Sciweavers

2612 search results - page 375 / 523
» Mobile Processes and Termination
Sort
View
DIM
2005
ACM
15 years 6 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
MM
2010
ACM
185views Multimedia» more  MM 2010»
15 years 4 months ago
The virtual chocolate factory: mixed reality industrial collaboration and control
We show several aspects of a complex mixed reality system that we have built and deployed in a real-world factory setting. In our system, virtual worlds, augmented realities, and ...
Maribeth Back, Don Kimber, Eleanor G. Rieffel, Ant...
CVIU
2010
429views more  CVIU 2010»
15 years 4 months ago
Cascade of descriptors to detect and track objects across any network of cameras
Most multi-camera systems assume a well structured environment to detect and track objects across cameras. Cameras need to be fixed and calibrated, or only objects within a traini...
Alexandre Alahi, Pierre Vandergheynst, Michel Bier...
CN
2006
104views more  CN 2006»
15 years 4 months ago
Slot allocation schemes for delay sensitive traffic support in asynchronous wireless mesh networks
Heterogeneous multihop wireless networks such as wireless mesh networks consist of a set of resource-constrained mobile nodes that want to communicate with each other and a set of...
V. Vidhyashankar, B. S. Manoj, C. Siva Ram Murthy
CASES
2010
ACM
15 years 2 months ago
Resource recycling: putting idle resources to work on a composable accelerator
Mobile computing platforms in the form of smart phones, netbooks, and personal digital assistants have become an integral part of our everyday lives. Moving ahead to the future, m...
Yongjun Park, Hyunchul Park, Scott A. Mahlke, Sukj...