Default Cover Image

2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)

March 19 2012 to March 23 2012

Lugano

Table of Contents

Papers
Copyright pageFreely available from IEEE.pp. i
Papers
Message from the general chairsFreely available from IEEE.pp. ii
Papers
Message from the workshops chairsFreely available from IEEE.pp. iii-iv
Papers
WorkshopsFreely available from IEEE.pp. v
Papers
ProgramFreely available from IEEE.pp. vi-vii
Papers
Organizing committeeFreely available from IEEE.pp. viii-ix
Papers
ProgramFreely available from IEEE.pp. x-xi
Papers
Organizing committeeFreely available from IEEE.pp. xii-xiv
Papers
ProgramFreely available from IEEE.pp. xv-xvi
Papers
Organizing committeeFreely available from IEEE.pp. xvii-xviii
Papers
ProgramFreely available from IEEE.pp. xix
Papers
Committees and welcomeFreely available from IEEE.pp. xx
Papers
ProgramFreely available from IEEE.pp. xxi-xxii
Papers
Organizing committeeFreely available from IEEE.pp. xxiii-xxiv
Papers
ProgramFreely available from IEEE.pp. xxv-xxvi
Papers
Organizing committeeFreely available from IEEE.pp. xxvii-xxix
Papers
ProgramFreely available from IEEE.pp. xxx-xxxi
Papers
Organizing committeeFreely available from IEEE.pp. xxxii-xxxiii
Papers
ProgramFreely available from IEEE.pp. xxxiv-xxxvii
Papers
Organizing committeeFreely available from IEEE.pp. xxxviii-xxxix
Papers
ProgramFreely available from IEEE.pp. xl-xlii
Papers
Organizing committeeFreely available from IEEE.pp. xliii
Papers
ProgramFreely available from IEEE.pp. xliv-xlv
Papers
Committees and welcomeFreely available from IEEE.pp. xlvi
Papers
ProgramFreely available from IEEE.pp. xlvii-xlviii
Papers
Organizing committeeFreely available from IEEE.pp. xlix-l
Papers
ProgramFreely available from IEEE.pp. li
Papers
Organizing committeeFreely available from IEEE.pp. lii-liii
Papers
ProgramFreely available from IEEE.pp. liv-lv
Papers
Organizing committeeFreely available from IEEE.pp. lvi-lvii
Papers
ProgramFreely available from IEEE.pp. lviii-lix
Papers
Organizing committeeFreely available from IEEE.pp. lx-lxi
Papers
ProgramFreely available from IEEE.pp. lxii-lxiii
Papers
Organizing committeeFreely available from IEEE.pp. lxiv-lxv
Papers
ProgramFreely available from IEEE.pp. lxvi-lxvii
Papers
Organizing committeeFreely available from IEEE.pp. lxviii-lxix
Papers
ProgramFreely available from IEEE.pp. lxx-lxxi
Papers
Organizing committeeFreely available from IEEE.pp. lxxii-lxxiii
Papers
Quality of information functions for networked applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 2-7
Papers
Maximizing credibility-based network utility via power allocationFull-text access may be available. Sign in or learn about subscription options.pp. 8-13
Papers
Transient traffic congestion control with Traveling AuctionsFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
Papers
Distributed graph query processing in dynamic networksFull-text access may be available. Sign in or learn about subscription options.pp. 20-25
Papers
The bus goes wireless: Routing-free data collection with QoS guarantees in sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 26-31
Papers
Energy-balanced sensor selection for social context detectionFull-text access may be available. Sign in or learn about subscription options.pp. 32-37
Papers
Quality-of-information aware data collection for mobile sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 38-43
Papers
Information processing and quality evaluationsFull-text access may be available. Sign in or learn about subscription options.pp. 51-57
Papers
Preserving quality of information by using semantic relationshipsFull-text access may be available. Sign in or learn about subscription options.pp. 58-63
Papers
Privacy policies change management for smartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
Papers
Towards a framework to support novice users in understanding and monitoring of Home Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 82-87
Papers
Is there meta-level in smart spaces?Full-text access may be available. Sign in or learn about subscription options.pp. 88-93
Papers
Data management in home scenarios using an autonomic ontology-based approachFull-text access may be available. Sign in or learn about subscription options.pp. 94-99
Papers
A context-aware publish-subscribe middleware for distributed smart environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 100-104
Papers
i*Chameleon: A unified web service framework for integrating multimodal interaction devicesFull-text access may be available. Sign in or learn about subscription options.pp. 106-111
Papers
A framework for measuring security of services in ubiquitous computing environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
Papers
Pervasive CSCW for smart spaces communitiesFull-text access may be available. Sign in or learn about subscription options.pp. 118-123
Papers
Context-aware communities and their impact on information influence in mobile social networksFull-text access may be available. Sign in or learn about subscription options.pp. 131-136
