Default Cover Image

Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)

March 19 2007 to March 23 2007

White Plains, NY

Table of Contents

Introduction
Message from the General ChairsFreely available from IEEE.pp. viii
Introduction
Message from the Program ChairsFreely available from IEEE.pp. ix
Introduction
Organizing CommitteeFreely available from IEEE.pp. x
Introduction
Program CommitteeFreely available from IEEE.pp. xi-xii
Introduction
ReviewersFreely available from IEEE.pp. xiii
Session 1: RFID
Severless Search and Authentication Protocols for RFIDFull-text access may be available. Sign in or learn about subscription options.pp. 3-12
Session 1: RFID
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 13-22
Session 1: RFID
Energy-Aware Tag Anti-Collision Protocols for RFID SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 23-36
Session 2: Best Papers
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag ArraysFull-text access may be available. Sign in or learn about subscription options.pp. 37-46
Session 2: Best Papers
BlueTorrent: Cooperative Content Sharing for Bluetooth UsersFull-text access may be available. Sign in or learn about subscription options.pp. 47-56
Session 2: Best Papers
A Local Data Abstraction and Communication Paradigm for Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 57-68
Session 3: Middleware and Applications
Designing Ubiquitous Computing Systems for Sports EquipmentFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
Session 3: Middleware and Applications
Macro Programming through Bayesian Networks: Distributed Inference and Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 87-96
Session 4: Application Design and Development
Methods and Guidelines for the Design and Development of Domestic Ubiquitous Computing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 97-107
Session 4: Application Design and Development
Supporting Domain Experts in Creating Pervasive ExperiencesFull-text access may be available. Sign in or learn about subscription options.pp. 108-113
Session 4: Application Design and Development
An Aspect-Oriented Approach to the Modularisation of ContextFull-text access may be available. Sign in or learn about subscription options.pp. 114-124
The SkyLoc Floor Localization SystemFull-text access may be available. Sign in or learn about subscription options.pp. 125-134
Session 5: Localization and its Applications
An RF-Based System for Tracking Transceiver-Free ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 135-144
Session 5: Localization and its Applications
Overhearing the Wireless Interface for 802.11-Based Positioning SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
Session 5: Localization and its Applications
A Scalable Geographic Service Provision Framework for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 151-160
Session 6: End-User Experience
A Wall-Sized Focus Plus Context DisplayFull-text access may be available. Sign in or learn about subscription options.pp. 161-170
Session 6: End-User Experience
A Capacitive Sensing Toolkit for Pervasive Activity Detection and RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
Session 6: End-User Experience
Using Digital Cameras for Text Input on Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 181-190
Session 7: Security
Securing Distributed Data Storage and Retrieval in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
Session 7: Security
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 201-210
Session 7: Security
Physically Unclonable Function-Based Security and Privacy in RFID SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 211-220
Session 8: Data Management and Usage
Structural Learning of Activities from Sparse DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 221-228
Session 8: Data Management and Usage
A Simple Model and Infrastructure for Context-Aware Browsing of the WorldFull-text access may be available. Sign in or learn about subscription options.pp. 229-238
Session 8: Data Management and Usage
Achieving Flexible Cache Consistency for Pervasive Internet AccessFull-text access may be available. Sign in or learn about subscription options.pp. 239-250
Session 9: Interacting with the User
Automatic Generation of Device User-Interfaces?Full-text access may be available. Sign in or learn about subscription options.pp. 251-261
Session 9: Interacting with the User
Supporting Mobile Service Usage through Physical Mobile InteractionFull-text access may be available. Sign in or learn about subscription options.pp. 262-271
Session 9: Interacting with the User
SHAD: A Human-Centered Security Architecture for the Plan B Operating SystemFull-text access may be available. Sign in or learn about subscription options.pp. 272-282
Author Index
Author IndexFreely available from IEEE.pp. 283
Showing 37 out of 37