


default search action
5th PerCom 2007: White Plains, New York, USA
- Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 19-23 March 2007, White Plains, New York, USA. IEEE Computer Society 2007, ISBN 978-0-7695-2787-1

RFID
- Chiu C. Tan, Bo Sheng

, Qun Li
:
Severless Search and Authentication Protocols for RFID. 3-12 - Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. Ni:

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. 13-22 - Vinod Namboodiri, Lixin Gao:

Energy-Aware Tag Anti-Collision Protocols for RFID Systems. 23-36
Best Papers
- Yunhao Liu, Lei Chen

, Jian Pei
, Qiuxia Chen, Yiyang Zhao:
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays. 37-46 - Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki Cho, Mario Gerla:

BlueTorrent: Cooperative Content Sharing for Bluetooth Users. 47-56 - Sanem Kabadayi, Christine Julien

:
A Local Data Abstraction and Communication Paradigm for Pervasive Computing. 57-68
Middleware and Applications
- Paolo Costa, Geoff Coulson, Richard Gold, Manish Lad, Cecilia Mascolo, Luca Mottola

, Gian Pietro Picco, Thirunavukkarasu Sivaharan, Nirmal Weerasinghe, Stefanos Zachariadis:
The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario. 69-78 - Matthias Kranz

, Wolfgang Spiessl, Albrecht Schmidt
:
Designing Ubiquitous Computing Systems for Sports Equipment. 79-86 - Marco Mamei

, Radhika Nagpal
:
Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection. 87-96
Application Design and Development
- Albrecht Schmidt

, Lucia Terrenghi:
Methods and Guidelines for the Design and Development of Domestic Ubiquitous Computing Applications. 97-107 - Mark J. Weal, Don Cruickshank, Danius T. Michaelides, Katherine Howland

, Geraldine Fitzpatrick:
Supporting Domain Experts in Creating Pervasive Experiences. 108-113 - Jennifer Munnelly, Serena Fritsch, Siobhán Clarke

:
An Aspect-Oriented Approach to the Modularisation of Context. 114-124
Localization and its Applications
- Alex Varshavsky, Anthony LaMarca, Jeffrey Hightower, Eyal de Lara:

The SkyLoc Floor Localization System. 125-134 - Dian Zhang, Jian Ma, Quanbin Chen, Lionel M. Ni:

An RF-Based System for Tracking Transceiver-Free Objects. 135-144 - Thomas King, Thomas Haenselmann, Stephan Kopf, Wolfgang Effelsberg:

Overhearing the Wireless Interface for 802.11-Based Positioning Systems. 145-150 - Xiaojing Xiang, Xin Wang:

A Scalable Geographic Service Provision Framework for Mobile Ad Hoc Networks. 151-160
End-User Experience
- Sebastian Boring, Otmar Hilliges

, Andreas Butz:
A Wall-Sized Focus Plus Context Display. 161-170 - Raphael Wimmer

, Matthias Kranz
, Sebastian Boring, Albrecht Schmidt
:
A Capacitive Sensing Toolkit for Pervasive Activity Detection and Recognition. 171-180 - Frank Siegemund, Muhammad Haroon:

Using Digital Cameras for Text Input on Mobile Devices. 181-190
Security
- Nalin Subramanian, Chanjun Yang, Wensheng Zhang:

Securing Distributed Data Storage and Retrieval in Sensor Networks. 191-200 - Wenbo He

, Ying Huang, Klara Nahrstedt, Whay Chiou Lee:
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks. 201-210 - Leonid Bolotnyy, Gabriel Robins:

Physically Unclonable Function-Based Security and Privacy in RFID Systems. 211-220
Data Management and Usage
- Fahd Albinali, Nigel Davies

, Adrian Friday
:
Structural Learning of Activities from Sparse Datasets. 221-228 - Gabriella Castelli, Alberto Rosi

, Marco Mamei
, Franco Zambonelli
:
A Simple Model and Infrastructure for Context-Aware Browsing of the World. 229-238 - Yu Huang, Jiannong Cao

, Zhijun Wang, Beihong Jin, Yulin Feng:
Achieving Flexible Cache Consistency for Pervasive Internet Access. 239-250
Interacting with the User
- Olufisayo Omojokun, Prasun Dewan:

Automatic Generation of Device User-Interfaces? 251-261 - Gregor Broll, Sven Siorpaes, Enrico Rukzio, Massimo Paolucci, John Hamard, Matthias Wagner, Albrecht Schmidt

:
Supporting Mobile Service Usage through Physical Mobile Interaction. 262-271 - Enrique Soriano

, Francisco J. Ballesteros, Gorka Guardiola Muzquiz
:
SHAD: A Human-Centered Security Architecture for the Plan B Operating System. 272-282

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














