Sciweavers

737 search results - page 90 / 148
» Generative approaches for application tailoring of mobile de...
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
ICRA
2008
IEEE
149views Robotics» more  ICRA 2008»
14 years 2 months ago
Single camera vision-only SLAM on a suburban road network
—Simultaneous Localization And Mapping (SLAM) is one of the major challenges in mobile robotics. Probabilistic techniques using high-end range finding devices are well establishe...
Michael Milford, Gordon Wyeth
WSC
2007
13 years 10 months ago
Towards a conceptual framework for visual analytics of time and time-oriented data
Time is an important data dimension with distinct characteristics that is common across many application domains. This demands specialized methods in order to support proper analy...
Wolfgang Aigner, Alessio Bertone, Silvia Miksch, C...
INFOCOM
2003
IEEE
14 years 1 months ago
Integration of 802.11 and Third-Generation Wireless Data Networks
Abstract— The third-generation (3G) wide area wireless networks and 802.11 local area wireless networks possess complementary characteristics. 3G networks promise to offer always...
Milind M. Buddhikot, Girish P. Chandranmenon, Seun...
MOBICOM
2006
ACM
14 years 2 months ago
Analysis and implications of student contact patterns derived from campus schedules
Characterizing mobility or contact patterns in a campus environment is of interest for a variety of reasons. Existing studies of these patterns can be classified into two basic a...
Vikram Srinivasan, Mehul Motani, Wei Tsang Ooi