Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PERCOM
PERCOM 2015
Generate Citations
2015 IEEE International Conference on Pervasive Computing and Communications (PerCom)
March 23 2015 to March 27 2015
St. Louis, MO, USA
Table of Contents
Index
Freely available from IEEE.
pp. 1-1
General chairs welcome
Freely available from IEEE.
pp. 1-1
TPC welcome
Freely available from IEEE.
pp. 1-1
Committees
Freely available from IEEE.
pp. 1-4
Technical program
Freely available from IEEE.
pp. 1-4
Socially assistive robotics: Personalized machines that (Provide) care
Freely available from IEEE.
pp. 1-1
by
Maja J. Mataric
Mining relations and physical grouping of building-embedded sensors and actuators
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-10
by
Luis I. Lopera Gonzalez
,
Oliver Amft
Placer++: Semantic place labels beyond the visit
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-19
by
John Krumm
,
Dany Rouhana
,
Ming-Wei Chang
Fault detection for binary sensors in smart home environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-28
by
Juan Ye
,
Graeme Stevenson
,
Simon Dobson
Online unsupervised state recognition in sensor data
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-36
by
Julien Eberle
,
Tri Kurniawan Wijaya
,
Karl Aberer
Energy modeling of system settings: A crowdsourced approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-45
by
Ella Peltonen
,
Eemil Lagerspetz
,
Petteri Nurmi
,
Sasu Tarkoma
DOSE: Detecting user-driven operating states of electronic devices from a single sensing point
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-54
by
Ke-Yu Chen
,
Sidhant Gupta
,
Eric C. Larson
,
Shwetak Patel
CrowdTasker: Maximizing coverage quality in Piggyback Crowdsensing under budget constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-62
by
Haoyi Xiong
,
Daqing Zhang
,
Guanling Chen
,
Leye Wang
,
Vincent Gauthier
Acoustic based appliance state identifications for fine-grained energy analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-70
by
Nilavra Pathak
,
Md Abdullah Al Hafiz Khan
,
Nirmalya Roy
Joint segmentation and activity discovery using semantic and temporal priors
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-78
by
Julia Seiter
,
Wei-Chen Chiu
,
Mario Fritz
,
Oliver Amft
,
Gerhard Troster
Pervasive self-powered human activity recognition without the accelerometer
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-86
by
Sara Khalifa
,
Mahbub Hassan
,
Aruna Seneviratne
Using infrastructure-provided context filters for efficient fine-grained activity sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-94
by
S Vigneshwaran
,
Sougata Sen
,
Archan Misra
,
Satyadip Chakraborti
,
Rajesh Krishna Balan
Watson and the era of cognitive computing
Freely available from IEEE.
pp. 95-95
by
Guruduth S. Banavar
Attelia: Reducing user's cognitive load due to interruptive notifications on smart phones
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-104
by
Tadashi Okoshi
,
Julian Ramos
,
Hiroki Nozaki
,
Jin Nakazawa
,
Anind K. Dey
,
Hideyuki Tokuda
We help you watch your steps: Unobtrusive alertness system for pedestrian mobile phone users
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-113
by
Jiaqi Wen
,
Jiannong Cao
,
Xuefeng Liu
When to type, talk, or Swype: Characterizing energy consumption of mobile input modalities
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-122
by
Fangzhou Jiang
,
Eisa Zarepour
,
Mahbub Hassan
,
Aruna Seneviratne
,
Prasant Mohapatra
Beyond location check-ins: Exploring physical and soft sensing to augment social check-in apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-130
by
Kiran K. Rachuri
,
Theus Hossmann
,
Cecilia Mascolo
,
Sean Holden
WiBreathe: Estimating respiration rate using wireless signals in natural settings in the home
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-139
by
Ruth Ravichandran
,
Elliot Saba
,
Ke-Yu Chen
,
Mayank Goel
,
Sidhant Gupta
,
Shwetak N. Patel
Multiple model recognition for near-realistic exergaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-148
by
Bobak Mortazavi
,
Mohammad Pourhomayoun
,
Suneil Nyamathi
,
Brandon Wu
,
Sunghoon Ivan Lee
,
Majid Sarrafzadeh
Fine-grained recognition of abnormal behaviors for early detection of mild cognitive impairment
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-154
by
Daniele Riboni
,
Claudio Bettini
,
Gabriele Civitarese
,
Zaffar Haider Janjua
,
Rim Helaoui
Smart table surface: A novel approach to pervasive dining monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-162
by
Bo Zhou
,
Jingyuan Cheng
,
Mathias Sundholm
,
Attila Reiss
,
Wuhuang Huang
,
Oliver Amft
,
Paul Lukowicz
LaneQuest: An accurate and energy-efficient lane detection system
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-171
by
Heba Aly
,
Anas Basalamah
,
Moustafa Youssef
FINE: Frequency-divided instantaneous neighbors estimation system in vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-177
by
Linghe Kong
,
Xi Chen
,
Xue Liu
,
Lei Rao
DoppelDriver: Counterfactual actual travel times for alternative routes
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-185
by
Daehan Kwak
,
Daeyoung Kim
,
Ruilin Liu
,
Badri Nath
,
Liviu Iftode
An expanding and expansive view of computing, and the special role of pervasive computing
Freely available from IEEE.
pp. 186-186
by
Jim Kurose
Cyber-physical systems and pervasive computing: Overlap or divergent? (PerCom Panel)
Freely available from IEEE.
pp. 187-188
by
Chenyang Lu
,
Jiannong Cao
,
David Corman
,
Christine Julien
,
Lui Sha
,
Franco Zambonelli
Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-197
by
Nicolas Micallef
,
Hilmi Gunes Kayacik
,
Mike Just
,
Lynne Baillie
,
David Aspinall
Inviz: Low-power personalized gesture recognition using wearable textile capacitive sensor arrays
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-206
by
Gurashish Singh
,
Alexander Nelson
,
Ryan Robucci
,
Chintan Patel
,
Nilanjan Banerjee
Understanding the unobservable population in call detail records through analysis of mobile phone user calling behavior: A case study of Greater Dhaka in Bangladesh
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-214
by
Ayumi Arai
,
Apichon Witayangkurn
,
Teerayut Horanont
,
Xiaowei Shao
,
Ryosuke Shibasaki
Targeted vaccination based on a wireless sensor system
Freely available from IEEE.
pp. 215-220
by
Xiao Sun
,
Zongqing Lu
,
Xiaomei Zhang
,
Marcel Salathe
,
Guohong Cao
Curbing mobile malware based on user-transparent hand movements
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-229
by
Babins Shrestha
,
Manar Mohamed
,
Anders Borg
,
Nitesh Saxena
,
Sandeep Tamrakar
Measurement-driven mobile data traffic modeling in a large metropolitan area
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-235
by
Eduardo Mucelli Rezende Oliveira
,
Aline Carneiro Viana
,
K. P. Naveen
,
Carlos Sarraute
Covert channel attacks in pervasive computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-242
by
Nilufer Tuptuk
,
Stephen Hailes
Showing 38 out of 38