


default search action
Personal and Ubiquitous Computing, Volume 22
Volume 22, Number 1, February 2018
- Cheonshik Kim, Bryan Kim, Joel J. P. C. Rodrigues, James C. N. Yang:

Special issue: Advanced technology for smart home automation and entertainment. 1-2 - Namje Park, Donghyeok Lee:

Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment. 3-10 - Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang:

Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. 11-22 - Seongkee Lee, Sanghoon Lee, Taein Kang, Miyoung Kwon, Nohbok Lee, Hoon-Kyu Kim:

Resiliency of mobile OS security for secure personal ubiquitous computing. 23-34 - Yong-Joon Lee

, Namkyun Baik, Cheonshik Kim, Ching-Nung Yang:
Study of detection method for spoofed IP against DDoS attacks. 35-44 - Cheng-Yu Yang, Cheng-Ta Huang, Ya-Ping Wang, Yen-Wen Chen, Shiuh-Jeng Wang:

File changes with security proof stored in cloud service systems. 45-53 - Da-Zhi Sun

, Yi Mu, Willy Susilo
:
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. 55-67 - Da-Zhi Sun

, Yi Mu, Willy Susilo
:
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. 69 - Jing Sang

, Hongxia Wang, Qing Qian, Hanzhou Wu
, Yi Chen
:
An efficient fingerprint identification algorithm based on minutiae and invariant moment. 71-80 - Peng-Cheng Huang, Alan Chin-Chen Chang

, Yung-Hui Li, Yanjun Liu:
Efficient access control system based on aesthetic QR code. 81-91 - Lu Leng, Fumeng Gao, Qi Chen, Cheonshik Kim:

Palmprint recognition system on mobile devices with double-line-single-point assistance. 93-104 - Byung Wook Kim:

Suboptimal LED selection for distributed MIMO visible light communications. 105-110 - Xiaodong Liu, Qi Liu

:
A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system. 111-120 - Jie Zhang, Zhili Zhou, Shu Li, Leilei Gan, Xuyun Zhang

, Lianyong Qi, Xiaolong Xu
, Wanchun Dou:
Hybrid computation offloading for smart home automation in mobile cloud computing. 121-134 - Tae-Jung Kim, Chang-Ki Kim, Byung-Gyu Kim

:
An efficient hybrid delivery technology for a broadcast TV service. 135-141 - Doowon Kim, Jinsuk Baek

, Paul S. Fisher, Sangchul Kim:
fFTP: a fast file transfer protocol for home N-screen platform. 143-152 - Min Lei, Yu Yang, Nan Ma, Huizhong Sun

, Chunru Zhou, Minyao Ma:
Dynamically enabled defense effectiveness evaluation of a home Internet based on vulnerability analysis and attack layer measurement. 153-162 - Avishek Saha, Young-Woon Lee

, Young-Sup Hwang, Kostas E. Psannis
, Byung-Gyu Kim
:
Context-aware block-based motion estimation algorithm for multimedia internet of things (IoT) platform. 163-172 - Nam-Uk Kim, Yung-Lyul Lee

:
Blocking-artifact detection in frequency domain for frame-rate up-conversion. 173-184 - Pradeep Kumar

, Rajkumar Saini, Partha Pratim Roy
, Pawan Kumar Sahu, Debi Prosad Dogra:
Envisioned speech recognition using EEG sensors. 185-199 - Yunjin Nam, Dongkyoo Shin, Dongil Shin:

Personal search system based on android using lifelog and machine learning. 201-218 - Paul S. Fisher, Jimmy James II, Jinsuk Baek

, Cheonshik Kim:
Mining intelligent solution to compensate missing data context of medical IoT devices. 219-224
Volume 22, Number 2, April 2018
- Guglielmo Cola

, Alessio Vecchio:
Wearable systems for e-health and wellbeing. 225 - Antonio L. Alfeo

, Paolo Barsocchi, Mario G. C. A. Cimino, Davide La Rosa, Filippo Palumbo
, Gigliola Vaglini:
Sleep behavior assessment via smartwatch and stigmergic receptive fields. 227-243 - Saumil Dharia, Magdalini Eirinaki

