Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529573
P. Cottone, G. Re, Gabriele Maida, M. Morana
In recent years, Ambient Intelligence (AmI) has attracted a number of researchers due to the widespread diffusion of unobtrusive sensing devices. The availability of such a great amount of acquired data has driven the interest of the scientific community in producing novel methods for combining raw measurements in order to understand what is happening in the monitored scenario. Moreover, due the primary role of the end user, an additional requirement of any AmI system is to maintain a high level of pervasiveness. In this paper we propose a method for recognizing human activities by means of a time of flight (ToF) depth and RGB camera device, namely Microsoft Kinect. The proposed approach is based on the estimation of some relevant joints of the human body by using Kinect depth information. The most significative configurations of joints positions are combined by a clustering approach and classified by means of a multi-class Support Vector Machine. Then, Hidden Markov Models (HMMs) are applied to model each activity as a sequence of known postures. The proposed solution has been tested on a public dataset while considering four different configurations corresponding to some state-of-the-art approaches and results are very promising. Moreover, in order to maintain a high level of pervasiveness, we implemented a real prototype by connecting Kinect sensor to a miniature computer capable of real-time processing.
{"title":"Motion sensors for activity recognition in an ambient-intelligence scenario","authors":"P. Cottone, G. Re, Gabriele Maida, M. Morana","doi":"10.1109/PerComW.2013.6529573","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529573","url":null,"abstract":"In recent years, Ambient Intelligence (AmI) has attracted a number of researchers due to the widespread diffusion of unobtrusive sensing devices. The availability of such a great amount of acquired data has driven the interest of the scientific community in producing novel methods for combining raw measurements in order to understand what is happening in the monitored scenario. Moreover, due the primary role of the end user, an additional requirement of any AmI system is to maintain a high level of pervasiveness. In this paper we propose a method for recognizing human activities by means of a time of flight (ToF) depth and RGB camera device, namely Microsoft Kinect. The proposed approach is based on the estimation of some relevant joints of the human body by using Kinect depth information. The most significative configurations of joints positions are combined by a clustering approach and classified by means of a multi-class Support Vector Machine. Then, Hidden Markov Models (HMMs) are applied to model each activity as a sequence of known postures. The proposed solution has been tested on a public dataset while considering four different configurations corresponding to some state-of-the-art approaches and results are very promising. Moreover, in order to maintain a high level of pervasiveness, we implemented a real prototype by connecting Kinect sensor to a miniature computer capable of real-time processing.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129981316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529509
Bin Guo, Zhiwen Yu, Xingshe Zhou, Daqing Zhang
Human memory is important yet often not easy to be handled in daily life. Many challenges are raised, such as how to enhance memory recall and reminiscence, how to facilitate memory sharing in terms of people's social nature. This paper proposes MemPhone, a new system that addresses various human memory needs by using the mobile tagging (e.g., RFID, barcodes) technique. By linking human memory or experience with associated physical objects, MemPhone can i) augment memory externalization and recall, and ii) build object-based social networks (OBSNs) to enhance memory sharing. By embedding physical contexts into SNs, the OBSN can strengthen friendships by enabling serendipity discovering and nurture new connections among people with shared memories. Early studies indicate that our system can facilitate memory recall and shared memory discovery.
{"title":"MemPhone: From personal memory aid to community memory sharing using mobile tagging","authors":"Bin Guo, Zhiwen Yu, Xingshe Zhou, Daqing Zhang","doi":"10.1109/PerComW.2013.6529509","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529509","url":null,"abstract":"Human memory is important yet often not easy to be handled in daily life. Many challenges are raised, such as how to enhance memory recall and reminiscence, how to facilitate memory sharing in terms of people's social nature. This paper proposes MemPhone, a new system that addresses various human memory needs by using the mobile tagging (e.g., RFID, barcodes) technique. By linking human memory or experience with associated physical objects, MemPhone can i) augment memory externalization and recall, and ii) build object-based social networks (OBSNs) to enhance memory sharing. By embedding physical contexts into SNs, the OBSN can strengthen friendships by enabling serendipity discovering and nurture new connections among people with shared memories. Early studies indicate that our system can facilitate memory recall and shared memory discovery.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130810914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529528
G. Bahle, P. Lukowicz, K. Kunze, K. Kise
In this paper we investigate how vision based devices (cameras or the Kinect controller) that happen to be in the users' environment can be used to improve and fine tune on body sensor systems for activity recognition. Thus we imagine a user with his on body activity recognition system passing through a space with a video camera (or a Kinect), picking up some information, and using it to improve his system. The general idea is to correlate an anonymous ”stick figure” like description of the motion of a user's body parts provided by the vision system with the sensor signals as a means of analyzing the sensors' properties. In the paper we for example demonstrate how such a correlation can be used to determine, without the need to train any classifiers, on which body part a motion sensor is worn.
