The Community for Technology Leaders
2013 IEEE International Conference on Pervasive Computing and Communications (PerCom) (2007)
White Plains, New York, USA
Mar. 19, 2007 to Mar. 23, 2007
ISBN: 0-7695-2787-6
TABLE OF CONTENTS
Introduction

Program Committee (PDF)

pp. xi-xii

Reviewers (PDF)

pp. xiii
Session 1: RFID

Severless Search and Authentication Protocols for RFID (Abstract)

Qun Li , College of William and Mary, USA
Chiu C. Tan , College of William and Mary, USA
Bo Sheng , College of William and Mary, USA
pp. 3-12

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems (Abstract)

Yunhao Liu , Hong Kong University of Science and Technology, Hong Kong
Lionel M. Ni , Hong Kong University of Science and Technology, Hong Kong
Li Lu , Graduate School of Chinese Academy of Sciences, China
Jinsong Han , Hong Kong University of Science and Technology, Hong Kong
Lei Hu , Graduate School of Chinese Academy of Sciences, China
pp. 13-22

Energy-Aware Tag Anti-Collision Protocols for RFID Systems (Abstract)

Lixin Gao , University of Massachusetts at Amherst, USA
Vinod Namboodiri , University of Massachusetts at Amherst, USA
pp. 23-36
Session 2: Best Papers

Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays (Abstract)

Qiuxia Chen , Hong Kong University of Science and Technology, Hong Kong
Lei Chen , Hong Kong University of Science and Technology, Hong Kong
Jian Pei , Simon Fraser University, Canada
Yiyang Zhao , Hong Kong University of Science and Technology, Hong Kong
Yunhao Liu , Hong Kong University of Science and Technology, Hong Kong
pp. 37-46

BlueTorrent: Cooperative Content Sharing for Bluetooth Users (Abstract)

Sewook Jung , University of California, Los Angeles, USA
Mario Gerla , University of California, Los Angeles, USA
Uichin Lee , University of California, Los Angeles, USA
Dae-Ki Cho , University of California, Los Angeles, USA
Alexander Chang , University of California, Los Angeles, USA
pp. 47-56

A Local Data Abstraction and Communication Paradigm for Pervasive Computing (Abstract)

Christine Julien , The University of Texas at Austin, USA
Sanem Kabadayi , The University of Texas at Austin, USA
pp. 57-68
Session 3: Middleware and Applications

The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario (Abstract)

Luca Mottola , Politecnico di Milano, Italy
Richard Gold , University College London, UK
Gian Pietro Picco , Politecnico di Milano, Italy; University of Trento, Italy
Cecilia Mascolo , University College London, UK
Thirunavukkarasu Sivaharan , Lancaster University, UK
Paolo Costa , Politecnico di Milano, Italy
Manish Lad , University College London, UK
Geoff Coulson , Lancaster University, UK
Nirmal Weerasinghe , Lancaster University, UK
Stefanos Zachariadis , University College London, UK
pp. 69-78

Designing Ubiquitous Computing Systems for Sports Equipment (Abstract)

Matthias Kranz , University of Munich, Germany
Wolfgang Spiessl , University of Munich, Germany
Albrecht Schmidt , University of Munich, Germany
pp. 79-86

Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection (Abstract)

Marco Mamei , Universita di Modena e Reggio Emilia, Italy
Radhika Nagpal , Harvard University, USA
pp. 87-96
Session 4: Application Design and Development

Supporting Domain Experts in Creating Pervasive Experiences (Abstract)

Danius T. Michaelides , University of Southampton, UK
Don Cruickshank , University of Southampton, UK
Mark J. Weal , University of Southampton, UK
Katherine Howland , University of Sussex, UK
Geraldine Fitzpatrick , University of Sussex, UK
pp. 108-113

An Aspect-Oriented Approach to the Modularisation of Context (Abstract)

Serena Fritsch , Trinity College Dublin, Ireland
Jennifer Munnelly , Trinity College Dublin, Ireland
Siobhan Clarke , Trinity College Dublin, Ireland
pp. 114-124
Session 5: Localization and its Applications

The SkyLoc Floor Localization System (Abstract)

Eyal de Lara , University of Toronto
Alex Varshavsky , University of Toronto
Anthony LaMarca , Intel Research Seattle
Jeffrey Hightower , Intel Research Seattle
pp. 125-134

An RF-Based System for Tracking Transceiver-Free Objects (Abstract)

Dian Zhang , Hong Kong University of Science and Technology, Hong Kong
Jian Ma , Hong Kong University of Science and Technology, Hong Kong
Lionel M. Ni , Hong Kong University of Science and Technology, Hong Kong
Quanbin Chen , Hong Kong University of Science and Technology, Hong Kong
pp. 135-144