, Vijesh Jain, Jvalant Patel, Iraklis Varlamis
, Jainikkumar Vora, Rizen Yamauchi:
Social recommendations for personalized fitness assistance. 245-257 - Yinlong Zhang, Wei Liang, Yang Li, Haibo An, Jindong Tan

:
Robust orientation estimate via inertial guided visual sample consensus. 259-274 - Wen-Fong Wang, Ching-Yu Yang, Yan-Fu Wu:

SVM-based classification method to identify alcohol consumption using ECG and PPG monitoring. 275-287
- Alan Chamberlain

, Andy Crabtree
, Hamed Haddadi, Richard Mortier:
Special theme on privacy and the Internet of things. 289-292 - Peter Tolmie

, Andy Crabtree
:
The practical politics of sharing personal data. 293-315 - Lachlan Urquhart

, Neelima Sailaja
, Derek McAuley
:
Realising the right to data portability for the domestic Internet of things. 317-332 - Thomas F. J.-M. Pasquier

, Jatinder Singh, Julia E. Powles
, David M. Eyers
, Margo I. Seltzer, Jean Bacon:
Data provenance to audit compliance with privacy policy in the Internet of Things. 333-344 - Ilaria Torre, Odnan Ref Sanchez, Frosina Koceva, Giovanni Adorni:

Supporting users to take informed decisions on privacy settings of personal devices. 345-364 - Joseph Korpela, Takuya Maekawa:

Privacy preserving recognition of object-based activities using near-infrared reflective markers. 365-377
- Caroline L. van Straten, Iris Smeekens, Emilia I. Barakova

, Jeffrey Glennon
, Jan K. Buitelaar, Aoju Chen
:
Effects of robots' intonation and bodily appearance on robot-mediated communicative treatment outcomes for children with autism spectrum disorder. 379-390 - Thilina Halloluwa

, Dhaval Vyas
, Hakim Usoof
, K. Priyantha Hewagamage:
Gamification for development: a case of collaborative learning in Sri Lankan primary schools. 391-407 - Haeyong Chung

, Chris North:
SAViL: cross-display visual links for sensemaking in display ecologies. 409-431 - Mohammad Hossein Jarrahi, Nicci C. L. Gafinowitz, Grace Shin:

Activity trackers, prior motivation, and perceived informational and motivational affordances. 433-448
Volume 22, Number 3, June 2018
- Yunchuan Sun, Junsheng Zhang, Rongfang Bie, Jiguo Yu:

Advancing researches on IoT systems and intelligent applications. 449-452 - Jinbao Wang, Zhipeng Cai

, Yingshu Li
, Donghua Yang, Ji Li, Hong Gao:
Protecting query privacy with differentially private k-anonymity in location-based services. 453-469 - Junling Lu, Zhipeng Cai

, Xiaoming Wang, Lichen Zhang, Peng Li, Zaobo He:
User social activity-based routing for cognitive radio networks. 471-487 - Shiwei Cheng

, Jing Fan, Anind K. Dey:
Smooth Gaze: a framework for recovering tasks across devices using eye tracking. 489-501 - Yi Du

, Lei Ren, Yuanchun Zhou, Jianhui Li, Feng Tian, Guozhong Dai:
Banded choropleth map. 503-510 - Yingwei Zhang, Yiqiang Chen

, Hanchao Yu, Xiaodong Yang, Wang Lu, Hong Liu:
Wearing-independent hand gesture recognition method based on EMG armband. 511-524 - Lu Wang, Lai-Kuan Wong

, Yajie Xu, Xiao Zhou, Siyuan Qiu, Xiangxu Meng, Chenglei Yang:
The design and empirical evaluations of 3D positioning techniques for pressure-based touch control on mobile devices. 525-533 - Anton Kos, Anton Umek:

Smart sport equipment: SmartSki prototype for biofeedback applications in skiing. 535-544 - Shaoqing Wang, Jiguo Yu, Mohammed Atiquzzaman