{"title":"I see you: How to improve wearable activity recognition by leveraging information from environmental cameras","authors":"G. Bahle, P. Lukowicz, K. Kunze, K. Kise","doi":"10.1109/PerComW.2013.6529528","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529528","url":null,"abstract":"In this paper we investigate how vision based devices (cameras or the Kinect controller) that happen to be in the users' environment can be used to improve and fine tune on body sensor systems for activity recognition. Thus we imagine a user with his on body activity recognition system passing through a space with a video camera (or a Kinect), picking up some information, and using it to improve his system. The general idea is to correlate an anonymous ”stick figure” like description of the motion of a user's body parts provided by the vision system with the sensor signals as a means of analyzing the sensors' properties. In the paper we for example demonstrate how such a correlation can be used to determine, without the need to train any classifiers, on which body part a motion sensor is worn.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127090751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529538
W. Su
This paper discusses the use of asynchronous low-cost sensors in distributed locations for sensing and classifying weak wireless signals. This weak signal may not be identified by using a single sensor alone, but can be detected and classified by fusing multiple weak signals collected by sensor networks. The asynchronous signal copies have unwanted offsets in time, frequency, and phase due to the diversities in local oscillators and unknown communication channels. This work proposes a post-synchronization method to estimate and compensate for offsets in the fusion process without adjusting the sensor parameters. The properly combined signal from the distributed sensors achieves a higher processing gain for reliable signal exploitation.
{"title":"Signal sensing and modulation classification using pervasive sensor networks","authors":"W. Su","doi":"10.1109/PerComW.2013.6529538","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529538","url":null,"abstract":"This paper discusses the use of asynchronous low-cost sensors in distributed locations for sensing and classifying weak wireless signals. This weak signal may not be identified by using a single sensor alone, but can be detected and classified by fusing multiple weak signals collected by sensor networks. The asynchronous signal copies have unwanted offsets in time, frequency, and phase due to the diversities in local oscillators and unknown communication channels. This work proposes a post-synchronization method to estimate and compensate for offsets in the fusion process without adjusting the sensor parameters. The properly combined signal from the distributed sensors achieves a higher processing gain for reliable signal exploitation.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529468
Maria Garcia Puyol, P. Robertson, M. Angermann
Pedestrian navigation in indoor environments without a pre-installed infrastructure still presents many challenges. There are different approaches that address the problem using prior knowledge about the environment when the building plans or similar are available. Since this is not always the case, a family of technologies based on the principle of Simultaneous Localization and Mapping (SLAM) has been proposed. In this paper we will present some estimates on how a mapping process based on FootSLAM - a form of SLAM for pedestrians - might scale for a large-scale collaborative effort eventually encompassing most of our public indoor space, where the mapping entities are humans. Our assumptions on pedestrian motion and area visiting rate together with calculations based on the computational requirements of pedestrian SLAM algorithms allow us to make estimates with regard to the feasibility, scalability and computational cost of wide-scale mapping of indoor areas by pedestrians.
