Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PERCOM
PERCOM 2014
Generate Citations
2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)
March 24 2014 to March 28 2014
Budapest, Hungary
Table of Contents
[Copyright notice]
Freely available from IEEE.
pp. 1-1
General chairs welcome welcome message from the general chairs
Freely available from IEEE.
pp. 1-1
by
Gergely Zaruba
,
Karoly Farkas
TPC welcome welcome message from the technical program chairs
Freely available from IEEE.
pp. 1-1
by
George Roussos
,
Urs Hengartner
,
Shin'ichi Konomi
,
Kay Romer
Committees
Freely available from IEEE.
pp. 1-3
Technical program
Freely available from IEEE.
pp. 1-4
Keynote: WInternet: From Net of Things to Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
by
Wei Zhao
Kintense: A robust, accurate, real-time and evolving system for detecting aggressive actions from streaming 3D skeleton data
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-10
by
Shahriar Nirjon
,
Chris Greenwood
,
Carlos Torres
,
Stefanie Zhou
,
John A. Stankovic
,
Hee Jung Yoon
,
Ho-Kyeong Ra
,
Can Basaran
,
Taejoon Park
,
Sang H. Son
Nonparametric discovery of human routines from sensor data
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-19
by
Feng-Tso Sun
,
Yi-Ting Yeh
,
Heng-Tze Cheng
,
Cynthia Kuo
,
Martin Griss
Fixed-lag particle filter for continuous context discovery using Indian Buffet Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-28
by
Thuong Nguyen
,
Sunil Gupta
,
Svetha Venkatesh
,
Dinh Phung
Using rule mining to understand appliance energy consumption patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-37
by
Sami Rollins
,
Nilanjan Banerjee
SocketWatch: An autonomous appliance monitoring system
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-43
by
Tanuja Ganu
,
Dwi Rahayu
,
Deva P. Seetharam
,
Rajesh Kunnath
,
Ashok Pon Kumar
,
Vijay Arya
,
Saiful A. Husain
,
Shivkumar Kalyanaraman
Personalized Energy Auditor: Estimating personal electricity usage
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-49
by
Seungwoo Lee
,
Daye Ahn
,
Sukjun Lee
,
Rhan Ha
,
Hojung Cha
Keynote: IoT on the move: The ultimate driving machine as the ultimate mobile thing
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-50
by
Christoph Grote
Multi-scale Conditional Random Fields for first-person activity recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-59
by
Kai Zhan
,
Steven Faux
,
Fabio Ramos
Inferring occupancy from opportunistically available sensor data
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-68
by
Longqi Yang
,
Kevin Ting
,
Mani B. Srivastava
Pushing the spatio-temporal resolution limit of urban air pollution maps
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-77
by
David Hasenfratz
,
Olga Saukh
,
Christoph Walser
,
Christoph Hueglin
,
Martin Fierz
,
Lothar Thiele
From proximity sensing to spatio-temporal social graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-87
by
Claudio Martella
,
Matthew Dobson
,
Aart van Halteren
,
Maarten van Steen
A refined limit on the predictability of human mobility
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-94
by
Gavin Smith
,
Romain Wieser
,
James Goulding
,
Duncan Barrack
A regression-based radar-mote system for people counting
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-102
by
Jin He
,
Anish Arora
Missing sensor value estimation method for participatory sensing environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-111
by
Hisashi Kurasawa
,
Hiroshi Sato
,
Atsushi Yamamoto
,
Hitoshi Kawasaki
,
Motonori Nakamura
,
Yohei Fujii
,
Hajime Matsumura
Capacity of pervasive camera based communication under perspective distortions
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-120
by
Ashwin Ashok
,
Shubham Jain
,
Marco Gruteser
,
Narayan Mandayam
,
Wenjia Yuan
,
Kristin Dana
Unleashing the Wild Card for mobile payment
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-129
by
Mastooreh Salajegheh
,
Bodhi Priyantha
,
Jie Liu
Analysis methods for extracting knowledge from large-scale WiFi monitoring to inform building facility planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-138
by
Antonio J. Ruiz-Ruiz
,
Henrik Blunck
,
Thor S. Prentow
,
Allan Stisen
,
Mikkel B. Kjaergaard
MapGENIE: Grammar-enhanced indoor map construction from crowd-sourced data
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-147
by
Damian Philipp
,
Patrick Baier
,
Christoph Dibak
,
Frank Durr
,
Kurt Rothermel
,
Susanne Becker
,
Michael Peter
,
Dieter Fritsch
The telepathic phone: Frictionless activity recognition from WiFi-RSSI
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-155
by
Stephan Sigg
,
Ulf Blanke
,
Gerhard Troster
Incremental Wi-Fi scanning for energy-efficient localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-162
by
Niels Brouwers
,
Marco Zuniga
,
Koen Langendoen
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-171
by
Hien Thi Thu Truong
,
Xiang Gao
,
Babins Shrestha
,
Nitesh Saxena
,
N. Asokan
,
Petteri Nurmi
Soft Authentication with Low-Cost Signatures
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-180
by
Senaka Buthpitiya
,
Anind K. Dey
,
Martin Griss
Commitment-based device pairing with synchronized drawing
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-189
by
Mohit Sethi
,
Markku Antikainen
,
Tuomas Aura
Differentially-private release of check-in data for venue recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-198
by
Daniele Riboni
,
Claudio Bettini
Privacy, quality of information, and energy consumption in Participatory Sensing systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-207
by
Idalides J. Vergara-Laurens
,
Diego Mendez
,
Miguel A. Labrador
Combined heat and privacy: Preventing occupancy detection from smart meters
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-215
by
Dong Chen
,
David Irwin
,
Prashant Shenoy
,
Jeannie Albrecht
Showing 32 out of 32