Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PERCOM
PERCOM 2011
Generate Citations
2011 IEEE International Conference on Pervasive Computing and Communications (PerCom)
Mar. 21 2011 to Mar. 25 2011
Seattle, WA USA
ISBN: 978-1-4244-9530-6
Table of Contents
Papers
Index
Freely available from IEEE.
pp. i
Papers
Committees
Freely available from IEEE.
pp. ii-iv
Papers
Message from the general chairs
Freely available from IEEE.
pp. ix
by
Diane Cook
,
Jie Liu
Technical program
Freely available from IEEE.
pp. v-viii
Papers
Welcome from the technical program chairs
Freely available from IEEE.
pp. x
by
Jadwiga Indulska
,
Claudio Bettini
,
Roy Campbell
,
Cecilia Mascolo
Keynotes
Freely available from IEEE.
pp. xi-xii
by
Alex Pentland
,
Derek McAuley
Panel topic: Pervasive and social computing: Where are we heading?
Freely available from IEEE.
pp. xiii-xiii
by
Sajal K. Das
,
Sujata Banerjee
,
Mads Haahr
,
Eric Horvitz
,
David McDonald
,
George Roussos
Table of contents
Freely available from IEEE.
pp. xiv-xvi
Jyotish: A novel framework for constructing predictive model of people movement from joint Wifi/Bluetooth trace
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-62
by
Long Vu
,
Quang Do
,
Klara Nahrstedt
Feasibility study of a wearable carbon monoxide warning system for construction workers
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-36
by
Jason B. Forsyth
,
Thomas L. Martin
,
Deborah Young-Corbett
,
Ed Dorsa
Floating content: Information sharing in urban areas
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-146
by
Jörg Ott
,
Esa Hyytiä
,
Pasi Lassila
,
Tobias Vaegs
,
Jussi Kangasharju
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-188
by
Nitesh Saxena
,
Md. Borhan Uddin
,
Jonathan Voris
,
N. Asokan
Position sharing for location privacy in non-trusted systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-196
by
Frank Dürr
,
Pavel Skvortsov
,
Kurt Rothermel
Tracking vehicular speed variations by warping mobile phone signal strengths
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-221
by
Gayathri Chandrasekaran
,
Tam Vu
,
Alexander Varshavsky
,
Marco Gruteser
,
Richard P. Martin
,
Jie Yang
,
Yingying Chen
Model-driven engineering of planning and optimisation algorithms for pervasive computing environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-180
by
Anthony Harrington
,
Vinny Cahill
RASS: A real-time, accurate and scalable system for tracking transceiver-free objects
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-204
by
Dian Zhang
,
Yunhuai Liu
,
Lionel M. Ni
Interpretation of inconsistencies via context consistency diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-27
by
Viktoriya Degeler
,
Alexander Lazovik
A robust dead-reckoning pedestrian tracking system with low cost sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-230
by
Yunye Jin
,
Hong-Song Toh
,
Wee-Seng Soh
,
Wai-Choong Wong
Reclaiming privacy for smartphone applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-92
by
Emiliano De Cristofaro
,
Anthony Durussel
,
Imad Aad
An efficient localization algorithm focusing on stop-and-go behavior of mobile nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-212
by
Takamasa Higuchi
,
Sae Fujii
,
Hirozumi Yamaguchi
,
Teruo Higashino
Adaptive client side object replication for response time improvement in pervasive environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-171
by
Norizam Katmon
,
Caspar Ryan
An energy-efficient quality adaptive framework for multi-modal sensor context recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-73
by
Nirmalya Roy
,
Archan Misra
,
Christine Julien
,
Sajal K. Das
,
Jit Biswas
uDirect: A novel approach for pervasive observation of user direction with mobile phones
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-83
by
Seyed Amir Hoseinitabatabaei
,
Alexander Gluhak
,
Rahim Tafazolli
Using AI planning and late binding for managing service workflows in intelligent environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-163
by
Julien Bidot
,
Christos Goumopoulos
,
Ioannis Calemis
Participatory sensing algorithms for mobile object discovery in urban areas
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-135
by
Harald Weinschrott
,
Julian Weisser
,
Frank Dürr
,
Kurt Rothermel
Mobile node rostering in intermittently connected passive RFID networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-119
by
Zhipeng Yang
,
Hongyi Wu
Recognizing interleaved and concurrent activities: A statistical-relational approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Rim Helaoui
,
Mathias Niepert
,
Heiner Stuckenschmidt
On-body device localization for health and medical monitoring applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
by
Alireza Vahdatpour
,
Navid Amini
,
Majid Sarrafzadeh
RegReS: Adaptively maintaining a target density of regional services in opportunistic vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-127
by
Emmanouil Koukoumidis
,
Li-Shiuan Peh
,
Margaret Martonosi
Hybrid context inconsistency resolution for context-aware services
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-19
by
Chenhua Chen
,
Chunyang Ye
,
Hans-Arno Jacobsen
P
3
-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-101
by
Boying Zhang
,
Jin Teng
,
Xiaole Bai
,
Zhimin Yang
,
Dong Xuan
AnonPri: An efficient anonymous private authentication protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-110
by
Md. Endadul Hoque
,
Farzana Rahman
,
Sheikh Iqbal Ahamed
Phase recognition during surgical procedures using embedded and body-worn sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-53
by
Jakob E. Bardram
,
Afsaneh Doryab
,
Rune M. Jensen
,
Poul M. Lange
,
Kristian L. G. Nielsen
,
Søren T. Petersen
Bidirectional pose estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-239
by
Jarmo Kauko
Motion fault detection and isolation in Body Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-155
by
Duk-Jin Kim
,
B. Prabhakaran
Showing 35 out of 35