{"title":"Managing large-scale mapping and localization for pedestrians using inertial sensors","authors":"Maria Garcia Puyol, P. Robertson, M. Angermann","doi":"10.1109/PerComW.2013.6529468","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529468","url":null,"abstract":"Pedestrian navigation in indoor environments without a pre-installed infrastructure still presents many challenges. There are different approaches that address the problem using prior knowledge about the environment when the building plans or similar are available. Since this is not always the case, a family of technologies based on the principle of Simultaneous Localization and Mapping (SLAM) has been proposed. In this paper we will present some estimates on how a mapping process based on FootSLAM - a form of SLAM for pedestrians - might scale for a large-scale collaborative effort eventually encompassing most of our public indoor space, where the mapping entities are humans. Our assumptions on pedestrian motion and area visiting rate together with calculations based on the computational requirements of pedestrian SLAM algorithms allow us to make estimates with regard to the feasibility, scalability and computational cost of wide-scale mapping of indoor areas by pedestrians.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529554
G. Loukas, D. Gan, Tuan Vuong
Emergency management is increasingly dependent on networks for information gathering, coordination and physical system control, and consequently is increasingly vulnerable to network failures. A cyber attack could cause such network failures intentionally, so as to impede the work of first responders and maximise the impact of a physical emergency. We propose a taxonomy of existing and potential research that is relevant in this setting, covering attack types that have already occurred or are likely to occur, and defence mechanisms that are already in use or would be applicable.
{"title":"A taxonomy of cyber attack and defence mechanisms for emergency management networks","authors":"G. Loukas, D. Gan, Tuan Vuong","doi":"10.1109/PerComW.2013.6529554","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529554","url":null,"abstract":"Emergency management is increasingly dependent on networks for information gathering, coordination and physical system control, and consequently is increasingly vulnerable to network failures. A cyber attack could cause such network failures intentionally, so as to impede the work of first responders and maximise the impact of a physical emergency. We propose a taxonomy of existing and potential research that is relevant in this setting, covering attack types that have already occurred or are likely to occur, and defence mechanisms that are already in use or would be applicable.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"407 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116034593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529517
Bastian Könings, F. Schaub, M. Weber
The combination and integration of sensing and interaction capabilities with almost ubiquitous inter-connectivity are basic requirements for context-aware systems to unobtrusively and invisibly support users in their daily activities. However, the invisible nature of such systems also threatens users' privacy. Users often lack awareness about a system's capabilities to gather data or to intervene in user activities, or even the system's presence. We propose a model to enhance user-centric privacy awareness by consistently modeling observations and disturbances of users. The model allows to capture who is affecting a user's privacy, how privacy is affected, and why it is affected. We further discuss how this model can be instantiated with discovery of channel policies.
{"title":"Who, how, and why? Enhancing privacy awareness in Ubiquitous Computing","authors":"Bastian Könings, F. Schaub, M. Weber","doi":"10.1109/PerComW.2013.6529517","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529517","url":null,"abstract":"The combination and integration of sensing and interaction capabilities with almost ubiquitous inter-connectivity are basic requirements for context-aware systems to unobtrusively and invisibly support users in their daily activities. However, the invisible nature of such systems also threatens users' privacy. Users often lack awareness about a system's capabilities to gather data or to intervene in user activities, or even the system's presence. We propose a model to enhance user-centric privacy awareness by consistently modeling observations and disturbances of users. The model allows to capture who is affecting a user's privacy, how privacy is affected, and why it is affected. We further discuss how this model can be instantiated with discovery of channel policies.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529460
Chuan-Chi Lai, Chuan-Ming Liu, Ying-Chi Su
As the mobile computing environment emerges, people can use different mobile devices to access information ubiquitously. This has shifted the researchers' sights to Mobile P2P (MP2P) systems, where the membership among peers is more dynamic and ad hoc. In the ubiquitous environments, the mobile devices generally are heterogeneous. In this paper, we consider the MP2P systems where the mobile peers are heterogeneous and propose a mechanism, named Heterogeneity-aware Overlay Technique (HOT), to build up an unstructured overlay. The proposed mechanism considers the overall ability, including power, network, CPU, and memory to set up the overlay. An ability equation is thus defined and the resulting overlay can ensure a good quality of service while the topology mismatching problem is alleviated. Last, we present our simulation for the proposed mechanism and compare the results with other related approaches. The simulation result shows that our proposed mechanism can effectively achieve a better service quality and mitigate the topology mismatching problem.
