Sciweavers

140
Voted
PERCOM
2011
ACM
14 years 8 months ago
Mobile node rostering in intermittently connected passive RFID networks
— This paper focuses on the problem of rostering in intermittently connected passive RFID networks. It aims to report a list of tagged mobile nodes that appear in given intereste...
Zhipeng Yang, Hongyi Wu
162
Voted
PERCOM
2011
ACM
14 years 8 months ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
PERCOM
2011
ACM
14 years 8 months ago
Towards preserving privacy in participatory sensing
Abstract—With the abundance and ubiquity of mobile devices, a new class of applications is emerging, called participatory sensing (PS), where people can contribute data (e.g., im...
Leyla Kazemi, Cyrus Shahabi
127
Voted
PERCOM
2011
ACM
14 years 8 months ago
Distributed context-aware visualization
—We present a visualization framework integrated in a context-aware system that uses a common underlying stream processing middleware for tight integration of data accessing, pro...
Harald Sanftmann, Nazario Cipriani, Daniel Weiskop...
PERCOM
2011
ACM
14 years 8 months ago
Inference attacks by third-party extensions to social network systems
—We study inference attacks that can be launched via the extension API of Facebook. We explain the threat of these attacks through a reduction to authentication attacks, devise a...
Seyed Hossein Ahmadinejad, Mohd M. Anwar, Philip W...
PERCOM
2011
ACM
14 years 8 months ago
Using prediction to conserve energy in recognition on mobile devices
—As devices are expected to be aware of their environment, the challenge becomes how to accommodate these abilities with the power constraints which plague modern mobile devices....
Dawud Gordon, Stephan Sigg, Yong Ding, Michael Bei...
PERCOM
2011
ACM
14 years 8 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
133
Voted
PERCOM
2011
ACM
14 years 8 months ago
Ranges of human mobility in Los Angeles and New York
—The advent of ubiquitous, mobile, personal devices creates an unprecedented opportunity to improve our understanding of human movement. In this work, we study human mobility in ...
Sibren Isaacman, Richard Becker, Ramón C&aa...
158
Voted
PERCOM
2011
ACM
14 years 8 months ago
Market mechanisms for Value of Information driven resource allocation in Sensor Networks
—This paper examines the possible uses of different market mechanisms for resource allocation at different levels of Wireless Sensor Network (WSN) architecture. The goal is to ma...
Boleslaw K. Szymanski, S. Yousaf Shah, Sahin Cem G...
283
Voted
PERCOM
2011
ACM
14 years 8 months ago
A self-powered adaptive wireless sensor network for wastewater treatment plants
Efficient monitoring and control of wastewater treatment plants (WWTPs) has become an important public issue as the cost of electricity continues to grow and the quality requiremen...
Yu Chen, Christopher M. Twigg, Omowunmi A. Sadik, ...