, Honglong Chen, Lina Ni:
CRPD: a novel clustering routing protocol for dynamic wireless sensor networks. 545-559 - Gangyong Jia, Guangjie Han

, Jinfang Jiang, Sammy Chan, Yuxin Liu:
Dynamic cloud resource management for efficient media applications in mobile computing environments. 561-573 - Yunchuan Sun, Mengting Fang

, Xinyu Wang:
A novel stock recommendation system using Guba sentiment analysis. 575-587 - Jianen Yan, Hongli Zhang, Haiyan Xu

, Zhaoxin Zhang:
Discrete PSO-based workload optimization in virtual machine placement. 589-596 - Haodi Ping, Zhangbing Zhou, Zhensheng Shi, Taj Rahman Siddiqi:

Accurate and energy-efficient boundary detection of continuous objects in duty-cycled wireless sensor networks. 597-613 - Rashid Mehmood

, Saeed El-Ashram
, Rongfang Bie, Yunchuan Sun:
Effective cancer subtyping by employing density peaks clustering by using gene expression microarray. 615-619
Volume 22, Number 4, August 2018
- Ofer Bergman

, Nimrod Yanai
:
Personal information retrieval: smartphones vs. computers, emails vs. files. 621-632 - Katrin Plaumann, Matthias Weing, Christian Winkler, Michael Müller, Enrico Rukzio:

Towards accurate cursorless pointing: the effects of ocular dominance and handedness. 633-646 - Luis Valente

, Bruno Feijó
, Julio César Sampaio do Prado Leite
, Esteban Clua:
A method to assess pervasive qualities in mobile games. 647-670 - Elena Vildjiounaite

, Johanna Kallio, Vesa Kyllönen, Mikko Nieminen, Ilmari Määttänen, Mikko Lindholm, Jani Mäntyjärvi
, Georgy L. Gimel'farb:
Unobtrusive stress detection on the basis of smartphone usage data. 671-688 - Elena Vildjiounaite, Johanna Kallio, Vesa Kyllönen, Mikko Nieminen, Ilmari Määttänen, Mikko Lindholm, Jani Mäntyjärvi

, Georgy L. Gimel'farb:
Correction to: Unobtrusive stress detection on the basis of smartphone usage data. 689 - Lisa Thomas

, Elaine Farrow
, Matthew P. Aylett
, Pam Briggs
:
A life story in three parts: the use of triptychs to make sense of personal digital data. 691-705 - Tim Walton

, Michael Evans, David Stanley Kirk
, Frank Melchior:
Exploring object-based content adaptation for mobile audio. 707-720 - Tim Walton, Michael Evans, David Stanley Kirk

, Frank Melchior:
Correction to: Exploring object-based content adaptation for mobile audio. 721 - Aaron Springer

, Victoria Hollis, Steve Whittaker:
Mood modeling: accuracy depends on active logging and reflection. 723-737 - Kher Hui Ng

, Hai Huang, Claire O'Malley:
Treasure codes: augmenting learning from physical museum exhibits through treasure hunting. 739-750 - Alessio Bellino

:
SEQUENCE: a remote control technique to select objects by matching their rhythm. 751-770 - Marco Furini

, Manuela Montangero
:
Sentiment analysis and Twitter: a game proposal. 771-785 - Bin Yu

, Jun Hu
, Mathias Funk
, Loe M. G. Feijs:
DeLight: biofeedback through ambient light for stress intervention and relaxation assistance. 787-805 - Tuomas Vaittinen

, David K. McGookin:
Uncover: supporting city exploration with egocentric visualizations of location-based content. 807-824 - Zhao Xiao, Yuelei Li, Kang Zhang

:
Visual analysis of risks in peer-to-peer lending market. 825-838 - Alissa Nicole Antle

, Leslie Chesick, Srilekha Kirshnamachari Sridharan, Emily S. Cramer:
East meets west: a mobile brain-computer system that helps children living in poverty learn to self-regulate. 839-866 - Elizabeth Rey, Aadhar Jain, Saeed Abdullah