{"title":"A novel mechanism to construct a compatible overlay on heterogeneous mobile peers","authors":"Chuan-Chi Lai, Chuan-Ming Liu, Ying-Chi Su","doi":"10.1109/PerComW.2013.6529460","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529460","url":null,"abstract":"As the mobile computing environment emerges, people can use different mobile devices to access information ubiquitously. This has shifted the researchers' sights to Mobile P2P (MP2P) systems, where the membership among peers is more dynamic and ad hoc. In the ubiquitous environments, the mobile devices generally are heterogeneous. In this paper, we consider the MP2P systems where the mobile peers are heterogeneous and propose a mechanism, named Heterogeneity-aware Overlay Technique (HOT), to build up an unstructured overlay. The proposed mechanism considers the overall ability, including power, network, CPU, and memory to set up the overlay. An ability equation is thus defined and the resulting overlay can ensure a good quality of service while the topology mismatching problem is alleviated. Last, we present our simulation for the proposed mechanism and compare the results with other related approaches. The simulation result shows that our proposed mechanism can effectively achieve a better service quality and mitigate the topology mismatching problem.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125387883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529515
A. Najjar, P. Reignier
Building a smart home is a multi-disciplinary and challenging problem. Our goal is to build an agent that can propose context aware services to the users. High variability of users' needs and the uniqueness of every home are difficult to handle using “Classical AI”. We propose an alternative approach inspired by Developmental Artificial Intelligence and Constructivism Theory. Being constructivist means that the agent builds its knowledge in situ through user's interactions. This continuous interaction process enables the user to customize or bring up the system to meet his personal needs. We have made a first experiment by learning schemas from a simulated two-weeks home scenario. This preliminary experiment gives us indications that Constructivism is a promising approach for ambient intelligence.
{"title":"Constructivist ambient intelligent agent for smart environments","authors":"A. Najjar, P. Reignier","doi":"10.1109/PerComW.2013.6529515","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529515","url":null,"abstract":"Building a smart home is a multi-disciplinary and challenging problem. Our goal is to build an agent that can propose context aware services to the users. High variability of users' needs and the uniqueness of every home are difficult to handle using “Classical AI”. We propose an alternative approach inspired by Developmental Artificial Intelligence and Constructivism Theory. Being constructivist means that the agent builds its knowledge in situ through user's interactions. This continuous interaction process enables the user to customize or bring up the system to meet his personal needs. We have made a first experiment by learning schemas from a simulated two-weeks home scenario. This preliminary experiment gives us indications that Constructivism is a promising approach for ambient intelligence.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125402267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529485
Michela Papandrea, Matteo Zignani, S. Gaito, S. Giordano, G. P. Rossi
People mobility enormously augmented in the last decades. However, despite the increased possibilities of fast reaching far places, the places that a person commonly visits remain limited in number. The number of visited places of each person is regulated by some laws that are statistically similar among individuals. In our previous work, we firstly argued that a person visit most frequently always few places, and we confirmed that by some initial experiments. Here, in addition to further validating this result, we build a more sophisticate view of the places visited by the people. Namely, on top of our previous work, which identifies the class of Mostly Visited Points of Interest, we define two next classes: the Occasionally and the Exceptionally Visited Points of Interest classes. We argue and validate on real data, that also the occasional places are very limited in number, while the exceptional ones can grow at will, and by the analysis of the classes of visited points we can distinguish the type of users mobility. This paper firstly demonstrates this property in large experimental scenario, and put the basis for new understanding of people places in several areas as localization, social interactions and human mobility modelling.
{"title":"How many places do you visit a day?","authors":"Michela Papandrea, Matteo Zignani, S. Gaito, S. Giordano, G. P. Rossi","doi":"10.1109/PerComW.2013.6529485","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529485","url":null,"abstract":"People mobility enormously augmented in the last decades. However, despite the increased possibilities of fast reaching far places, the places that a person commonly visits remain limited in number. The number of visited places of each person is regulated by some laws that are statistically similar among individuals. In our previous work, we firstly argued that a person visit most frequently always few places, and we confirmed that by some initial experiments. Here, in addition to further validating this result, we build a more sophisticate view of the places visited by the people. Namely, on top of our previous work, which identifies the class of Mostly Visited Points of Interest, we define two next classes: the Occasionally and the Exceptionally Visited Points of Interest classes. We argue and validate on real data, that also the occasional places are very limited in number, while the exceptional ones can grow at will, and by the analysis of the classes of visited points we can distinguish the type of users mobility. This paper firstly demonstrates this property in large experimental scenario, and put the basis for new understanding of people places in several areas as localization, social interactions and human mobility modelling.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127079238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}