Sciweavers

260 search results - page 21 / 52
» Strong Mobility in Mobile Haskell
Sort
View
ESORICS
2000
Springer
14 years 2 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ADHOC
2008
101views more  ADHOC 2008»
13 years 11 months ago
Monte Carlo localization for mobile wireless sensor networks
Localization is crucial to many applications in wireless sensor networks. In this article, we propose a range-free anchorbased localization algorithm for mobile wireless sensor ne...
Aline Baggio, Koen Langendoen
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 11 months ago
SHIELD: Social sensing and Help In Emergency using mobiLe Devices
School and College campuses face a perceived threat of violent crimes and require a realistic plan against unpredictable emergencies and disasters. Existing emergency systems (e.g....
Gautam S. Thakur, Mukul Sharma, Ahmed Helmy
UAI
2003
14 years 8 days ago
The Revisiting Problem in Mobile Robot Map Building: A Hierarchical Bayesian Approach
We present an application of hierarchical Bayesian estimation to robot map building. The revisiting problem occurs when a robot has to decide whether it is seeing a previously-bui...
Benjamin Stewart, Jonathan Ko, Dieter Fox, Kurt Ko...
ISWC
1999
IEEE
14 years 3 months ago
The Conference Assistant: Combining Context-Awareness with Wearable Computing
We describe the Conference Assistant, a prototype mobile, context-aware application that assists conference attendees. We discuss the strong relationship between context-awareness...
Anind K. Dey, Daniel Salber, Gregory D. Abowd, Mas...