Sciweavers

PERCOM
2011
ACM
13 years 3 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
PERCOM
2011
ACM
13 years 3 months ago
Ranges of human mobility in Los Angeles and New York
—The advent of ubiquitous, mobile, personal devices creates an unprecedented opportunity to improve our understanding of human movement. In this work, we study human mobility in ...
Sibren Isaacman, Richard Becker, Ramón C&aa...
PERCOM
2011
ACM
13 years 3 months ago
Market mechanisms for Value of Information driven resource allocation in Sensor Networks
—This paper examines the possible uses of different market mechanisms for resource allocation at different levels of Wireless Sensor Network (WSN) architecture. The goal is to ma...
Boleslaw K. Szymanski, S. Yousaf Shah, Sahin Cem G...
PERCOM
2011
ACM
13 years 3 months ago
A self-powered adaptive wireless sensor network for wastewater treatment plants
Efficient monitoring and control of wastewater treatment plants (WWTPs) has become an important public issue as the cost of electricity continues to grow and the quality requiremen...
Yu Chen, Christopher M. Twigg, Omowunmi A. Sadik, ...
PERCOM
2011
ACM
13 years 3 months ago
A demonstration of PyViz, a flexible smart home visualization tool
—As smart home technologies continue to be deployed in research and real world environments, there continues to be a need for quality visualization of the smart home data. This d...
Brian L. Thomas, Aaron S. Crandall
PERCOM
2011
ACM
13 years 3 months ago
CASASviz: Web-based visualization of behavior patterns in smart environments
—The need to prolong the ability for older adults to live at home independently has become an important area of smart environment research. In this proposal, we demonstrate a web...
Chao Chen, Prafulla Dawadi
PERCOM
2011
ACM
13 years 3 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
PERCOM
2011
ACM
13 years 3 months ago
Pervasive urban crowdsourcing: Visions and challenges
—Pervasive computing technologies can enable very flexible situated collaboration patterns among citizens and, via crowdsourcing, can promote a participatory way of contributing ...
Franco Zambonelli
PERCOM
2011
ACM
13 years 3 months ago
Is ontology-based activity recognition really effective?
—While most activity recognition systems rely on data-driven approaches, the use of knowledge-driven techniques is gaining increasing interest. Research in this field has mainly...
Daniele Riboni, Linda Pareschi, Laura Radaelli, Cl...
QUESTA
2011
13 years 6 months ago
Large number of queues in tandem: Scaling properties under back-pressure algorithm
Abstract We consider a system with N unit-service-rate queues in tandem, with exogenous arrivals of rate λ at queue 1, under a back-pressure (MaxWeight) algorithm: service at queu...
Alexander L. Stolyar