Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 12:00 PM ET (12:00 - 16:00 UTC). We apologize for the inconvenience.
By Topic

Pervasive Computing, IEEE

Issue 1 • Date Jan.-Mar. 2014

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2014 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1338 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014 , Page(s): c2 - 1
    Save to Project icon | Request Permissions | PDF file iconPDF (2625 KB)  
    Freely Available from IEEE
  • The Road Ahead: Diverse and Digital

    Publication Year: 2014 , Page(s): 2 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (284 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • 3D Printing, Smart Cities, Robots, and More

    Publication Year: 2014 , Page(s): 6 - 9
    Save to Project icon | Request Permissions | PDF file iconPDF (1461 KB)  
    Freely Available from IEEE
  • From Photography to Ubiquitous Capture Systems

    Publication Year: 2014 , Page(s): 10 - 13
    Save to Project icon | Request Permissions | PDF file iconPDF (1916 KB)  
    Freely Available from IEEE
  • ISWC 2013--Wearables Are Here to Stay

    Publication Year: 2014 , Page(s): 14 - 18
    Save to Project icon | Request Permissions | PDF file iconPDF (3846 KB)  
    Freely Available from IEEE
  • Attention Management in Pervasive Computing [Guest Editorial]

    Publication Year: 2014 , Page(s): 19 - 21
    Save to Project icon | Request Permissions | PDF file iconPDF (3296 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Sensor-Based Identification of Opportune Moments for Triggering Notifications

    Publication Year: 2014 , Page(s): 22 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1530 KB)  

    Today's smartphones will issue a notification immediately after an event occurs, repeating unanswered notifications in fixed time intervals. The disadvantage of this issue-and-repeat strategy is that notifications can appear in inconvenient situations and thus are perceived as annoying and interrupting. The authors study the mobile context as inferred through a phone's sensors for both answered and ignored notifications. They conducted a large-scale, longitudinal study via the Google Play store and observed 6,581 notifications from 79 different users over 76 days. Their derived model can predict opportune moments to issue notifications with approximately 77 percent accuracy. Their findings could lead to intelligent strategies to issue unobtrusive notifications on today's smartphones at no extra cost. This article is part of a special issue on managing attention. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Attention Using Ambient FM Radio Signals

    Publication Year: 2014 , Page(s): 30 - 36
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2985 KB)  

    The authors investigate the classification of FM radio signal fluctuation for monitoring the attention of individuals moving toward a static object. In particular, they distinguish between an empty and populated corridor and, for the latter, determine whether the individuals are moving or standing still and whether they're directing their attention toward a particular poster. This information can provide some hint whether a person is paying attention to a specific poster as well as the location of the particular poster. This article is part of a special issue on managing attention. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ePub [Advertisement]

    Publication Year: 2014 , Page(s): 37
    Save to Project icon | Request Permissions | PDF file iconPDF (3144 KB)  
    Freely Available from IEEE
  • Using Augmented Reality to Help Children with Autism Stay Focused

    Publication Year: 2014 , Page(s): 38 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2078 KB)  

    Children with autism have difficulty sustaining their selective attention during therapy sessions. Attention management techniques involve the use of verbal and visual prompting, annotated on top of the physical objects used during therapies. Here, the authors explore how augmented reality helps integrate the physical and digital worlds, mimicking current strategies for attention management in autism. They describe their design decisions when developing the Mobile Object Identification System (Mobis), a mobile augmented reality application that lets teachers superimpose digital content on top of physical objects. The results of a five-week deployment study demonstrate that Mobis is useful and easy to use, increases the sustained and selective attention of children with autism, and elicits positive emotions during therapies. This article is part of a special issue on managing attention. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSDA and CSDP [Advertisement]

    Publication Year: 2014 , Page(s): 47
    Save to Project icon | Request Permissions | PDF file iconPDF (1284 KB)  
    Freely Available from IEEE
  • Attention, Please!

    Publication Year: 2014 , Page(s): 48 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2651 KB) |  | HTML iconHTML  

    The rise of the digital information age to the zettabyte-storage and terabit-communication level has made exploring attention scarcity and the relationship between attention and behavior the critical element in designing today's pervasive computing systems. Researchers and practitioners are challenged to build on attention research and the diverse theories and models it has produced to address issues of information and sensory overload. Ultimately, we must create a bridge between the fundamental results from specific attentional processes, created by research work in psychology and neuroscience, and the endeavors to apply these results to HCI in general and pervasive computing in particular. This department is part of a special issue on managing attention. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Membership Matters [Advertisement]

    Publication Year: 2014 , Page(s): 55
    Save to Project icon | Request Permissions | PDF file iconPDF (628 KB)  
    Freely Available from IEEE
  • The Clash between Privacy and Automation in Social Media

    Publication Year: 2014 , Page(s): 56 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1338 KB) |  | HTML iconHTML  

    Classic research on human factors has found that automation never fully eliminates the human operator from the loop. Instead, it shifts the operator's responsibilities to the machine and changes the operator's control demands, sometimes with adverse consequences, called the "ironies of automation." In this article, the authors revisit the problem of automation in the era of social media, focusing on privacy concerns. Present-day social media automatically discloses information, such as users' whereabouts, likings, and undertakings. This review of empirical studies exposes three recurring privacy-related issues in automated disclosure: insensitivity to situational demands, inadequate control of nuance and veracity, and inability to control disclosure with service providers and third parties. The authors claim that "all-or-nothing" automation has proven problematic and that social network services should design their user controls with all stages of the disclosure process in mind. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ConvenienceProbe: A Phone-Based System for Retail Trade-Area Analysis

    Publication Year: 2014 , Page(s): 64 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1988 KB)  

    Systematically and quantitatively determining patterns in consumer flow is an important problem in marketing research. Identifying these patterns can facilitate an understanding of where and when consumers purchase products and services at physical retail shops. Collecting data on real consumers who shop at retail stores is one of the most challenging and expensive aspects of these studies. This article introduces ConvenienceProbe, a phone-based data collection system for retail trade-area analysis. The proposed method targets local residents shopping at neighborhood convenience stores. This study deploys and tests the system by collecting real customer flow data in neighborhood convenience stores. Results show that the consumer flow data collected from the ConvenienceProbe system is comparable to that from a traditional face-to-face interview method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID in Underground-Mining Service Applications

    Publication Year: 2014 , Page(s): 72 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5910 KB) |  | HTML iconHTML  

    This overview of RFID in underground mining service applications is set against the backdrop of the major challenges this technology must overcome for successful implementation in rugged environments. It also considers future prospects of RFID in the mining industry. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UbiComp 2013

    Publication Year: 2014 , Page(s): 80 - 83
    Save to Project icon | Request Permissions | PDF file iconPDF (2040 KB)  
    Freely Available from IEEE
  • Designing an Energy-Efficient Cloud Messaging Service for Smartphones

    Publication Year: 2014 , Page(s): 84 - 88
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1557 KB)  

    This article compares two rate-control approaches that a cloud messaging service can use to deliver notifications for a variety of applications. The author reviews the pros and cons of the two approaches in terms of metrics such as latency, fairness, and overhead related to carrier network signaling and battery life of the user device. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conferences in the Palm of Your Hand [Advertisement]

    Publication Year: 2014 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (917 KB)  
    Freely Available from IEEE
  • IEEE Cloud Computing

    Publication Year: 2014 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (403 KB)  
    Freely Available from IEEE

Aims & Scope

All aspects of current mobile computing research and applications development, including architectures, support services, algorithms and protocols, mobile environments, mobile communication systems, applications, emerging technologies, and societal impacts.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dr. Roy Want
Intel Research