Overhearing the Wireless Interface for 802.11-Based Positioning Systems (Abstract)

Thomas Haenselmann , University of Mannheim, Germany
Wolfgang Effelsberg , University of Mannheim, Germany
Stephan Kopf , University of Mannheim, Germany
Thomas King , University of Mannheim, Germany
pp. 145-150

A Scalable Geographic Service Provision Framework for Mobile Ad Hoc Networks (Abstract)

Xiaojing Xiang , State University of New York at Buffalo, USA
Xin Wang , State University of New York at Stony Brook, USA
pp. 151-160
Session 6: End-User Experience

A Wall-Sized Focus Plus Context Display (Abstract)

Sebastian Boring , University of Munich, Germany
Andreas Butz , University of Munich, Germany
Otmar Hilliges , University of Munich, Germany
pp. 161-170

A Capacitive Sensing Toolkit for Pervasive Activity Detection and Recognition (Abstract)

Raphael Wimmer , University of Munich, Germany
Sebastian Boring , University of Munich, Germany
Albrecht Schmidt , University of Bonn, Germany
Matthias Kranz , University of Munich, Germany
pp. 171-180

Using Digital Cameras for Text Input on Mobile Devices (Abstract)

Muhammad Haroon , European Microsoft Innovation Center, Germany
Frank Siegemund , European Microsoft Innovation Center, Germany
pp. 181-190
Session 7: Security

Securing Distributed Data Storage and Retrieval in Sensor Networks (Abstract)

Chanjun Yang , Iowa State University, USA
Wensheng Zhang , Iowa State University, USA
Nalin Subramanian , Iowa State University, USA
pp. 191-200

SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks (Abstract)

Klara Nahrstedt , Department of Computer Science, Illinois
Wenbo He , Department of Computer Science, Illinois
Ying Huang , Department of Computer Science, Illinois
Whay C. Lee , Motorola Labs, USA
pp. 201-210

Physically Unclonable Function-Based Security and Privacy in RFID Systems (Abstract)

Leonid Bolotnyy , University of Virginia, USA
Gabriel Robins , University of Virginia, USA
pp. 211-220
Session 8: Data Management and Usage

Structural Learning of Activities from Sparse Datasets (Abstract)

Adrian Friday , Lancaster University, UK
Nigel Davies , Lancaster University, UK
Fahd Albinali , University of Arizona, USA
pp. 221-228

A Simple Model and Infrastructure for Context-Aware Browsing of the World (Abstract)

Alberto Rosi , Universita di Modena e Reggio Emilia, Italy
Marco Mamei , Universita di Modena e Reggio Emilia, Italy
Franco Zambonelli , Universita di Modena e Reggio Emilia, Italy
Gabriella Castelli , Universita di Modena e Reggio Emilia, Italy
pp. 229-238

Achieving Flexible Cache Consistency for Pervasive Internet Access (Abstract)

Yulin Feng , Chinese Academy of Sciences, China
Jiannong Cao , Hong Kong Polytechnic Univ., Hong Kong
Yu Huang , Hong Kong Polytechnic Univ., Hong Kong; Chinese Academy of Sciences, China
Zhijun Wang , Hong Kong Polytechnic Univ., Hong Kong
Beihong Jin , Chinese Academy of Sciences, China
pp. 239-250
Session 9: Interacting with the User

Automatic Generation of Device User-Interfaces? (Abstract)

Olufisayo Omojokun , Georgia Institute of Technology, USA
Prasun Dewan , University of North Carolina at Chapel Hill, USA
pp. 251-261

Supporting Mobile Service Usage through Physical Mobile Interaction (Abstract)

Gregor Broll , University of Munich, Germany
Massimo Paolucci , DoCoMo Euro-Labs, Germany
John Hamard , DoCoMo Euro-Labs, Germany
Matthias Wagner , DoCoMo Euro-Labs, Germany
Albrecht Schmidt , University of Bonn, Germany
Sven Siorpaes , University of Munich, Germany
Enrico Rukzio , Lancaster University, UK
pp. 262-271

SHAD: A Human-Centered Security Architecture for the Plan B Operating System (Abstract)

Gorka Guardiola , Universidad Rey Juan Carlos, Spain
Francisco J. Ballesteros , Universidad Rey Juan Carlos, Spain
Enrique Soriano , Universidad Rey Juan Carlos, Spain
pp. 272-282
Author Index

Author Index (PDF)

pp. 283
104 ms
(Ver 3.3 (11022016))