Sciweavers

PERCOM
2010
ACM
13 years 2 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
PERCOM
2010
ACM
13 years 2 months ago
Crowdsourced radiomap for room-level place recognition in urban environment
Abstract—The proliferation of WLAN infrastructures has facilitated numerous indoor localization techniques using WLAN fingerprints. In particular, identifying a room or a place i...
Minkyu Lee, Hyunil Yang, Dongsoo Han, Chansu Yu
PERCOM
2010
ACM
13 years 2 months ago
Faster Bayesian context inference by using dynamic value ranges
—This paper shows how to reduce evaluation time for context inference. Probabilistic Context Inference has proven to be a good representation of the physical reality with uncerta...
Korbinian Frank, Patrick Robertson, Sergio Fortes ...
PERCOM
2010
ACM
13 years 2 months ago
HERO: Hybrid Emergency Route-Opening Protocol
—This paper presents an ad-hoc vehicular protocol to support the logistics of first responders. First responders often travel several kilometers to reach an area impacted by an ...
Jonathan Woodbridge, Mars Lan, Giovanni Pau, Mario...
PERCOM
2010
ACM
13 years 2 months ago
Towards wearable sensing-based assessment of fluid intake
—Fluid intake is an important information for many health and assisted living applications. At the same time it is inherently difficult to monitor. Existing reliable solutions r...
Oliver Amft, David Bannach, Gerald Pirkl, Matthias...
PERCOM
2010
ACM
13 years 2 months ago
Design of a Web-based distributed location-aware infrastructure for mobile devices
Vlad Trifa, Dominique Guinard, Philipp Bolliger, S...
PERCOM
2010
ACM
13 years 2 months ago
Privacy assurance in mobile sensing networks: Go beyond trusted servers
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
Ling Hu, Cyrus Shahabi
PERCOM
2010
ACM
13 years 2 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
PERCOM
2010
ACM
13 years 6 months ago
Engineering energy-efficient target detection applications in Wireless Sensor Networks
This paper addresses the problem of engineering energy-efficient target detection applications using unattended Wireless Sensor Networks (WSNs) for long-lasting surveillance of are...
Paolo Medagliani, Jeremie Leguay, Vincent Gay, Mar...
PERCOM
2010
ACM
13 years 6 months ago
Collaborative real-time speaker identification for wearable systems
We present an unsupervised speaker identification system for personal annotations of conversations and meetings. The system dynamically learns new speakers and recognizes already k...
Mirco Rossi, Oliver Amft, Martin Kusserow, Gerhard...