By Topic

IEEE Pervasive Computing

Issue 4 • Date Oct.-Dec. 2013

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1546 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (4163 KB)
    Freely Available from IEEE
  • Take the Money and Run

    Publication Year: 2013, Page(s):2 - 4
    Request permission for commercial reuse | PDF file iconPDF (630 KB) | HTML iconHTML
    Freely Available from IEEE
  • Smile-Encouraging Digital Appliances

    Publication Year: 2013, Page(s):5 - 7
    Request permission for commercial reuse | PDF file iconPDF (1961 KB) | HTML iconHTML
    Freely Available from IEEE
  • New Kinds of Gadgets, Interactions, and Ubicomp Visions

    Publication Year: 2013, Page(s):8 - 11
    Request permission for commercial reuse | PDF file iconPDF (1643 KB) | HTML iconHTML
    Freely Available from IEEE
  • Bluetooth LE Finds Its Niche

    Publication Year: 2013, Page(s):12 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2075 KB) | HTML iconHTML

    The Internet of Things and sensor networks have been described as integral to the future of computing, yet neither has experienced widespread adoption. Could the Bluetooth Low Energy (LE) protocol be the missing link? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Edge of the Cloud

    Publication Year: 2013, Page(s):17 - 19
    Request permission for commercial reuse | PDF file iconPDF (3336 KB) | HTML iconHTML
    Freely Available from IEEE
  • Capturing Urban Dynamics with Scarce Check-In Data

    Publication Year: 2013, Page(s):20 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5042 KB) | HTML iconHTML

    The authors describe their analysis of three months' worth of collected human-physical environment interactions (Foursquare check-in) data for a medium-sized city in Greece. Their analysis shows that although the data generated by the citizens is scarce (on average, fewer than 10 users checked in at any time during the day), they could use it to build a good model of the city's dynamics. The autho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Membership [advertisement]

    Publication Year: 2013, Page(s): 29
    Request permission for commercial reuse | PDF file iconPDF (866 KB)
    Freely Available from IEEE
  • Leveraging Cloudlets for Immersive Collaborative Applications

    Publication Year: 2013, Page(s):30 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3329 KB) | HTML iconHTML

    Cyber foraging has already proven to be successful for enabling resource-intensive applications on mobile devices. Offloading applications, or parts thereof, to nearby infrastructure - also denoted as cloudlets - can lower execution time and save energy. However, in view of immersive applications, two challenges still remain. First, due to the real-time constraints of immersive applications, optim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Focus on your job search [advertisement]

    Publication Year: 2013, Page(s): 39
    Request permission for commercial reuse | PDF file iconPDF (776 KB)
    Freely Available from IEEE
  • The Role of Cloudlets in Hostile Environments

    Publication Year: 2013, Page(s):40 - 49
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3902 KB) | HTML iconHTML

    The convergence of mobile computing and cloud computing is predicated on a reliable, high-bandwidth end-to-end network. This basic requirement is hard to guarantee in hostile environments such as military operations and disaster recovery. In this article, the authors examine how VM-based cloudlets that are located in close proximity to associated mobile devices can overcome this challenge. This ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Concerns in Popular Cloud Storage Services

    Publication Year: 2013, Page(s):50 - 57
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3387 KB) | HTML iconHTML

    The authors provide a systematic security analysis on the sharing methods of three major cloud storage and synchronization services: Dropbox, Google Drive, and Microsoft SkyDrive. They show that all three services have security weaknesses that may result in data leakage without users' awareness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pervasive Displays 2013

    Publication Year: 2013, Page(s):58 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (2737 KB)
    Freely Available from IEEE
  • Nearby Friend Alert: Location Anonymity in Mobile Geosocial Networks

    Publication Year: 2013, Page(s):62 - 70
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4123 KB) | HTML iconHTML

    Mobile geosocial networking services could be the killer app for next-generation mobile computing. However, the privacy issue--in particular, location privacy--has both users and government authors concerned. The authors address this issue for the "nearby friend alert" service, common in mobile geosocial networks. They review representative works on privacy-preserving proximity detection and prese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing now [advertisement]

    Publication Year: 2013, Page(s): 71
    Request permission for commercial reuse | PDF file iconPDF (6124 KB)
    Freely Available from IEEE
  • Evaluating Ambient Assisted Living Solutions: The Localization Competition

    Publication Year: 2013, Page(s):72 - 79
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4956 KB) | HTML iconHTML

    Evaluation of ambient assisted living (AAL) systems is particularly challenging due to the complexity of such systems and the variety of solutions adopted and services offered. Yet analyzing and comparing AAL solutions is paramount for assessing research results in this area. Evaluating AAL Systems through Competitive Benchmarking (EvAAL) is a recently established international competition that ai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Everyday Patient-Care Technologies for Alzheimer's Disease

    Publication Year: 2013, Page(s):80 - 83
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (907 KB) | HTML iconHTML

    The Alzheimer's Association has stimulated collaboration and scientific advancement in preventing and treating Alzheimer's disease by bringing together leading researchers developing technological approaches offering promise in this area. This year, the Alzheimer's Association collaborated with the International Society to Advance Alzheimer's Research and Treatment to organize the first Technology... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MobiSys 2013

    Publication Year: 2013, Page(s):84 - 88
    Request permission for commercial reuse | PDF file iconPDF (764 KB)
    Freely Available from IEEE
  • Conferences in the palm of your hand [advertisement]

    Publication Year: 2013, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (958 KB)
    Freely Available from IEEE
  • Lucky LISA '13: 27th Large Installation System Administration Conference

    Publication Year: 2013, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (2256 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Pervasive Computing explores the role of computing in the physical world–as characterized by visions such as the Internet of Things and Ubiquitous Computing. Designed for researchers, practitioners, and educators, this publication acts as a catalyst for realizing the ideas described by Mark Weiser in 1988.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Maria R. Ebling, Ph.D.
IBM T. J. Watson Research Center