By Topic

IEEE Pervasive Computing

Issue 2 • Date Apr.-June. 2014

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2014, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (553 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (4903 KB)
    Freely Available from IEEE
  • Pervasive Change Challenges Elders

    Publication Year: 2014, Page(s):2 - 4
    Request permission for commercial reuse | PDF file iconPDF (270 KB) | HTML iconHTML Multimedia Media
    Freely Available from IEEE
  • A Note on Smart Textiles

    Publication Year: 2014, Page(s):5 - 6
    Request permission for commercial reuse | PDF file iconPDF (330 KB) | HTML iconHTML
    Freely Available from IEEE
  • Wearable Computing

    Publication Year: 2014, Page(s):7 - 9
    Request permission for commercial reuse | PDF file iconPDF (2299 KB) | HTML iconHTML
    Freely Available from IEEE
  • Digital Health Devices for Everyone!

    Publication Year: 2014, Page(s):10 - 13
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (2112 KB) | HTML iconHTML
    Freely Available from IEEE
  • Leveraging Wi-Fi Signals to Monitor Human Queues

    Publication Year: 2014, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1305 KB) | HTML iconHTML

    A new approach exploits existing Wi-Fi infrastructure to extract unique Wi-Fi signal patterns from the smartphones of people in lines to estimate wait times. The approach can work under real-world queue scenarios in various environments without requiring a specialized infrastructure or incurring manpower overhead. Furthermore, it only requires that a small fraction of people waiting in line use Wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction 
  • Pervasive Analytics and Citizen Science [Guest editors' introduction]

    Publication Year: 2014, Page(s):18 - 19
    Request permission for commercial reuse | PDF file iconPDF (1512 KB) | HTML iconHTML
    Freely Available from IEEE
  • Pervasive Analytics and Citizen Science 
  • Taking Participatory Citizen Science to Extremes

    Publication Year: 2014, Page(s):20 - 29
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1929 KB) | HTML iconHTML

    University College London's Extreme Citizen Science research group (UCL ExCiteS) is experimenting with ways to incorporate the most marginalized communities into participatory citizen science activities through which they can share their indigenous knowledge. The group works with communities at the extremes of the globalized world--both because of nonliteracy and the remote or forbidding environme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Urban Deprivation from Foursquare: Implicit Crowdsourcing of City Land Use

    Publication Year: 2014, Page(s):30 - 36
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1069 KB) | HTML iconHTML

    Research has shown a relationship between the physical characteristics of a city neighborhood (such as the presence of playgrounds and fast-food outlets) and neighborhood deprivation as defined in socioeconomic indices. Official land-use data has often been the source for such research. This article examines the viability of using social-networking data as an alternative source. The authors study ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Private Information from Public Data: The Transantiago Case

    Publication Year: 2014, Page(s):37 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2459 KB) | HTML iconHTML

    Transantiago, the smartcard-based public transportation system in Santiago, Chile, includes both a subway system and buses. An online information system lets card holders find detailed trip information, including start time and location, as well as frequency and type of transportation used, by simply providing its card ID. This article studies the privacy implications of the availability of the Tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Public Goods: Using Pervasive Computing to Inspire Grassroots Activism

    Publication Year: 2014, Page(s):44 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4383 KB) | HTML iconHTML

    Pervasive computing technology enables social mapping and sharing of local knowledge to create relationships beyond established social and cultural boundaries; it also enables the development of new practices around place, identity, and community. For more than a decade, the authors have explored the potential costs and benefits of using pervasive computing to facilitate codiscovery with communiti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Supply-Chain RFID System that Respects Your Privacy

    Publication Year: 2014, Page(s):52 - 60
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1245 KB) | HTML iconHTML

    Supply-chain RFID systems introduce significant privacy issues to consumers, making it necessary to encrypt communications. Because the resources available on tags are very small, it is generally assumed that only symmetric-key cryptography can be used in such systems. Unfortunately, symmetric-key cryptography imposes negative trust issues between the various stake-holders, and risks compromising ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Push Notification Mechanisms for Pervasive Smartphone Applications

    Publication Year: 2014, Page(s):61 - 71
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2584 KB) | HTML iconHTML

    Smartphones have emerged as ubiquitous devices that are being used to host a rich array of pervasive apps in diverse areas, including healthcare, gaming, and social networking. A key requirement of many of these apps is that they keep their mobile users up-to-date as changes occur in some subject of interest. One way of providing timely updates to smartphone apps is to use push notification techno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a Practical Wi-Fi-Based Indoor Navigation System

    Publication Year: 2014, Page(s):72 - 79
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4761 KB) | HTML iconHTML

    This article presents the seven-step process involved in building a practical Wi-Fi-based indoor navigation system, which was implemented at the COEX complex in Seoul, Korea, in October 2010. The article describes the primary activities in each step using the COEX example. More than 200,000 users have downloaded the system since its first release. The successful launch of the COEX indoor navigatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-Way Communication between Working Dogs and Their Handlers

    Publication Year: 2014, Page(s):80 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1291 KB) | HTML iconHTML

    The Facilitating Interactions for Dogs with Occupations (FIDO) project in the Animal Interaction Lab at Georgia Tech aims to facilitate communication between working dogs and their handlers. Here, the authors discuss their research on testing a working dog's ability to perform distinct tasks in response to vibrations at different points on their body. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioral Imaging and Autism

    Publication Year: 2014, Page(s):84 - 87
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1730 KB) | HTML iconHTML

    Behavioral imaging encompasses the use of computational sensing and modeling techniques to measure and analyze human behavior. This article discusses a research program focused on the study of dyadic social interactions between children and their caregivers and peers. The study has resulted in a dataset containing semi-structured play interactions between children and adults. Behavioral imaging co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Membership Matters [Advertisement]

    Publication Year: 2014, Page(s): 88
    Request permission for commercial reuse | PDF file iconPDF (656 KB)
    Freely Available from IEEE
  • IEEE CG&A calls for papers

    Publication Year: 2014, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (1400 KB)
    Freely Available from IEEE
  • Software Experts Summit [Advertisement]

    Publication Year: 2014, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1515 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Pervasive Computing explores the role of computing in the physical world–as characterized by visions such as the Internet of Things and Ubiquitous Computing. Designed for researchers, practitioners, and educators, this publication acts as a catalyst for realizing the ideas described by Mark Weiser in 1988.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Maria R. Ebling, Ph.D.
IBM T. J. Watson Research Center