 1 months ago
K-Trek: A Peer-to-Peer Approach to Distribute Knowledge in Large Environments
In this paper, we explore an architecture, called K-Trek, that enables mobile users to travel across knowledge distributed over large geographical areas (ranging from large public ...
Paolo Busetta, Paolo Bouquet, Giordano Adami, Matt...