By Topic

Pervasive Computing, IEEE

Issue 2 • Date April-June 2013

Filter Results

Displaying Results 1 - 16 of 16
  • Front Cover

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2488 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (2230 KB)
    Freely Available from IEEE
  • Privacy By Design [From the Editor in Chief]

    Publication Year: 2013, Page(s):2 - 4
    Request permission for commercial reuse | PDF file iconPDF (548 KB) | HTML iconHTML Multimedia Media
    Freely Available from IEEE
  • Ubiquitous Connectivity in the Mountains: Enhancing the Ski Experience

    Publication Year: 2013, Page(s):5 - 9
    Request permission for commercial reuse | PDF file iconPDF (5080 KB) | HTML iconHTML
    Freely Available from IEEE
  • Personal Touch-Identification Tokens

    Publication Year: 2013, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1664 KB) | HTML iconHTML

    Touch-based personal tokens would let devices unobtrusively identify who is interacting with the device at any given time. Devices could then tailor services to users and control access to sensitive information and online services. The authors present an approach for using a wearable personal token, in the form of a ring, to send an identification code to devices through touch. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Project Glass: An Extension of the Self

    Publication Year: 2013, Page(s):14 - 16
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2226 KB) | HTML iconHTML

    Soon, Google Glass will be worn by many users as part of the Glass Explorers Program. However, to get to this point, Google first hired many of the academics who have worn such devices as part of their everyday lives. Here, Thad Starner discusses how he got hooked on HUDs and why he thinks wearable interfaces will help users pay attention to the real world as opposed to retreating from it. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial: Implementing a Pedestrian Tracker Using Inertial Sensors

    Publication Year: 2013, Page(s):17 - 27
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3736 KB) | HTML iconHTML Multimedia Media

    Shoe-mounted inertial sensors offer a convenient way to track pedestrians in situations where other localization systems fail. This tutorial outlines a simple yet effective approach for implementing a reasonably accurate tracker. This Web extra presents the Matlab implementation and a few sample recordings for implementing the pedestrian inertial tracking system using an error-state Kalman filter ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Stress Arousal in the Wild

    Publication Year: 2013, Page(s):28 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4237 KB) | HTML iconHTML

    Wearable sensors can provide continuous biosignal measurements, which systems can use to infer psychological stress arousal. The authors deploy such sensors to monitor a public speaker, an on-stage musician, an Olympic ski jumper, and people during everyday life, quantifying stress arousal in varying contexts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking Trash

    Publication Year: 2013, Page(s):38 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7054 KB) | HTML iconHTML

    Using active self-reporting tags, the authors followed 2,000 objects through Seattle's waste management system. By making the waste "removal chain" more transparent, they help reveal the disposal process of everyday objects, highlighting potential inefficiencies in the current removal system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Wireless Sensor Network for Greenhouse Climate Control

    Publication Year: 2013, Page(s):49 - 58
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5899 KB) | HTML iconHTML

    Using a wireless sensor network, the authors developed an online microclimate monitoring and control system for greenhouses. They field-tested the system in a greenhouse in Punjab, India, evaluating its measurement capabilities and network performance in real time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Based Applications in Converged Networks: Beyond SIMPLE Presence

    Publication Year: 2013, Page(s):59 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3496 KB) | HTML iconHTML

    The authors present a large-scale presence virtualization and federation platform that federates across heterogeneous presence domains, letting applications exploit cross-domain contextual data. The platform also provides a programmable interface for customized context queries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Social Semantics from Multimodal Meeting Content

    Publication Year: 2013, Page(s):68 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3770 KB) | HTML iconHTML

    Extracting social semantics from multimodal meeting content can help meeting participants, organizers, and sponsors better understand the social dynamics of exchanging information. The authors present a framework for extracting both low-level (individual) and high-level (group) semantics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Closing the Evaluation Gap in UbiHealth Research

    Publication Year: 2013, Page(s):76 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Much is to be learned from working with health science research teams closely on longer-term projects to evaluate technology-enabled interventions that support health and wellness. The author's participation on a long-term randomized clinical trial, which has required substantial technical development and maintenance efforts, has provided valuable insight into difficult problems of ensuring long-t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AutomotiveUI: Interacting with Technology in Vehicles

    Publication Year: 2013, Page(s):80 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (957 KB) | HTML iconHTML
    Freely Available from IEEE
  • Distance Learning: A Postgraduate PerCom Program

    Publication Year: 2013, Page(s):83 - 85
    Request permission for commercial reuse | PDF file iconPDF (617 KB) | HTML iconHTML
    Freely Available from IEEE
  • From GPS Shoes to Instrumented Cities: Food for Thought

    Publication Year: 2013, Page(s):86 - 88
    Request permission for commercial reuse | PDF file iconPDF (699 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

All aspects of current mobile computing research and applications development, including architectures, support services, algorithms and protocols, mobile environments, mobile communication systems, applications, emerging technologies, and societal impacts.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Maria R. Ebling, Ph.D.
IBM T. J. Watson Research Center