Sciweavers

3990 search results - page 704 / 798
» The design and applications of a context service
Sort
View
IROS
2007
IEEE
250views Robotics» more  IROS 2007»
14 years 2 months ago
Multi-cue 3D object recognition in knowledge-based vision-guided humanoid robot system
— A vision based object recognition subsystem on knowledge-based humanoid robot system is presented. Humanoid robot system for real world service application must integrate an ob...
Kei Okada, Mitsuharu Kojima, Satoru Tokutsu, Toshi...
VTC
2007
IEEE
121views Communications» more  VTC 2007»
14 years 2 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud
ACSAC
2006
IEEE
14 years 2 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
COMSWARE
2006
IEEE
14 years 2 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
DATE
2006
IEEE
157views Hardware» more  DATE 2006»
14 years 2 months ago
Modeling and simulation of mobile gateways interacting with wireless sensor networks
Sensor networks are emerging wireless technologies; their integration with the existing 2.5G, 3G mobile networks is a key issue to provide advanced services, e.g., health control....
Franco Fummi, Davide Quaglia, Fabio Ricciato, Maur...