Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529511
S. Djahel, M. Salehie, Irina Tal, Pooyan Jamshidi
Rapid increase in number of vehicles on the roads as well as growing size of cities have led to a plethora of challenges for road traffic management authorities such as traffic congestion, accidents and air pollution. The work presented in this paper focuses on the particular problem of traffic management for emergency services, for which a delay of few minutes may cause human lives risks as well as financial losses. The goal is to reduce the latency of emergency services for vehicles such as ambulances and police cars, with minimum unnecessary disruption to the regular traffic, and preventing potential misuses. To this end, we propose to design a framework in which the Traffic Management System (TMS) may adapt by dynamically adjusting traffic lights, changing related driving policies, recommending behavior change to drivers, and applying essential security controls. The choice of an adaptation depends on the emergency severity level announced by the emergency vehicle(s). The severity level may need to be verified by corresponding authorities to preserve security measures. We discuss the details of our proposed framework and the potential challenges in the paper.
{"title":"Adaptive traffic management for secure and efficient emergency services in smart cities","authors":"S. Djahel, M. Salehie, Irina Tal, Pooyan Jamshidi","doi":"10.1109/PerComW.2013.6529511","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529511","url":null,"abstract":"Rapid increase in number of vehicles on the roads as well as growing size of cities have led to a plethora of challenges for road traffic management authorities such as traffic congestion, accidents and air pollution. The work presented in this paper focuses on the particular problem of traffic management for emergency services, for which a delay of few minutes may cause human lives risks as well as financial losses. The goal is to reduce the latency of emergency services for vehicles such as ambulances and police cars, with minimum unnecessary disruption to the regular traffic, and preventing potential misuses. To this end, we propose to design a framework in which the Traffic Management System (TMS) may adapt by dynamically adjusting traffic lights, changing related driving policies, recommending behavior change to drivers, and applying essential security controls. The choice of an adaptation depends on the emergency severity level announced by the emergency vehicle(s). The severity level may need to be verified by corresponding authorities to preserve security measures. We discuss the details of our proposed framework and the potential challenges in the paper.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529531
M. A. Kabir
Despite the huge prospects of pervasive social computing and the extensive work in context-aware applications, so far very limited work has focused on socially-aware applications. The key requirements to develop such applications are modeling, managing and reasoning about users' social contexts. To fulfil these requirements, in this PhD research, we have made an attempt to model, manage and reason about social contexts to aid the development of socially-aware applications. We study different types of social contexts, their use in various socially-aware applications and possible sources to acquire such social contexts. We will investigate existing context modeling and reasoning techniques and will propose an approach to modeling and reasoning about different types of social contexts. To aid the development of socially aware applications, we will provide a middleware platform for managing the acquisition, changes and provision of social contexts.
{"title":"Modeling, managing and reasoning about social contexts for socially-aware applications","authors":"M. A. Kabir","doi":"10.1109/PerComW.2013.6529531","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529531","url":null,"abstract":"Despite the huge prospects of pervasive social computing and the extensive work in context-aware applications, so far very limited work has focused on socially-aware applications. The key requirements to develop such applications are modeling, managing and reasoning about users' social contexts. To fulfil these requirements, in this PhD research, we have made an attempt to model, manage and reason about social contexts to aid the development of socially-aware applications. We study different types of social contexts, their use in various socially-aware applications and possible sources to acquire such social contexts. We will investigate existing context modeling and reasoning techniques and will propose an approach to modeling and reasoning about different types of social contexts. To aid the development of socially aware applications, we will provide a middleware platform for managing the acquisition, changes and provision of social contexts.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133442402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529546
V. Iyer, S. S. Iyengar, N. Pissinou, Shaolei Ren
The process of inversion, estimation and reconstruction of the sensor quality matrix, allows modeling the precision and accuracy, and in general the reliability of the model. When the sensor data ranges are not known a priori, current systems do not train on new data samples, rather they approximate based on the parameter's global average value, losing most of the spatial and temporal features. The proposed model, which we call SPOTLESS, checks the spatial integrity and temporal plausibility of streams generated by mobility patterns due to varying channel conditions. We define a minimum quality of the measured sensor data as local stream (QoD) requirements to give high precision by using distributed labeled training. In our SPOTLESS datacleaning steps, to account for packet errors due to varying channel conditions, a soft-phy based decoding is selected for various Bit Error Rates (BER), minimizing packet loss at the mobile receiver. Numerical experiments for Rayleigh fading channels and mobile BER model examples are compared with large deployment of ground sensor collecting static data streams and Data MULE collecting multi-hop temporal data from the sensor to provide hypothetical parameter accuracy. Our results were obtained in the context of provisioning a minimum precision and accuracy stream (QoD) required for 802.15.4 mobile services. SPOTLESS data-cleaning algorithm coding provides 90% precision for static streams, and increases the plausible relevance of multi-hop mobile streams by 85% for task-based learning.
