default search action
4th PerCom 2006: Pisa, Italy
- 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 13-17 March 2006, Pisa, Italy. IEEE Computer Society 2006, ISBN 0-7695-2518-0
Introduction
- Message from the General Chairs.
- Message from the Program Chair and Vice Chairs.
- Organizing Committee.
- Program Committee Members.
- Reviewers.
Pervasive Systems
- Farooq Ahmad, Petr Musílek:
A Keystroke and Pointer Control Input Interface for Wearable Computers. 2-11 - Andrew C. Rice, Alastair R. Beresford, Robert K. Harle:
Cantag: an open source software toolkit for designing and deploying marker-based vision systems. 12-21 - Takuya Maekawa, Takahiro Hara, Shojiro Nishio:
A Collaborative Web Browsing System for Multiple Mobile Users. 22-35
Session 2A: Sensors and RFIDs (Concise Contributions)
- Timo Salminen, Simo Hosio, Jukka Riekki:
Enhancing Bluetooth Connectivity with RFID. 36-41 - Ke Liu, Nael B. Abu-Ghazaleh, Kyoung-Don Kang:
JiTS: Just-in-Time Scheduling for Real-Time Sensor Data Dissemination. 42-46 - Cesare Alippi, Giovanni Vanini:
Application-based routing optimization in static/semi-staticWireless Sensor Networks. 47-51 - Chulsung Park, Pai H. Chou, Yicun Sun:
AWearableWireless Sensor Platform for Interactive Dance Performances. 52-59
Session 2B: User Interfaces and Interaction Models (Concise Contributions)
- John J. Barton, Stina Nylander, Fopefolu O. Folowosele, Beverly L. Harrison:
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation. 60-65 - Jaana Leikas, Hanna Strömberg, Veikko Ikonen, Riku Suomela, Juhani Heinilä:
Multi-User Mobile Applications and a Public Display: Novel Ways for Social Interaction. 66-70 - Mandayam T. Raghunath, Nishkam Ravi, Marcel-Catalin Rosu, Chandra Narayanaswami:
Inverted Browser: A Novel Approach towards Display Symbiosis. 71-76 - Francisco J. Ballesteros, Gorka Guardiola Muzquiz, Katia Leal Algara, Enrique Soriano:
Omero: Ubiquitous User Interfaces in the Plan B Operating System. 77-83
Session 3: Pervasive Networking
- Duck Gun Park, Jin Kyung Kim, Jin Bong Sung, Jung Hwan Hwang, Chang Hee Hyung, Sung Weon Kang:
Context Aware Service Using Intra-body Communication. 84-91 - Sven D. Hermann, Günter Schäfer, Adam Wolisz, Michael Lipka:
Concept for Hierarchical and Distributed Processing of Area Based Triggers. 92-102 - Tae Hyun Kim, Jae Yeol Ha, Sunghyun Choi, Wook Hyun Kwon:
Virtual Channel Management for Densely Deployed IEEE 802.15.4 LR-WPANs. 103-115
Session 4: Resource Management in Pervasive Systems
- Shumao Ou, Kun Yang, Antonio Liotta:
An Adaptive Multi-Constraint Partitioning Algorithm for Offloading in Pervasive Systems. 116-125 - Francisco J. Ballesteros, Enrique Soriano, Katia Leal Algara, Gorka Guardiola Muzquiz:
Plan B: An Operating System for Ubiquitous Computing Environments. 126-135 - Alexandros Karypidis, Spyros Lalis:
OmniStore: A system for ubiquitous personal storage management. 136-147
Session 5: Best Paper Candidates
- Nirmalya Roy, Abhishek Roy, Sajal K. Das:
Context-Aware Resource Management in Multi-Inhabitant Smart Homes: A Nash H-Learning based Approach. 148-158 - Jonathan Gips, Alex Pentland:
Mapping Human Networks. 159-168 - Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
Is Your Cat Infected with a Computer Virus?. 169-179
Session 6: Sensor Networks
- Hejun Wu, Qiong Luo, Wenwei Xue:
Distributed Cross-Layer Scheduling for In-Network Sensor Query Processing. 180-189 - Wen Hu, Archan Misra, Rajeev Shorey:
CAPS: Energy-Efficient Processing of Continuous Aggregate Queries in Sensor Networks. 190-199 - Yingqi Xu, Wang-Chien Lee:
Exploring Spatial Correlation for Link Quality Estimation in Wireless Sensor Networks. 200-211
Session 7: Security
- Feng Zhu, Matt W. Mutka, Lionel M. Ni:
The Master Key: A Private Authentication Approach for Pervasive Computing Environments. 212-221 - Urs Hengartner, Peter Steenkiste:
Avoiding Privacy Violations Caused by Context-Sensitive Services. 222-233
Session 8A: Pervasive Computing and Context Awareness (Concise Contributions)
- Chetan Shiva Shankar, Roy H. Campbell:
Ordering Management Actions in Pervasive Systems using Specification-enhanced Policies. 234-238 - Torben Weis, Marcus Handte, Mirko Knoll, Christian Becker:
Customizable Pervasive Applications. 239-244 - Vlaho Kostov, Takashi Tajima, Eiichi Naito, Jun Ozawa:
Analysis of Appropriate Timing for Information Notification Based on Indoor User's Location Transition. 245-250 - Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. Venkatasubramanian:
Criticality Aware Access Control Model for Pervasive Applications. 251-257
Session 8B: Discovery and Location (Concise Contributions)
- Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed:
An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments. 258-263 - Dominic Heutelbeck, Matthias L. Hemmje:
A Peer-to-Peer Data Structure for Dynamic Location Data. 264-268 - Tassos Dimitriou:
A Secure and Efficient RFID Protocol that could make Big Brother (partially) Obsolete. 269-275
Session 9: Architectures and Platforms for Pervasive Environments
- Swaroop Kalasapur, Mohan Kumar, Behrooz A. Shirazi:
Evaluating Service Oriented Architectures (SOA) in Pervasive Computing. 276-285 - Federico Cabitza, Marco P. Locatelli, Marcello Sarini, Carla Simone:
CASMAS: Supporting Collaboration in Pervasive Environments. 286-295 - Alan Messer, Anugeetha Kunjithapatham, Mithun Sheshagiri, Henry Song, Praveen Kumar, Phuong Nguyen, Kyoung Hoon Yi:
InterPlay: A Middleware for Seamless Device Integration and Task Orchestration in a Networked Home. 296-307
Session 10: Self-organizing Networks
- Vinay Kolar, Nael B. Abu-Ghazaleh:
A Multi-Commodity Flow Approach for Globally Aware Routing in Multi-Hop Wireless Networks. 308-317 - Imad Jawhar, Jie Wu:
Resource Allocation in Wireless Networks Using Directional Antennas. 318-327 - Antoine Gallais, Jean Carle, David Simplot-Ryl, Ivan Stojmenovic:
Localized Sensor Area Coverage with Low Communication Overhead. 328-337
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.