Sciweavers

2394 search results - page 439 / 479
» Implementing Mobile Haskell
Sort
View
ICRA
2010
IEEE
119views Robotics» more  ICRA 2010»
13 years 6 months ago
Evader surveillance under incomplete information
— This paper is concerned with determining whether a mobile robot, called the pursuer, is up to maintaining visibility of an antagonist agent, called the evader. This problem, a ...
Israel Becerra, Rafael Murrieta-Cid, Raul Monroy
INFOCOM
2010
IEEE
13 years 6 months ago
Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for Localization
—Knowing accurate positions of nodes in wireless ad-hoc and sensor networks is essential for a wide range of pervasive and mobile applications. However, errors are inevitable in ...
Lirong Jian, Zheng Yang, Yunhao Liu
INFOCOM
2010
IEEE
13 years 6 months ago
SparseTrack: Enhancing Indoor Pedestrian Tracking with Sparse Infrastructure Support
Abstract—Accurate indoor pedestrian tracking has wide applications in the healthcare, retail, and entertainment industries. However, existing approaches to indoor tracking have v...
Yunye Jin, Mehul Motani, Wee-Seng Soh, Juanjuan Zh...
INFOCOM
2010
IEEE
13 years 6 months ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen
ITIIS
2010
265views more  ITIIS 2010»
13 years 6 months ago
A Recommender System for Device Sharing Based on Context-Aware and Personalization
In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service wh...
Jong-Hyun Park