Sciweavers

49 search results - page 5 / 10
» pervasive 2011
Sort
View
PERVASIVE
2011
Springer
13 years 19 days ago
Identifying Important Places in People's Lives from Cellular Network Data
People spend most of their time at a few key locations, such as home and work. Being able to identify how the movements of people cluster around these “important places” is cru...
Sibren Isaacman, Richard Becker, Ramón C&aa...
PERVASIVE
2011
Springer
13 years 19 days ago
Designing Shared Public Display Networks - Implications from Today's Paper-Based Notice Areas
Large public displays have become a regular conceptual element in many shops and businesses, where they advertise products or highlight upcoming events. In our work, we are interes...
Florian Alt, Nemanja Memarovic, Ivan Elhart, Domin...
PERVASIVE
2011
Springer
13 years 19 days ago
Disaggregated End-Use Energy Sensing for the Smart Grid
Most utility installed energy meters are primarily intended to support a utility's billing function. They report only the aggregate energy consumption of a home or business o...
Jon Froehlich, Eric Larson, Sidhant Gupta, Gabe Co...
JCS
2011
126views more  JCS 2011»
13 years 4 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
ICDCS
2011
IEEE
12 years 9 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu