2013
DOI: 10.1007/978-3-642-40238-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Smartphone Sensor Reliability for Augmented Reality Applications

Abstract: With increasing reliance on the location and orientation sensors in smartphones for not only augmented reality applications, but also for meeting government-mandated emergency response requirements, the reliability of these sensors is a matter of great importance. Previous studies measure the accuracy of the location sensing, typically GPS, in handheld devices including smartphones, but few studies do the same for the compass or gyroscope (gyro) sensors, especially in real-world augmented reality situations. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
40
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(41 citation statements)
references
References 17 publications
(17 reference statements)
1
40
0
Order By: Relevance
“…A detailed overview of mobile device sensors and their calibration, error sources and error margins is available in the literature (Blum et al, 2013).…”
Section: Mobile Sensor Orientation Estimatementioning
confidence: 99%
“…A detailed overview of mobile device sensors and their calibration, error sources and error margins is available in the literature (Blum et al, 2013).…”
Section: Mobile Sensor Orientation Estimatementioning
confidence: 99%
“…[44]. In a detailed experiment on the accuracy of GPS sensors installed on mobile devices, Blum et al show that the location is reported with a precision varying from 10 to 60 meters, depending on the device orientation and type, and, in cities, on the surrounding buildings [3]. Hence, when designing a system based on mobile devices it would reasonable to consider regions with sides tens of meters long.…”
Section: Spatial Representationmentioning
confidence: 99%
“…2 Paul sends to Ursula the encryption of the precomputed SBF Enc b # , the set of k hash functions H, the value m and the conventional grid E. 3 At regular time intervals, or when required by the specific application, Ursula determines her geographic position and selects the corresponding grid region eu ∈ E. Then, following Algorithm 2 and using the values and functions shared by Paul, she builds a spatial Bloom filter b # u over {eu} and counts the number z of values equal to 1 therein. 4 Ursula computes e # = Enc b # b # u using the homomorphic properties of the encryption scheme (Algorithm 1).…”
Section: Two-party Scenariomentioning
confidence: 99%
“…2 Paul sends to Olga the encryption of the precomputed spatial Bloom filter Enc b # and the value m. Then, Paul sends to the user Ursula the set of k hash functions H and the conventional grid E. 3 At regular time intervals, or when required by the specific application, Ursula determines her geographic position and selects the corresponding grid region eu ∈ E. Then, she computes the values {v1, . .…”
Section: Security Analysismentioning
confidence: 99%