Abstract--With the proliferation of handheld devices, information access on mobile devices is a topic of growing relevance. This paper presents a system that allows the user to sea...
E. Chang, Frank Seide, Helen M. Meng, Zhuoran Chen...
: Independent, heterogeneous, distributed, sometimes transient and mobile data sources produce an enormous amount of information that should be semantically integrated and filtere...
There are increasing requirements for mobile personal identification, e.g. to protect identity theft in wireless applications. Based on built-in cameras of mobile devices, palmprin...
In traditional fixed-wired networks, standard protocols like 2-Phase-Commit are used to guarantee atomicity for distributed transactions. However, within mobile networks, a highe...
- This paper describes an autonomous mobile surveillance system usually used in a factory premises with some high-rise buildings. This system consists of a wireless LAN network, a ...
Jun-ichi Meguro, Takumi Hashizume, Jun-ichi Takigu...