Sciweavers

635 search results - page 119 / 127
» Mobile manipulation using tracks of a tracked mobile robot
Sort
View
SPW
2005
Springer
14 years 2 months ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 9 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
AICCSA
2007
IEEE
209views Hardware» more  AICCSA 2007»
14 years 1 months ago
LBS and GIS Technology Combination and Applications
Location Based Services (LBSs) provide personalized services to the subscribers based on their current position using Global Navigation Satellite System (GNSS), Geographic Informa...
Balqies Sadoun, Omar Al-Bayari
AUGHUMAN
2010
13 years 7 months ago
Aided eyes: eye activity sensing for daily life
Our eyes collect a considerable amount of information when we use them to look at objects. In particular, eye movement allows us to gaze at an object and shows our level of intere...
Yoshio Ishiguro, Adiyan Mujibiya, Takashi Miyaki, ...
SIGMOD
2008
ACM
150views Database» more  SIGMOD 2008»
14 years 9 months ago
Ranking queries on uncertain data: a probabilistic threshold approach
Uncertain data is inherent in a few important applications such as environmental surveillance and mobile object tracking. Top-k queries (also known as ranking queries) are often n...
Ming Hua, Jian Pei, Wenjie Zhang, Xuemin Lin