Sciweavers

166 search results - page 18 / 34
» pervasive 2009
Sort
View
PERVASIVE
2009
Springer
14 years 5 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
PERVASIVE
2009
Springer
14 years 5 months ago
On the Anonymity of Home/Work Location Pairs
Abstract. Many applications benefit from user location data, but location data raises privacy concerns. Anonymization can protect privacy, but identities can sometimes be inferred...
Philippe Golle, Kurt Partridge
PERVASIVE
2009
Springer
14 years 5 months ago
RF-Based Initialisation for Inertial Pedestrian Tracking
Location information is an important source of context for ubiquitous computing systems. We have previously developed a wearable location system that combines a foot-mounted inerti...
Oliver Woodman, Robert Harle
PERVASIVE
2009
Springer
14 years 3 months ago
Users' View on Context-Sensitive Car Advertisements
Cars are ubiquitous and offer large and often highly visible surfaces that can be used as advertising space. Until now, advertising in this domain has focused on commercial vehicle...
Florian Alt, Christoph Evers, Albrecht Schmidt
PERVASIVE
2009
Springer
14 years 5 months ago
Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker
Research has demonstrated that information workers often manage several different computing devices in an effort to balance convenience, mobility, input efficiency, and content rea...
Amy K. Karlson, Brian Meyers, Andy Jacobs, Paul Jo...