By Topic

Pervasive Computing, IEEE

Issue 1 • Date Jan.-Mar. 2014

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2014 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1338 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014 , Page(s): c2 - 1
    Save to Project icon | Request Permissions | PDF file iconPDF (2625 KB)  
    Freely Available from IEEE
  • The Road Ahead: Diverse and Digital

    Publication Year: 2014 , Page(s): 2 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (284 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • 3D Printing, Smart Cities, Robots, and More

    Publication Year: 2014 , Page(s): 6 - 9
    Save to Project icon | Request Permissions | PDF file iconPDF (1461 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • From Photography to Ubiquitous Capture Systems

    Publication Year: 2014 , Page(s): 10 - 13
    Save to Project icon | Request Permissions | PDF file iconPDF (1916 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • ISWC 2013--Wearables Are Here to Stay

    Publication Year: 2014 , Page(s): 14 - 18
    Save to Project icon | Request Permissions | PDF file iconPDF (3846 KB)  
    Freely Available from IEEE
  • Attention Management in Pervasive Computing [Guest Editorial]

    Publication Year: 2014 , Page(s): 19 - 21
    Save to Project icon | Request Permissions | PDF file iconPDF (3296 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Sensor-Based Identification of Opportune Moments for Triggering Notifications

    Publication Year: 2014 , Page(s): 22 - 29
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1530 KB) |  | HTML iconHTML  

    Today's smartphones will issue a notification immediately after an event occurs, repeating unanswered notifications in fixed time intervals. The disadvantage of this issue-and-repeat strategy is that notifications can appear in inconvenient situations and thus are perceived as annoying and interrupting. The authors study the mobile context as inferred through a phone's sensors for both answered an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Attention Using Ambient FM Radio Signals

    Publication Year: 2014 , Page(s): 30 - 36
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2985 KB) |  | HTML iconHTML  

    The authors investigate the classification of FM radio signal fluctuation for monitoring the attention of individuals moving toward a static object. In particular, they distinguish between an empty and populated corridor and, for the latter, determine whether the individuals are moving or standing still and whether they're directing their attention toward a particular poster. This information can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ePub [Advertisement]

    Publication Year: 2014 , Page(s): 37
    Save to Project icon | Request Permissions | PDF file iconPDF (3144 KB)  
    Freely Available from IEEE
  • Using Augmented Reality to Help Children with Autism Stay Focused

    Publication Year: 2014 , Page(s): 38 - 46
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2078 KB) |  | HTML iconHTML  

    Children with autism have difficulty sustaining their selective attention during therapy sessions. Attention management techniques involve the use of verbal and visual prompting, annotated on top of the physical objects used during therapies. Here, the authors explore how augmented reality helps integrate the physical and digital worlds, mimicking current strategies for attention management in aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSDA and CSDP [Advertisement]

    Publication Year: 2014 , Page(s): 47
    Save to Project icon | Request Permissions | PDF file iconPDF (1284 KB)  
    Freely Available from IEEE
  • Attention, Please!

    Publication Year: 2014 , Page(s): 48 - 54
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2651 KB) |  | HTML iconHTML  

    The rise of the digital information age to the zettabyte-storage and terabit-communication level has made exploring attention scarcity and the relationship between attention and behavior the critical element in designing today's pervasive computing systems. Researchers and practitioners are challenged to build on attention research and the diverse theories and models it has produced to address iss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Membership Matters [Advertisement]

    Publication Year: 2014 , Page(s): 55
    Save to Project icon | Request Permissions | PDF file iconPDF (628 KB)  
    Freely Available from IEEE
  • The Clash between Privacy and Automation in Social Media

    Publication Year: 2014 , Page(s): 56 - 63
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1338 KB) |  | HTML iconHTML  

    Classic research on human factors has found that automation never fully eliminates the human operator from the loop. Instead, it shifts the operator's responsibilities to the machine and changes the operator's control demands, sometimes with adverse consequences, called the "ironies of automation." In this article, the authors revisit the problem of automation in the era of social media, focusing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ConvenienceProbe: A Phone-Based System for Retail Trade-Area Analysis

    Publication Year: 2014 , Page(s): 64 - 71
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1988 KB) |  | HTML iconHTML  

    Systematically and quantitatively determining patterns in consumer flow is an important problem in marketing research. Identifying these patterns can facilitate an understanding of where and when consumers purchase products and services at physical retail shops. Collecting data on real consumers who shop at retail stores is one of the most challenging and expensive aspects of these studies. This a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID in Underground-Mining Service Applications

    Publication Year: 2014 , Page(s): 72 - 79
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (5910 KB) |  | HTML iconHTML  

    This overview of RFID in underground mining service applications is set against the backdrop of the major challenges this technology must overcome for successful implementation in rugged environments. It also considers future prospects of RFID in the mining industry. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UbiComp 2013

    Publication Year: 2014 , Page(s): 80 - 83
    Save to Project icon | Request Permissions | PDF file iconPDF (2040 KB)  
    Freely Available from IEEE
  • Designing an Energy-Efficient Cloud Messaging Service for Smartphones

    Publication Year: 2014 , Page(s): 84 - 88
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1557 KB) |  | HTML iconHTML  

    This article compares two rate-control approaches that a cloud messaging service can use to deliver notifications for a variety of applications. The author reviews the pros and cons of the two approaches in terms of metrics such as latency, fairness, and overhead related to carrier network signaling and battery life of the user device. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conferences in the Palm of Your Hand [Advertisement]

    Publication Year: 2014 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (917 KB)  
    Freely Available from IEEE
  • IEEE Cloud Computing

    Publication Year: 2014 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (403 KB)  
    Freely Available from IEEE

Aims & Scope

All aspects of current mobile computing research and applications development, including architectures, support services, algorithms and protocols, mobile environments, mobile communication systems, applications, emerging technologies, and societal impacts.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dr. Roy Want
Intel Research