Sciweavers

1988 search results - page 330 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
AROBOTS
2002
113views more  AROBOTS 2002»
13 years 8 months ago
An Incremental Self-Deployment Algorithm for Mobile Sensor Networks
This paper describes an incremental deployment algorithm for mobile sensor networks. A mobile sensor network is a distributed collection of nodes, each of which has sensing, compu...
Andrew Howard, Maja J. Mataric, Gaurav S. Sukhatme
RAS
2007
102views more  RAS 2007»
13 years 8 months ago
Fast and accurate SLAM with Rao-Blackwellized particle filters
Rao-Blackwellized particle filters have become a popular tool to solve the simultaneous localization and mapping problem. This technique applies a particle filter in which each ...
Giorgio Grisetti, Gian Diego Tipaldi, Cyrill Stach...
HUC
2003
Springer
14 years 2 months ago
Finding a Place for UbiComp in the Home
The movement of design out of the workplace and into the home brings with it the need to develop new analytic concepts to consider how ubiquitous computing might relate to and supp...
Andy Crabtree, Tom Rodden, Terry Hemmings, Steve B...
CHI
2008
ACM
13 years 10 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
SAC
2006
ACM
14 years 2 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...