Location information is an important source of context for ubiquitous computing systems. We have previously developed a wearable location system that combines a foot-mounted inerti...
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
We present a system, called PL-Tags, for detecting the presence of batteryless tags in a building or home through the power lines. The excitation (or interrogation) and detection o...
Shwetak N. Patel, Erich P. Stuntebeck, Thomas Robe...
Abstract. We propose a new type of input for mobile devices by sensing forces applied by users to device casings. Deformation of the devices is not necessary for such “force gest...
Information sharing has undeniably become ubiquitous in the Internet age. The global village created on the Internet provides people with instant access to information and news on ...
This paper presents novel methodologies for the analysis of continuous cellular tower data from 215 randomly sampled subjects in a major urban city. We demonstrate the potential of...
Abstract. Many applications benefit from user location data, but location data raises privacy concerns. Anonymization can protect privacy, but identities can sometimes be inferred...
Abstract. One of the key challenges faced when developing contextaware pervasive systems is to capture the set of inputs that we want a system to adapt to. Arbitrarily specifying r...
Adrian K. Clear, Ross Shannon, Thomas Holland, Aar...
Research has demonstrated that information workers often manage several different computing devices in an effort to balance convenience, mobility, input efficiency, and content rea...
Amy K. Karlson, Brian Meyers, Andy Jacobs, Paul Jo...