{"title":"SPOTLESS: Similarity patterns of trajectories in label-less sensor streams","authors":"V. Iyer, S. S. Iyengar, N. Pissinou, Shaolei Ren","doi":"10.1109/PerComW.2013.6529546","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529546","url":null,"abstract":"The process of inversion, estimation and reconstruction of the sensor quality matrix, allows modeling the precision and accuracy, and in general the reliability of the model. When the sensor data ranges are not known a priori, current systems do not train on new data samples, rather they approximate based on the parameter's global average value, losing most of the spatial and temporal features. The proposed model, which we call SPOTLESS, checks the spatial integrity and temporal plausibility of streams generated by mobility patterns due to varying channel conditions. We define a minimum quality of the measured sensor data as local stream (QoD) requirements to give high precision by using distributed labeled training. In our SPOTLESS datacleaning steps, to account for packet errors due to varying channel conditions, a soft-phy based decoding is selected for various Bit Error Rates (BER), minimizing packet loss at the mobile receiver. Numerical experiments for Rayleigh fading channels and mobile BER model examples are compared with large deployment of ground sensor collecting static data streams and Data MULE collecting multi-hop temporal data from the sensor to provide hypothetical parameter accuracy. Our results were obtained in the context of provisioning a minimum precision and accuracy stream (QoD) required for 802.15.4 mobile services. SPOTLESS data-cleaning algorithm coding provides 90% precision for static streams, and increases the plausible relevance of multi-hop mobile streams by 85% for task-based learning.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131780643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529447
S. Vanini, S. Giordano
We present a technique for detecting floor changes in an indoor environment and improving pedestrian indoor localization and navigation. Our technique relies on barometric pressure sensors commonly available on smartphones and tablets. We developed an algorithm running on smart mobile devices that can be integrated in any indoor localization system to improve accuracy and support 3D navigation. The main novelty of our technique is that it can work in any type of environment, without any prior knowledge of the building layout, it does not require calibration and it is adaptive. Experimental results show that our method can accurately detect floor changes in any condition without requiring any additional work.
{"title":"Adaptive context-agnostic floor transition detection on smart mobile devices","authors":"S. Vanini, S. Giordano","doi":"10.1109/PerComW.2013.6529447","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529447","url":null,"abstract":"We present a technique for detecting floor changes in an indoor environment and improving pedestrian indoor localization and navigation. Our technique relies on barometric pressure sensors commonly available on smartphones and tablets. We developed an algorithm running on smart mobile devices that can be integrated in any indoor localization system to improve accuracy and support 3D navigation. The main novelty of our technique is that it can work in any type of environment, without any prior knowledge of the building layout, it does not require calibration and it is adaptive. Experimental results show that our method can accurately detect floor changes in any condition without requiring any additional work.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131959188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529536
Alexandru Popescu, Yong Yao, M. Fiedler, Adrian Popescu
Comprehensive communication in cognitive radio networks is an important research topic within the scope of empowering cognitive radio functionality in beyond-4G mobile networks. Providing communication for secondary users without interference with primary users is an ambitious task, which requires innovative management architecture designs and routing solutions. Operational challenges such as opportunistic spectrum access, solving problems related to spectrum and network heterogeneities and requests for the provisioning of Quality-of-Service to different applications must be resolved. As part of a novel management architecture, the paper advances a new approach to end-to-end communication in cognitive radio networks based on combining ad-hoc algorithms with spectrum mobility algorithms.
