Sciweavers

4078 search results - page 796 / 816
» The COMPASS Location System
Sort
View
CCS
2008
ACM
13 years 12 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
ICDCS
2010
IEEE
13 years 11 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
DEXA
2006
Springer
197views Database» more  DEXA 2006»
13 years 11 months ago
Cleaning Web Pages for Effective Web Content Mining
Classifying and mining noise-free web pages will improve on accuracy of search results as well as search speed, and may benefit webpage organization applications (e.g., keyword-bas...
Jing Li, Christie I. Ezeife
DOCENG
2005
ACM
13 years 11 months ago
Generative semantic clustering in spatial hypertext
This paper presents an iterative method for generative semantic clustering of related information elements in spatial hypertext documents. The goal is to automatically organize th...
Andruid Kerne, Eunyee Koh, Vikram Sundaram, J. Mic...
PERVASIVE
2010
Springer
13 years 11 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...