People are usually concerned with the privacy of their personal information. However, the problem of privacy is also present when the information is directly linked to people, for...
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
We propose an approach to activity recognition based on detecting and analyzing the sequence of objects that are being manipulated by the user. In domains such as cooking, where m...