Sciweavers

90 search results - page 8 / 18
» Tracking User Mobility to Detect Suspicious Behavior.
Sort
View
MONET
2007
106views more  MONET 2007»
13 years 6 months ago
Shakra: Tracking and Sharing Daily Activity Levels with Unaugmented Mobile Phones
This paper explores the potential for use of an unaugmented commodity technology—the mobile phone— as a health promotion tool. We describe a prototype application that tracks t...
Ian Anderson, Julie Maitland, Scott Sherwood, Loui...
IWCMC
2010
ACM
14 years 14 days ago
Group detection in mobility traces
—Analysis and modeling of wireless networks greatly depend on understanding the structure of underlying mobile nodes. In this paper we present two clustering algorithms to determ...
Yung-Chih Chen, Elisha J. Rosensweig, Jim Kurose, ...
MOBICOM
2010
ACM
13 years 7 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
AMR
2008
Springer
264views Multimedia» more  AMR 2008»
13 years 9 months ago
An Approach to Automatically Tracking Music Preference on Mobile Players
More and more music is being made available to the music listener today, while people have their favorite music on their mobile players. In this paper, we investigate an approach t...
Tim Pohle, Klaus Seyerlehner, Gerhard Widmer
UIC
2009
Springer
14 years 2 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...