{"title":"Communication mechanisms for cognitive radio networks","authors":"Alexandru Popescu, Yong Yao, M. Fiedler, Adrian Popescu","doi":"10.1109/PerComW.2013.6529536","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529536","url":null,"abstract":"Comprehensive communication in cognitive radio networks is an important research topic within the scope of empowering cognitive radio functionality in beyond-4G mobile networks. Providing communication for secondary users without interference with primary users is an ambitious task, which requires innovative management architecture designs and routing solutions. Operational challenges such as opportunistic spectrum access, solving problems related to spectrum and network heterogeneities and requests for the provisioning of Quality-of-Service to different applications must be resolved. As part of a novel management architecture, the paper advances a new approach to end-to-end communication in cognitive radio networks based on combining ad-hoc algorithms with spectrum mobility algorithms.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130222359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529459
Yusuke Ariyoshi, J. Kamahara, Naoki Tanaka, K. Hirayama, Takashi Nagamatsu, Y. Teranishi
In this article, we propose a geoconscious content-based image retrieval system based on a P2P mobile agent framework. This system retrieves similar photographs from an image database of location-dependent photographs (e.g., photos of buildings, landmarks, etc.), which use GPS positions for geo-tagging. The P2P mobile agent framework supports intelligent agents. This agent searches similar content image using a query photograph by traversing the P2P network, instead of the mobile device issuing the query. In this paper, we describe the design of the proposed system and a portion of its implementation. This prototype system produces a new peer and rearranges the placement of image agents among peers for workload balancing. Furthermore, we provide the experimental results of our implementation for managing location-dependent image agents, which are clustered with peers in a distributed Delaunay network.
{"title":"Location-dependent content-based image retrieval system based on a P2P mobile agent framework","authors":"Yusuke Ariyoshi, J. Kamahara, Naoki Tanaka, K. Hirayama, Takashi Nagamatsu, Y. Teranishi","doi":"10.1109/PerComW.2013.6529459","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529459","url":null,"abstract":"In this article, we propose a geoconscious content-based image retrieval system based on a P2P mobile agent framework. This system retrieves similar photographs from an image database of location-dependent photographs (e.g., photos of buildings, landmarks, etc.), which use GPS positions for geo-tagging. The P2P mobile agent framework supports intelligent agents. This agent searches similar content image using a query photograph by traversing the P2P network, instead of the mobile device issuing the query. In this paper, we describe the design of the proposed system and a portion of its implementation. This prototype system produces a new peer and rearranges the placement of image agents among peers for workload balancing. Furthermore, we provide the experimental results of our implementation for managing location-dependent image agents, which are clustered with peers in a distributed Delaunay network.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130273048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529533
Sara Khalifa
This paper describes the work in progress of converting context to indoor position using built-in smartphone sensors. This research will ultimately contribute towards a self-sufficient indoor positioning system that works without any interaction with a pre-deployed communication infrastructure. Such selfsufficiency is desired from several points of view. It makes the system more scalable, privacy-preserving (no communication means less chances of privacy leakage), and energy-efficient (radio interfaces consume orders of magnitude more energy than MEMS sensors, such as accelerometers).
{"title":"Converting context to indoor position using built-in smartphone sensors","authors":"Sara Khalifa","doi":"10.1109/PerComW.2013.6529533","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529533","url":null,"abstract":"This paper describes the work in progress of converting context to indoor position using built-in smartphone sensors. This research will ultimately contribute towards a self-sufficient indoor positioning system that works without any interaction with a pre-deployed communication infrastructure. Such selfsufficiency is desired from several points of view. It makes the system more scalable, privacy-preserving (no communication means less chances of privacy leakage), and energy-efficient (radio interfaces consume orders of magnitude more energy than MEMS sensors, such as accelerometers).","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134590001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529549
Christian Raffelsberger, H. Hellwagner
Emergency response operations are a promising application area for mobile ad-hoc networks (MANETs). Most existing MANET routing protocols assume that an end-to-end path between source and destination can be established. However, this assumption may not hold in a hastily formed network established during an emergency response. This paper evaluates a store-and-forward mechanism for proactive routing protocols to mitigate the effects of network disruptions. The mechanism is integrated into two routing protocols. The modified protocols are evaluated in an emergency response scenario that includes a disaster area mobility model and a wireless obstacle model. The scenario represents a realistic first responder operation after an incident in a chemical facility. The evaluation results show that networks for disaster responses benefit from the modified routing protocols.
