The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Location-based services are growing in popularity due to the ubiquity of smartphone users. The relevance of location-based query results is very important, especially for mobile phones with limited screen size. Location-based data frequently changes; this introduces challenges in indexing and ranking places. The growing popularity of mobile social networks, such as Twitter, FourSquare and Facebook...
The concept of symbiotic displays covers the opportunistic pairing of mobile devices with screen devices that can be discovered and controlled across a network. Mobile applications that use symbiotic displays can offer the user an improved experience, but the lack of a widely deployed infrastructure means that the concept has seen little use. We design and implement a solution for using DLNA playback...
Passive RFID tags have been widely utilized for object tracking in indoor environment due to their low cost and convenience for deployment. The RFID readings gathered from real world are often noisy. Existing approaches for tracking objects with noisy RFID readings are mostly based on using Particle Filter (PF). However, continuous execution of particle filter will suffer from high computational cost...
In this paper, we propose a novel efficient dataflow execution method for mobile context monitoring applications. As a key approach to minimize the execution overhead, we propose a new dataflow execution model, producer-oriented model. Compared to the conventional consumer-oriented model adopted in stream processing engines, our model significantly reduces execution overhead to process context monitoring...
Many RFID tags store valuable information privy to their users that can easily be subject to unauthorized reading, leading to owner tracking or impersonation. RFID tags are also susceptible to different forms of relay attacks. This paper presents novel sensing-enabled defenses to unauthorized reading and relay attacks against RFID systems without necessitating any changes to the traditional RFID usage...
A warm welcome to the Tenth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2012). We are very excited to introduce you to the technical program of our conference that this year includes 28 papers representing high-quality research conducted over the broad spectrum of topics related to pervasive computing.
On behalf of the entire Organization Committee, it is our pleasure to welcome you to the Tenth IEEE International Conference on Pervasive Computing and Communications (PerCom 2012), sponsored by IEEE Computer Society, the University of Texas at Arlington (UTA), and the City of Lugano. The proceedings that you are reading confirm the high quality tradition of PerCom that makes this conference one of...
Reputation systems rate the contributions to participatory sensing campaigns from each user by associating a reputation score. The reputation scores are used to weed out incorrect sensor readings. However, an adversary can deanonmyize the users even when they use pseudonyms by linking the reputation scores associated with multiple contributions. Since the contributed readings are usually annotated...
Model-driven data acquisition techniques aim at reducing the amount of data reported, and therefore the energy consumed, in wireless sensor networks (WSNs). At each node, a model predicts the sampled data; when the latter deviate from the current model, a new model is generated and sent to the data sink. However, experiences in real-world deployments have not been reported in the literature. Evaluation...
More and more mobile devices, such as smartphones and pad/tab devices, are being used in IEEE 802.11 Wireless LANs (or Wi-Fi). However, mobile users are currently unsatisfied with using Wi-Fi on the move due to large handoff delay. In order to perform fast handoff, this paper proposes a new scheme using a geomagnetic sensor (or a digital compass) embedded in mobile devices. The proposed scheme predicts...
The advent of smart phones has enabled health care anywhere and anytime. With pervasive health care, a person can perform necessary day to day tasks while his health is recorded, controlled, and processed continuously using on body sensors and actuators to capture abnormalities, trends, and causes. In such a scenario, seamless operation of the pervasive health management system (PHMS), given dynamic...
Participatory sensing (PS) systems rely on the willingness of mobile users to participate in the collection and reporting of data using a variety of sensors either embedded or integrated in their cellular phones. However, this new data collection paradigm has not been very successful yet mainly because of the lack of incentives for participation. Although several incentive schemes have been proposed...
Cooperative trajectory mapping is an emerging technique that allows users to create a map by using data collected from each participant's mobile phones. Unlike the traditional localization problem, where GPS is usually required, cooperative mapping only requires information about the relative distance and direction from the previously reported position. In this paper, we consider the problem of measurement...
Indoor localization based on signal strength fingerprinting has received significant attention from the community. This method is attractive because it does not require complex hardware beyond a simple radio transmitter. However, its main limitation is the inaccuracy caused by the variability of the signal strength. When applied to the localization of people, the signal variability can be attributed...
WLAN Device-free passive (DfP) indoor localization is an emerging technology enabling the localization of entities that do not carry any devices nor participate actively in the localization process using the already installed wireless infrastructure. This technology is useful for a variety of applications such as intrusion detection, smart homes and border protection. We present the design, implementation...
A mobility model is an essential requirement in accurately predicting an individual's future location. While extensive studies have been conducted to predict human mobility, previous work used coarse-grained mobility data with limited ability to capture human movements at a fine-grained level. In this paper, we empirically analyze several mobility models for predicting temporal behavior of an individual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.