Default Cover Image

2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)

March 22 2021 to March 26 2021

Kassel, Germany

ISBN: 978-1-6654-0424-2

Table of Contents

Welcome from the General ChairsFreely available from IEEE.pp. 1-2
Welcome from the Workshops ChairsFreely available from IEEE.pp. 1-1
WorkshopsFreely available from IEEE.pp. 1-1
PerCom Industry Track 2021 - ProgramFreely available from IEEE.pp. 1-1
PerCom Industry Track 2021 - Welcome and CommitteesFreely available from IEEE.pp. 1-2
2021 PerCom Artifacts - ProgramFreely available from IEEE.pp. 1-1
2021 PerCom Artifacts - Welcome and CommitteesFreely available from IEEE.pp. 1-1
Author IndexFreely available from IEEE.pp. 1-14
SponsorsFreely available from IEEE.pp. 1-1
Welcome messageFreely available from IEEE.pp. 1-1
PerHealth Workshop Welcome MessageFreely available from IEEE.pp. 1-3
Sharing geotagged pictures for an Emotion-based Recommender SystemFull-text access may be available. Sign in or learn about subscription options.pp. 68-73
Trusted Video Streaming on Edge DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 655-660
Privacy Preserving Framework for Big Data Management in Smart BuildingsFull-text access may be available. Sign in or learn about subscription options.pp. 667-673
Exploring Epileptic Seizure Detection with Commercial SmartwatchesFull-text access may be available. Sign in or learn about subscription options.pp. 636-641
Enabling a Secured Communication in Distributed IoT Using the Smart Systems Service InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 674-679
Skin tone, Confidence, and Data Quality of Heart Rate Sensing in WearOS SmartwatchesFull-text access may be available. Sign in or learn about subscription options.pp. 213-219
Combining Public Machine Learning Models by Using Word Embedding for Human Activity RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 2-7
A Reinforcement Learning Environment for Multi-Service UAV-enabled Wireless SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 251-256
A Dynamic Task Offloading Method with Centralized Controller to Improve Task Success RateFull-text access may be available. Sign in or learn about subscription options.pp. 483-488
Privacy ABCs: Now Ready for Your Wallets!Full-text access may be available. Sign in or learn about subscription options.pp. 686-691
Scaling Spectrogram Data Representation for Deep Learning on Edge TPUFull-text access may be available. Sign in or learn about subscription options.pp. 572-578
WristO2: Reliable Peripheral Oxygen Saturation Readings from Wrist-Worn Pulse OximetersFull-text access may be available. Sign in or learn about subscription options.pp. 623-629
Applying “Earable” Inertial Sensing for Real-time Head Posture DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 176-181
Reliable multi-diffusion with limited memory in vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 239-244
Evaluating Models for Estimating Schedule Deviation in Public TransitFull-text access may be available. Sign in or learn about subscription options.pp. 275-280
Discrete Distribution Estimation with Local Differential Privacy: A Comparative AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 692-697
A Dynamic Mix-zone Scheme Considering Communication Delay for Location Privacy in Vehicular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 245-250
BCG & ECG-based secure communication for medical devices in Body Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 207-212
Security Attacks on Multi-Stage Proof-of-WorkFull-text access may be available. Sign in or learn about subscription options.pp. 698-703
Evaluation of a Road Pricing Method Based on Demand Distribution in Micro Traffic SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 257-262
Developing a “Sense of Agency” in IoT Systems: Preliminary Experiments in a Smart Home ScenarioFull-text access may be available. Sign in or learn about subscription options.pp. 44-49
Storm Operation Prediction: Modeling the Occurrence of Storm Operations for Fire StationsFull-text access may be available. Sign in or learn about subscription options.pp. 123-128
Location-Aware Caching via Predicting Heterogeneous File Preferences in Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 336-339
Trust and Trustworthiness: What They Are and How to Achieve ThemFull-text access may be available. Sign in or learn about subscription options.pp. 711-717
VFep: 3D Graphic Face Representation Based on Voice-based Emotion RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 74-79
Effect of Facial Expression Categories and Calculation Methods on Automatic Emotion RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 63-67
Towards EEG-based Performance Assessment in Dataset Annotation TasksFull-text access may be available. Sign in or learn about subscription options.pp. 465-470
Detecting malicious COVID-19 URLs using machine learning techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 718-723
Camouflage LearningFull-text access may be available. Sign in or learn about subscription options.pp. 724-729
Towards Putting Deep Learning on the Wrist for Accurate Human Activity RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 605-610
Quaterni-On: Calibration-free Matching of Wearable IMU Data to Joint Estimates of Ambient CamerasFull-text access may be available. Sign in or learn about subscription options.pp. 611-616
Hybrid Distance-Based Framework for Classification of Embedded Firearm Recoil DataFull-text access may be available. Sign in or learn about subscription options.pp. 50-55
TAP: A Transformer based Activity Prediction Exploiting Temporal Relations in Collaborative TasksFull-text access may be available. Sign in or learn about subscription options.pp. 20-25
Using Human Pose Estimation for User-Defined Indoor Location SensingFull-text access may be available. Sign in or learn about subscription options.pp. 495-501
NaviMine: A tool for mining trajectories through behavior predictionFull-text access may be available. Sign in or learn about subscription options.pp. 502-507
Non-intrusive Continuous User Identification from Activity Acoustic SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 356-359
A Low-rate DDoS Strategy for Unknown Bottleneck Link CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 508-513
PathLookup: A Deep Learning-Based Framework to Assist Visually Impaired in Outdoor WayfindingFull-text access may be available. Sign in or learn about subscription options.pp. 111-116
Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity FederationFull-text access may be available. Sign in or learn about subscription options.pp. 514-519
Accessibility of Healthcare Facility for Persons with Visual DisabilityFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
Routing Over Multiple Technologies with RODENTFull-text access may be available. Sign in or learn about subscription options.pp. 404-406
BURST - A Dynamic Bus Routing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 395-397
Showing 100 out of 201