Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
—The advent of ubiquitous, mobile, personal devices creates an unprecedented opportunity to improve our understanding of human movement. In this work, we study human mobility in ...
—This paper examines the possible uses of different market mechanisms for resource allocation at different levels of Wireless Sensor Network (WSN) architecture. The goal is to ma...
Boleslaw K. Szymanski, S. Yousaf Shah, Sahin Cem G...
Efficient monitoring and control of wastewater treatment plants (WWTPs) has become an important public issue as the cost of electricity continues to grow and the quality requiremen...
Yu Chen, Christopher M. Twigg, Omowunmi A. Sadik, ...
—As smart home technologies continue to be deployed in research and real world environments, there continues to be a need for quality visualization of the smart home data. This d...
—The need to prolong the ability for older adults to live at home independently has become an important area of smart environment research. In this proposal, we demonstrate a web...
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
—Pervasive computing technologies can enable very flexible situated collaboration patterns among citizens and, via crowdsourcing, can promote a participatory way of contributing ...
—While most activity recognition systems rely on data-driven approaches, the use of knowledge-driven techniques is gaining increasing interest. Research in this field has mainly...
Daniele Riboni, Linda Pareschi, Laura Radaelli, Cl...
Abstract We consider a system with N unit-service-rate queues in tandem, with exogenous arrivals of rate λ at queue 1, under a back-pressure (MaxWeight) algorithm: service at queu...