Papers
Design and implementation of a socially-enhanced pervasive middlewareFull-text access may be available. Sign in or learn about subscription options.pp. 137-142
Papers
Understanding the privacy implications of using context-based awareness cues in social networksFull-text access may be available. Sign in or learn about subscription options.pp. 143-148
Papers
Influencing the experience of people in urban public places through mobile mediated interactionsFull-text access may be available. Sign in or learn about subscription options.pp. 161-165
Papers
WatchMyPhone -- Providing developer support for shared user interface objects in collaborative mobile applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 166-171
Papers
New directions for system support in Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 173-178
Papers
A spatiotemporal model for ephemeral data in pervasive computing networksFull-text access may be available. Sign in or learn about subscription options.pp. 179-184
Papers
Self-adaptive mechanism for disaggregated computingFull-text access may be available. Sign in or learn about subscription options.pp. 185-190
Papers
New instruments of governance for our societiesFull-text access may be available. Sign in or learn about subscription options.pp. 191-196
Papers
Mobility and service discovery in opportunistic networksFull-text access may be available. Sign in or learn about subscription options.pp. 204-210
Papers
Lobby Influence: Opportunistic forwarding algorithm based on human social relationship patternsFull-text access may be available. Sign in or learn about subscription options.pp. 211-216
Papers
You are where you eat: Foursquare checkins as indicators of human mobility and behaviourFull-text access may be available. Sign in or learn about subscription options.pp. 217-222
Papers
People get together on special events: Discovering happenings in the city via cell network analysisFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
Papers
Practical automated activity recognition using standard smartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 229-234
Papers
A method of simultaneously displaying a passing person and his/her message on the same screen spaceFull-text access may be available. Sign in or learn about subscription options.pp. 235-240
Papers
Enhanced Localization SolutionFull-text access may be available. Sign in or learn about subscription options.pp. 241-246
Papers
MCMC-based indoor localization with a smart phone and sparse WiFi access pointsFull-text access may be available. Sign in or learn about subscription options.pp. 247-252
Papers
Comm2Sense: Detecting proximity through smartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 253-258
Papers
Situation-aware choice of the most accurate positioning systemFull-text access may be available. Sign in or learn about subscription options.pp. 259-264
Papers
Route selection for mobile sensors with checkpointing constraintsFull-text access may be available. Sign in or learn about subscription options.pp. 266-271
Papers
Stateless multicast forwarding with RPL in 6LowPAN sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
Papers
DCCC6: Duty Cycle-aware congestion control for 6LoWPAN networksFull-text access may be available. Sign in or learn about subscription options.pp. 278-283
Papers
Improving Internet of Things communications through compression and classificationFull-text access may be available. Sign in or learn about subscription options.pp. 284-289
Papers
CSI: Compressed sensing-based clone identification in sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
Papers
Simulation study on code attestation with compressed instruction codeFull-text access may be available. Sign in or learn about subscription options.pp. 296-301
Papers
Performance of wireless sensor topologies inspired by E. coli genetic networksFull-text access may be available. Sign in or learn about subscription options.pp. 302-307
Papers
Swarm-based approach to evaluate fuzzy classification of semantic sensor dataFull-text access may be available. Sign in or learn about subscription options.pp. 308-313
Papers
Policies for predictive energy management with supercapacitorsFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
Papers
From business process models to pervasive applications: Synchronization and optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
DECENT: A decentralized architecture for enforcing privacy in online social networksFull-text access may be available. Sign in or learn about subscription options.pp. 326-332
Papers
The devil is in the metadata -- New privacy challenges in Decentralised Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 333-339
Papers
A study of privacy settings errors in an online social networkFull-text access may be available. Sign in or learn about subscription options.pp. 340-345
Showing 100 out of 228