Default Cover Image

2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)

March 29 2010 to April 2 2010

Mannheim

Table of Contents

Modeling of sensor data and context for the Real World InternetFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A flexible context stabilization approach for self-adaptive applicationFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
An effective quality measure for prediction of context informationFull-text access may be available. Sign in or learn about subscription options.pp. 13-17
Towards the adaptive integration of multiple context reasoners in pervasive computing environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 25-29
HyCoRE: Towards a generalized hierarchical hybrid context reasoning engineFull-text access may be available. Sign in or learn about subscription options.pp. 30-36
Analysis of Quality of Surveillance in fusion-based sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 37-42
Supporting multi-fidelity-aware concurrent applications in dynamic sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 43-49
Faster Bayesian context inference by using dynamic value rangesFull-text access may be available. Sign in or learn about subscription options.pp. 50-55
BurrowView - seeing the world through the eyes of ratsFull-text access may be available. Sign in or learn about subscription options.pp. 56-61
Resilient image sensor networks in lossy channels using compressed sensingFull-text access may be available. Sign in or learn about subscription options.pp. 62-67
Towards IEEE 802.15.4e: A study of performance aspectsFull-text access may be available. Sign in or learn about subscription options.pp. 68-73
Accuracy over energy metrics for evaluating sensor network MAC protocolsFull-text access may be available. Sign in or learn about subscription options.pp. 74-80
Exploring quality in multisensor pervasive systems - a localization case studyFull-text access may be available. Sign in or learn about subscription options.pp. 81-86
Target tracking with packet delays and losses - QoI amid latencies and missing dataFull-text access may be available. Sign in or learn about subscription options.pp. 93-98
Collaborative sensing to improve information quality for target tracking in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 99-104
Privacy-preserving admission to mobile peer-to-peer groupsFull-text access may be available. Sign in or learn about subscription options.pp. 111-116
On the capacity of tree-based P2P streaming systemsFull-text access may be available. Sign in or learn about subscription options.pp. 117-122
Using Wi-Fi to save energy via P2P remote executionFull-text access may be available. Sign in or learn about subscription options.pp. 123-128
Hierarchical Role-based Data Dissemination for large-scale wireless sensor networks with mobile sinksFull-text access may be available. Sign in or learn about subscription options.pp. 129-134
Message propagation in ad-hoc-based proximity mobile social networksFull-text access may be available. Sign in or learn about subscription options.pp. 141-146
Bootstrapping security associations in opportunistic networksFull-text access may be available. Sign in or learn about subscription options.pp. 147-152
Self-evolving applications over opportunistic communication systemsFull-text access may be available. Sign in or learn about subscription options.pp. 153-158
Managing ontology based integration systems using dependenciesFull-text access may be available. Sign in or learn about subscription options.pp. 165-170
Ontology based information distribution in the pervasive display environmentFull-text access may be available. Sign in or learn about subscription options.pp. 171-175
Robopedia: Leveraging Sensorpedia for web-enabled robot controlFull-text access may be available. Sign in or learn about subscription options.pp. 183-188
Implementing the draft W3C semantic sensor network ontologyFull-text access may be available. Sign in or learn about subscription options.pp. 196-201
Anomaly detection in university campus WiFi zonesFull-text access may be available. Sign in or learn about subscription options.pp. 202-207
DogSim: A state chart simulator for Domotic EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 208-213
On assessing self-adaptive systemsFull-text access may be available. Sign in or learn about subscription options.pp. 214-219
SCOPE: A prototype for spontaneous P2P social networkingFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
Service-based development of mobile real-time collaboration applications for Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 232-237
Optimizing meeting scheduling in collaborative mobile systems through distributed votingFull-text access may be available. Sign in or learn about subscription options.pp. 238-243
A management model of learning objects in a Ubiquitous Learning environmentFull-text access may be available. Sign in or learn about subscription options.pp. 256-261
Improving browsing usability for mobile learnersFull-text access may be available. Sign in or learn about subscription options.pp. 262-267
A service-oriented approach towards context-aware mobile Learning Management SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 268-273
