Sciweavers

1880 search results - page 321 / 376
» Mobile Application Profiling for Connected Mobile Devices
Sort
View
179
Voted
MOBIDE
2006
ACM
15 years 10 months ago
Towards correcting input data errors probabilistically using integrity constraints
Mobile and pervasive applications frequently rely on devices such as RFID antennas or sensors (light, temperature, motion) to provide them information about the physical world. Th...
Nodira Khoussainova, Magdalena Balazinska, Dan Suc...
144
Voted
JUCS
2010
186views more  JUCS 2010»
15 years 3 months ago
Context Awareness for Collaborative Learning with Uncertainty Management
: In Collaborative Learning, groups of students work together using traditional and computer-based tools or applications. Participants are continuously moving and reorganizing in g...
Roc Messeguer, Leandro Navarro, Pedro Damiá...
GIS
2007
ACM
16 years 5 months ago
Topological maps from signals
We discuss the task of reconstructing the topological map of an environment based on the sequences of locations visited by a mobile agent ? this occurs in systems neuroscience, wh...
Yu. Dabaghian, Anthony G. Cohn, L. Frank
MOBIHOC
2004
ACM
16 years 4 months ago
Locating cache proxies in manets
Caching Internet based services is a potentially important application for MANETs, as it can improve mobile users' perceived quality of service, reduce their energy consumpti...
Roy Friedman, Maria Gradinariu, Gwendal Simon
164
Voted
DCOSS
2005
Springer
15 years 10 months ago
Analysis of Target Detection Performance for Wireless Sensor Networks
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...