Sciweavers

1030 search results - page 111 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
ICWMC
2006
IEEE
15 years 10 months ago
An Overview of MAC Protocols with Directional Antennas in Wireless ad hoc Networks
Although directional antennas have been used in mobile communications systems for quite a long time, realistic applications of directional or smart antennas in wireless ad hoc net...
Hongning Dai, Kam-Wing Ng, Min-You Wu
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 6 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
ICDAR
2009
IEEE
15 years 10 months ago
Scene Text Extraction Using Focus of Mobile Camera
Robust extraction of text from scene images is essential for successful scene text recognition. Scene images usually have non-uniform illumination, complex background, and existen...
Egyul Kim, SeongHun Lee, JinHyung Kim
WWW
2006
ACM
16 years 4 months ago
Temporal rules for mobile web personalization
Many systems use past behavior, preferences and environmental factors to attempt to predict user navigation on the Internet. However we believe that many of these models have shor...
Martin Halvey, Mark T. Keane, Barry Smyth
128
Voted
APWEB
2007
Springer
15 years 10 months ago
Managing a Geographic Database from Mobile Devices Through OGC Web Services
We present in this paper a system for the management of geographic databases from mobile devices. The architecture of the system is extensible in the sense that it can be adapted t...
Nieves R. Brisaboa, Miguel Rodríguez Luaces...