Stimulating cooperative and participative learning to match digital natives' needsFull-text access may be available. Sign in or learn about subscription options.pp. 274-279
iFall - a new embedded system for the detection of unexpected fallsFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
PerFallD: A pervasive fall detection system using mobile phonesFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
Towards wearable sensing-based assessment of fluid intakeFull-text access may be available. Sign in or learn about subscription options.pp. 298-303
Estimating Personal Energy expenditure with location dataFull-text access may be available. Sign in or learn about subscription options.pp. 304-309
Studying the utility of tracking systems in improving healthcare workflowFull-text access may be available. Sign in or learn about subscription options.pp. 310-315
Teleo-Reactive workflows for pervasive healthcareFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
Efficient and context-aware access control for pervasive medical sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 322-327
Adaptive prompting based on Petri Net in a Smart medication systemFull-text access may be available. Sign in or learn about subscription options.pp. 328-333
HIP: Health integration platformFull-text access may be available. Sign in or learn about subscription options.pp. 340-345
An adaptive multiple rendezvous control channel for Cognitive Radio wireless ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 346-351
Topology reconfiguration in IEEE 802.15.4 WPANs for emergency managementFull-text access may be available. Sign in or learn about subscription options.pp. 352-357
HERO: Hybrid Emergency Route-Opening ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 364-369
Fast message dissemination for emergency communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 370-375
Pervasive emergency response process management systemFull-text access may be available. Sign in or learn about subscription options.pp. 376-381
BACCARAT: a dynamic real-time bandwidth allocation policy for IEEE 802.15.4Full-text access may be available. Sign in or learn about subscription options.pp. 406-412
Congestion control and fairness in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 413-418
Security analysis of reliable transport layer protocols for wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 419-424
Enhancing SDP-generated localization solutions by the removal of anchorless connected componentsFull-text access may be available. Sign in or learn about subscription options.pp. 425-430
Concurrent scheduling in the Active Bat location systemFull-text access may be available. Sign in or learn about subscription options.pp. 431-437
A semi-distributed localization protocol for wireless sensor and actor networksFull-text access may be available. Sign in or learn about subscription options.pp. 438-443
Profiling sprints using on-body sensorsFull-text access may be available. Sign in or learn about subscription options.pp. 444-449
Energy efficient sleep scheduling in wireless sensor networks inspired by satellite behavior of frogsFull-text access may be available. Sign in or learn about subscription options.pp. 450-455
Fault diagnosis in multi layered De Bruijn based architectures for sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 456-461
Robust hybrid wired-wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 462-467
Middleware for decentralised fault tolerant service execution using replication in pervasive systemsFull-text access may be available. Sign in or learn about subscription options.pp. 474-479
CBay : Extending auction algorithm for component placement in the Internet of machinesFull-text access may be available. Sign in or learn about subscription options.pp. 480-485
ReSCo: A middleware component for Reliable Service Composition in pervasive systemsFull-text access may be available. Sign in or learn about subscription options.pp. 486-491
The architecture design of a cross-domain context management systemFull-text access may be available. Sign in or learn about subscription options.pp. 499-504
A secure context distribution framework for peer-based pervasive systemsFull-text access may be available. Sign in or learn about subscription options.pp. 505-510
UpperWare: Bringing resources back to the systemFull-text access may be available. Sign in or learn about subscription options.pp. 511-516
Chit-based remote storageFull-text access may be available. Sign in or learn about subscription options.pp. 517-521
On topology control and non-uniform node deployment in ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 522-527
Gradational power control in multi-channel multi-radio wireless ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 528-533
Vertical handover based on the prediction of mobility of mobile nodeFull-text access may be available. Sign in or learn about subscription options.pp. 534-539
Automatic identification of fingerprint regions for quick and reliable location estimationFull-text access may be available. Sign in or learn about subscription options.pp. 540-545
GuardianAngel: An RFID-based indoor guidance and monitoring systemFull-text access may be available. Sign in or learn about subscription options.pp. 546-551
Showing 100 out of 179