Mobile users need lightweight devices with low energy consumption. When applications are executed on remote servers instead of locally on the end-user's device, the weight of...
Pieter Simoens, Lien Deboosere, Davy De Winter, Fi...
- To overcome shortcomings of Exact Matching Method (EMM) and Substitute Description Method (SDM), an Inexact Matching Method Based on Ontology and Semantic Distance (OSDIMM) is in...
- The use of a PDA with ad-hoc built-in information retrieval functionalities can help people in visiting an historical site in a natural manner instead of traditional audio/visual...
Antonella Santangelo, Agnese Augello, Antonio Gent...
- Quality control is crucial to the success of any business and organization. Due to the ever-increasing complexity and mission-critical nature of quality control, development, dep...
- Real-time speaker verification, with speech acquired using the NIST Mk-III microphone array and an autodirective beamforming algorithm, is demonstrated. The software and hardware...
Gang Mei, Roger Xu, Debang Lao, Chiman Kwan, Vince...
- MIT Technology Review lists sensor networks as one of "Ten Emerging Technologies That Will Change the World" [1]. This paper describes three lab exercises that are suit...
Jens Mache, Chris Allick, John Charnas, Alex Hickm...
- Despite the importance of seamless connectivity in ubiquitous computing, research for seamless connectivity is not considered properly. To provide seamless connectivity, this pap...
Tae-Hoon Kang, Chung-Pyo Hong, Yong-Seok Kim, Shin...
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Abstract - Recent advances in multimedia network systems have led to the development of a new generation of applications that associate the use of various multimedia objects. The c...