Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
We show a tight lower bound of Ω(N log log N) on the number of transmissions required to compute several functions (including the parity function and the majority function) in a...
In this paper we examine the dissemination of availability reports about resources in mobile peer-topeer networks, where vehicles, pedestrian or sensors communicate with each othe...
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices—such as wireless microphones (WMs)— is a challenging, but very important, problem that has n...
An algorithm has been developed to automatically construct individual models of normal activity within a home using motion sensor data. Alerts can be generated when a period of in...
Paul Cuddihy, Jenny Weisenberg, Catherine Graichen...