Sciweavers

PERVASIVE
2009
Springer
14 years 4 months ago
Users' View on Context-Sensitive Car Advertisements
Cars are ubiquitous and offer large and often highly visible surfaces that can be used as advertising space. Until now, advertising in this domain has focused on commercial vehicle...
Florian Alt, Christoph Evers, Albrecht Schmidt
PERVASIVE
2009
Springer
14 years 6 months ago
Exploring Privacy Concerns about Personal Sensing
Predrag V. Klasnja, Sunny Consolvo, Tanzeem Choudh...
PERVASIVE
2009
Springer
14 years 6 months ago
Enabling Pervasive Collaboration with Platform Composition
Abstract. Emerging pervasive computing technologies present many opportunities to aid ad-hoc collocated group collaboration. To better understand ad-hoc collaboration using pervasi...
Trevor Pering, Roy Want, Barbara Rosario, Shivani ...
PERVASIVE
2009
Springer
14 years 6 months ago
Realistic Driving Trips For Location Privacy
Simulated, false location reports can be an effective way to confuse a privacy attacker. When a mobile user must transmit his or her location to a central server, these location re...
John Krumm
PERVASIVE
2009
Springer
14 years 6 months ago
Landmark-Based Pedestrian Navigation with Enhanced Spatial Reasoning
Computer vision techniques can enhance landmark-based navigation by better utilizing online photo collections. We use spatial reasoning to compute camera poses, which are then regi...
Harlan Hile, Radek Grzeszczuk, Alan L. Liu, Ramakr...
PERVASIVE
2009
Springer
14 years 6 months ago
Inferring Identity Using Accelerometers in Television Remote Controls
Abstract. We show that accelerometers embedded in a television remote control can be used to distinguish household members based on the unique way each person wields the remote. Th...
Keng-hao Chang, Jeffrey Hightower, Branislav Kveto...
PERVASIVE
2009
Springer
14 years 6 months ago
RF-Based Initialisation for Inertial Pedestrian Tracking
Location information is an important source of context for ubiquitous computing systems. We have previously developed a wearable location system that combines a foot-mounted inerti...
Oliver Woodman, Robert Harle
PERVASIVE
2009
Springer
14 years 6 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
PERVASIVE
2009
Springer
14 years 6 months ago
PL-Tags: Detecting Batteryless Tags through the Power Lines in a Building
We present a system, called PL-Tags, for detecting the presence of batteryless tags in a building or home through the power lines. The excitation (or interrogation) and detection o...
Shwetak N. Patel, Erich P. Stuntebeck, Thomas Robe...
PERVASIVE
2009
Springer
14 years 6 months ago
Enhancing Navigation Information with Tactile Output Embedded into the Steering Wheel
Dagmar Kern, Paul Marshall, Eva Hornecker, Yvonne ...