Sciweavers

6781 search results - page 1320 / 1357
» Processors for Mobile Applications
Sort
View
CIVR
2009
Springer
583views Image Analysis» more  CIVR 2009»
14 years 7 months ago
Mining from Large Image Sets
So far, most image mining was based on interactive querying. Although such querying will remain important in the future, several applications need image mining at such wide scale...
Luc J. Van Gool, Michael D. Breitenstein, Stephan ...
MSWIM
2009
ACM
14 years 2 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
COMPSAC
2009
IEEE
14 years 2 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
IROS
2009
IEEE
185views Robotics» more  IROS 2009»
14 years 2 months ago
Scalable and convergent multi-robot passive and active sensing
— A major barrier preventing the wide employment of mobile networks of robots in tasks such as exploration, mapping, surveillance, and environmental monitoring is the lack of efï...
Elias B. Kosmatopoulos, Lefteris Doitsidis, Konsta...
MOBIDE
2009
ACM
14 years 2 months ago
Toward context and preference-aware location-based services
The explosive growth of location-detection devices, wireless communications, and mobile databases has resulted in the realization of location-based services as commercial products...
Mohamed F. Mokbel, Justin J. Levandoski
« Prev « First page 1320 / 1357 Last » Next »