{"title":"A hybrid MANET-DTN routing scheme for emergency response scenarios","authors":"Christian Raffelsberger, H. Hellwagner","doi":"10.1109/PerComW.2013.6529549","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529549","url":null,"abstract":"Emergency response operations are a promising application area for mobile ad-hoc networks (MANETs). Most existing MANET routing protocols assume that an end-to-end path between source and destination can be established. However, this assumption may not hold in a hastily formed network established during an emergency response. This paper evaluates a store-and-forward mechanism for proactive routing protocols to mitigate the effects of network disruptions. The mechanism is integrated into two routing protocols. The modified protocols are evaluated in an emergency response scenario that includes a disaster area mobility model and a wireless obstacle model. The scenario represents a realistic first responder operation after an incident in a chemical facility. The evaluation results show that networks for disaster responses benefit from the modified routing protocols.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129491641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529502
Wolfgang Apolinarski, M. Handte, Muhammad Umer Iqbal, P. Marrón
This demonstration presents PIKE, a piggybacked key exchange protocol that uses social networks (like Facebook) or business tools (like Google Calendar) to enable secure personal interaction. PIKE minimizes the configuration effort that is necessary to set up a secure communication channel among a set of devices. To do this, it piggybacks the exchange of cryptographic keys on existing online services which perform user authentication and enable the (secure) sharing of resources. To support encryption or authentication without Internet connection, PIKE relies on the automatic detection of triggers for upcoming personal interactions and exchanges keys before they take place. To demonstrate the broad applicability of PIKE, we present two example applications that show how its secure key exchange can be used in the real world. The first application uses PIKE to automatically share resources - in our case the readings of a GPS receiver - among a set of devices, when an event takes place. The second application relies on PIKE to enable the secure and automatic identification of individual visitors at the registration desk of a conference.
{"title":"PIggy-backed key exchange using online services (PIKE)","authors":"Wolfgang Apolinarski, M. Handte, Muhammad Umer Iqbal, P. Marrón","doi":"10.1109/PerComW.2013.6529502","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529502","url":null,"abstract":"This demonstration presents PIKE, a piggybacked key exchange protocol that uses social networks (like Facebook) or business tools (like Google Calendar) to enable secure personal interaction. PIKE minimizes the configuration effort that is necessary to set up a secure communication channel among a set of devices. To do this, it piggybacks the exchange of cryptographic keys on existing online services which perform user authentication and enable the (secure) sharing of resources. To support encryption or authentication without Internet connection, PIKE relies on the automatic detection of triggers for upcoming personal interactions and exchanges keys before they take place. To demonstrate the broad applicability of PIKE, we present two example applications that show how its secure key exchange can be used in the real world. The first application uses PIKE to automatically share resources - in our case the readings of a GPS receiver - among a set of devices, when an event takes place. The second application relies on PIKE to enable the secure and automatic identification of individual visitors at the registration desk of a conference.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114287103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-18DOI: 10.1109/PerComW.2013.6529534
S. VanSyckel
Pervasive computing applications can adjust their behavior to a multitude of information deemed to be relevant for their situation, their so-called context. Thus far, however, adaptation in such context-aware systems is reactive and limited to the application itself. These restrictions inevitably delay adjustments to events. They cause frequent reconfigurations, and may result in inferior overall system configurations. In this paper, we present our work in progress on middleware-based system support for proactive adaptation. It offers context information, prediction, and influence via a uniform abstraction, update notifications for subscribed context or predictions, and an application model to determine adaptation alternatives.
{"title":"Middleware-based system support for proactive adaptation in pervasive environments","authors":"S. VanSyckel","doi":"10.1109/PerComW.2013.6529534","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529534","url":null,"abstract":"Pervasive computing applications can adjust their behavior to a multitude of information deemed to be relevant for their situation, their so-called context. Thus far, however, adaptation in such context-aware systems is reactive and limited to the application itself. These restrictions inevitably delay adjustments to events. They cause frequent reconfigurations, and may result in inferior overall system configurations. In this paper, we present our work in progress on middleware-based system support for proactive adaptation. It offers context information, prediction, and influence via a uniform abstraction, update notifications for subscribed context or predictions, and an application model to determine adaptation alternatives.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123794518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}