Default Cover Image

2011 IEEE International Conference on Pervasive Computing and Communications (PerCom)

Mar. 21 2011 to Mar. 25 2011

Seattle, WA USA

ISBN: 978-1-4244-9530-6

Table of Contents

Papers
IndexFreely available from IEEE.pp. i
Papers
CommitteesFreely available from IEEE.pp. ii-iv
Papers
Message from the general chairsFreely available from IEEE.pp. ix
Technical programFreely available from IEEE.pp. v-viii
KeynotesFreely available from IEEE.pp. xi-xii
Table of contentsFreely available from IEEE.pp. xiv-xvi
Jyotish: A novel framework for constructing predictive model of people movement from joint Wifi/Bluetooth traceFull-text access may be available. Sign in or learn about subscription options.pp. 54-62
Floating content: Information sharing in urban areasFull-text access may be available. Sign in or learn about subscription options.pp. 136-146
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tagsFull-text access may be available. Sign in or learn about subscription options.pp. 181-188
Position sharing for location privacy in non-trusted systemsFull-text access may be available. Sign in or learn about subscription options.pp. 189-196
Model-driven engineering of planning and optimisation algorithms for pervasive computing environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 172-180
RASS: A real-time, accurate and scalable system for tracking transceiver-free objectsFull-text access may be available. Sign in or learn about subscription options.pp. 197-204
Interpretation of inconsistencies via context consistency diagramsFull-text access may be available. Sign in or learn about subscription options.pp. 20-27
A robust dead-reckoning pedestrian tracking system with low cost sensorsFull-text access may be available. Sign in or learn about subscription options.pp. 222-230
Reclaiming privacy for smartphone applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 84-92
An efficient localization algorithm focusing on stop-and-go behavior of mobile nodesFull-text access may be available. Sign in or learn about subscription options.pp. 205-212
Adaptive client side object replication for response time improvement in pervasive environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 164-171
Using AI planning and late binding for managing service workflows in intelligent environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 156-163
Participatory sensing algorithms for mobile object discovery in urban areasFull-text access may be available. Sign in or learn about subscription options.pp. 128-135
Mobile node rostering in intermittently connected passive RFID networksFull-text access may be available. Sign in or learn about subscription options.pp. 111-119
Recognizing interleaved and concurrent activities: A statistical-relational approachFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
On-body device localization for health and medical monitoring applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
Hybrid context inconsistency resolution for context-aware servicesFull-text access may be available. Sign in or learn about subscription options.pp. 10-19
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distributionFull-text access may be available. Sign in or learn about subscription options.pp. 93-101
AnonPri: An efficient anonymous private authentication protocolFull-text access may be available. Sign in or learn about subscription options.pp. 102-110
Bidirectional pose estimationFull-text access may be available. Sign in or learn about subscription options.pp. 231-239
Motion fault detection and isolation in Body Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 147-155
Showing 35 out of 35