, Tanzeem Choudhury, David Erickson:
Personalized stress monitoring: a smartphone-enabled system for quantification of salivary cortisol. 867-877
Volume 22, Numbers 5-6, October 2018
- Gunasekaran Manogaran, Naveen K. Chilamkurti, Ching-Hsien Hsu:

Emerging trends, issues, and challenges in Internet of Medical Things and wireless networks. 879-882 - (Withdrawn) Design and development of microstrip patch antenna with circular and rectangular slot for structural health monitoring. 883-893

- Weiping Zhang

, Jingzhi Yang, Hang Su, Mohit Kumar, Yihua Mao:
Medical data fusion algorithm based on Internet of things. 895-902 - Guizhen He, Jun Yang, Seven Behnke:

Research on geometric features and point cloud properties for tree skeleton extraction. 903-910 - M. S. Murali Dhar, R. Manimegalai

:
A policy-oriented secured service for the e-commerce applications in cloud. 911-919 - Ching-Hsue Cheng

, You-Shyang Chen, Arun Kumar Sangaiah
, Yin-Hsiu Su:
Evidence-based personal applications of medical computing models in risk factors of cardiovascular disease for the middle-aged and elderly. 921-936 - (Withdrawn) Man-machine dialogue system optimization based on cloud computing. 937-942

- (Withdrawn) Optimization of QoS parameters using scheduling techniques in heterogeneous network. 943-950

- V. Sivakumar

, D. Rekha:
Node scheduling problem in underwater acoustic sensor network using genetic algorithm. 951-959 - M. TamilNidhi, K. Gunaseelan:

Examining the variation of vascular structure in digital fundus images using textural pattern. 961-970 - Yue-Feng Zheng, Ying Li, Gang Wang, Yu-Peng Chen, Qian Xu, Jia-Hao Fan, Xue-Ting Cui:

A novel hybrid algorithm for feature selection. 971-985 - Chunzhe Zhao, Donghai Li, Jianwei Cui, Lingling Tian:

Decentralized low-order ADRC design for MIMO system with unknown order and relative degree. 987-1004 - (Withdrawn) Photographer trajectory detection from images. 1005-1015

- (Withdrawn) Recurrent learning of context for salient region detection. 1017-1027

- Aiwan Fan, Zhaofeng Yang:

Image spam filtering using convolutional neural networks. 1029-1037 - Ting Gao, Yaguang Hao, Haipeng Zhang, Lina Hu, Hongzhi Li, Hui Li, Li Hong Hu

, Bing Han:
Predicting pathological response to neoadjuvant chemotherapy in breast cancer patients based on imbalanced clinical data. 1039-1047 - Hang Qin, Min Wang, Zhongbo Wu:

Efficiency-based multi-item bargaining design in cognitive radio networks with spectrum coordination. 1049-1060 - (Withdrawn) Efficiency optimization and simulation to manufacturing and service systems based on manufacturing technology Just-In-Time. 1061-1073

- Haibo Yi, Zhe Nie:

On the security of MQ cryptographic systems for constructing secure Internet of medical things. 1075-1081 - (Withdrawn) Speech recognition with improved support vector machine using dual classifiers and cross fitness validation. 1083-1091

- (Withdrawn) Region-specific multi-attribute white mass estimation-based mammogram classification. 1093-1098

- Yumei Wu, Yuanyuan Fang, Bin Liu, Zehui Zhao:

A novel service deployment approach based on resilience metrics for service-oriented system. 1099-1107 - Dingju Zhu:

Deep learning over IoT big data-based ubiquitous parking guidance robot for parking near destination especially hospital. 1109-1116 - (Withdrawn) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. 1117-1132

- Ying Sheng, Tie Zhang:

The finite volume method for two-dimensional Burgers' equation. 1133-1139 - (Withdrawn) Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. 1141-1151

- Zaoli Yang

, Jinping Chang:
Solving dynamic normal distribution stochastic decision-making problems based on time degree and vertical projection distance. 1153-1163 - S. Periyanayagi, V. Sumathy:

Swarm-based defense technique for tampering and cheating attack in WSN using CPHS. 1165-1179

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














