In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
A model-free, biologically-motivated learning and control algorithm called S-learning is described as implemented in an Surveyor SRV-1 mobile robot. S-learning demonstrated learni...
Brandon Rohrer, Michael Bernard, J. Daniel Morrow,...
Mobility is redefining the hardware and software fabric of distributed systems. Wireless communication allows network hosts to participate in a distributed computation while on t...
Behind-the-display interaction has gained popularity for interactions on handheld devices as researchers have demonstrated the viability of such interactions on small devices. How...
Xing-Dong Yang, Pourang Irani, Pierre Boulanger, W...
In this paper we present a sensor inter-vehicle communication protocol based on geographical routing. Sensors installed in cars continuously gather important information about: ai...