—We present a visualization framework integrated in a context-aware system that uses a common underlying stream processing middleware for tight integration of data accessing, pro...
Harald Sanftmann, Nazario Cipriani, Daniel Weiskop...
—We study inference attacks that can be launched via the extension API of Facebook. We explain the threat of these attacks through a reduction to authentication attacks, devise a...
Seyed Hossein Ahmadinejad, Mohd M. Anwar, Philip W...
—As devices are expected to be aware of their environment, the challenge becomes how to accommodate these abilities with the power constraints which plague modern mobile devices....
Dawud Gordon, Stephan Sigg, Yong Ding, Michael Bei...
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
—The advent of ubiquitous, mobile, personal devices creates an unprecedented opportunity to improve our understanding of human movement. In this work, we study human mobility in ...
—This paper examines the possible uses of different market mechanisms for resource allocation at different levels of Wireless Sensor Network (WSN) architecture. The goal is to ma...
Boleslaw K. Szymanski, S. Yousaf Shah, Sahin Cem G...
Efficient monitoring and control of wastewater treatment plants (WWTPs) has become an important public issue as the cost of electricity continues to grow and the quality requiremen...
Yu Chen, Christopher M. Twigg, Omowunmi A. Sadik, ...
—As smart home technologies continue to be deployed in research and real world environments, there continues to be a need for quality visualization of the smart home data. This d...
—The need to prolong the ability for older adults to live at home independently has become an important area of smart environment research. In this proposal, we demonstrate a web...
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...