Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)

21-25 March 2011

Filter Results

Displaying Results 1 - 25 of 150
  • [Copyright notice]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):ii - xv
    Request permission for commercial reuse | PDF file iconPDF (525 KB)
    Freely Available from IEEE
  • Message from the general chairs

    Publication Year: 2011, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (41 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the workshops chairs

    Publication Year: 2011, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (43 KB) | HTML iconHTML
    Freely Available from IEEE
  • IQ2S'11: The third International Workshop on Information Quality and Quality of Service for Pervasive Computing - committees and welcome

    Publication Year: 2011, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • MUCS 2011: 8th IEEE International Workshop on Managing Ubiquitous Communications and Services - committees and welcome

    Publication Year: 2011, Page(s):xx - xxii
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • PerCoSC 2011: 1st IEEE PerCom Workshop on Pervasive Communities and Service Clouds - committees and welcome

    Publication Year: 2011, Page(s):xxiii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • PerSeNS 2011: Seventh IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing - committees and welcome

    Publication Year: 2011, Page(s):xxv - xxvi
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • PERWARE 2011: 8th IEEE international workshop on middleware and system support for pervasive computing - committees and welcome

    Publication Year: 2011, Page(s):xxvii - xxviii
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • SESOC 2011: 3rd International Workshop on Security and Social Networking - committees and welcome

    Publication Year: 2011, Page(s):xxix - xxx
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • PerCom 2011 demos: PerCom 2011 demos - committees and welcome

    Publication Year: 2011, Page(s): xxxi
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • WIP of PerCom 2011: Work in Progress workshop at PerCom 2011 - committees and welcome

    Publication Year: 2011, Page(s): xxxii
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • PerCom 2011 PhD Forum: Fourth annual PhD Forum on pervasive computing and communications - committees and welcome

    Publication Year: 2011, Page(s): xxxiii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • CoMoRea 2011: 8th IEEE workshop on Context Modeling and Reasoning - committees and welcome

    Publication Year: 2011, Page(s):xxxiv - xxxv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • MP2P 2011: The 7th international workshop on mobile peer-to-peer computing - committees and welcome

    Publication Year: 2011, Page(s):xxxvi - xxxvii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • PerCol 2011: Second IEEE workshop on pervasive collaboration and social networking - committees and welcome

    Publication Year: 2011, Page(s): xxxviii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • PerEL 2011: 7th IEEE International Workshop on PervasivE Learning, Life, and Leisure - committees and welcome

    Publication Year: 2011, Page(s):xxxix - xl
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • PWN 2011: Seventh IEEE PerCom Workshop on Pervasive Wireless Networking - committees and welcome

    Publication Year: 2011, Page(s): xli
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • SmartE 2011: Smart environments to enhance health care - committees and welcome

    Publication Year: 2011, Page(s): xlii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Keynote: Information Assurance in sensor networks

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (61 KB) | HTML iconHTML

    Summary form only given. Information Assurance (IA) grew out of the field of computer network security. However, IA is a much broader term than network security and relates to the managing of the risks associated with the use, processing, storage, and transmission of information. The most basic model of IA relies on three properties: confidentiality, integrity, and availability, thus it is often r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality-of-information aware networking for tactical military networks

    Publication Year: 2011, Page(s):2 - 7
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (609 KB) | HTML iconHTML

    In tactical military networks, decisions must often be made quickly based on information at hand. It is a challenge to provide decision makers with a notion of the quality of the information they have, or to provide a method by which decision makers can specify a required quality of information. It is a further challenge to honor requests for a required quality of information when selecting inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoI-aware energy management for wireless sensor networks

    Publication Year: 2011, Page(s):8 - 13
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (466 KB) | HTML iconHTML

    In this paper, we propose an efficient energy-management framework in wireless sensor networks (WSNs) to address the fundamental research challenge imposed by both the maintenance of the energy supply and the support of the quality-of-information (QoI) requirements. By quantifying the QoI benefit the tasks receive in relation to the level of QoI they request as the QoI satisfaction index), we prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fidelity-based continuous query introspection and adaptation

    Publication Year: 2011, Page(s):14 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB) | HTML iconHTML

    In this paper, we address the fidelity of information collected from distributed, interactive, pervasive computing environments. Queries in these dynamic networks come in two forms: snapshot queries and continuous queries. The former executes through the network and returns values that satisfy the query criteria at a particular instant in time. The latter expects a result that is updated over time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Market mechanisms for Value of Information driven resource allocation in Sensor Networks

    Publication Year: 2011, Page(s):20 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    This paper examines the possible uses of different market mechanisms for resource allocation at different levels of Wireless Sensor Network (WSN) architecture. The goal is to maximize the Value of Information (VoI) for WSN users. We discuss three different levels of WSN architecture. The lowest level focuses on individual nodes and their basic functions of sensing and routing. We give an example s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video entity resolution: Applying ER techniques for Smart Video Surveillance

    Publication Year: 2011, Page(s):26 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (558 KB) | HTML iconHTML

    Smart Video Surveillance (SVS) applications enhance situational awareness by allowing domain analysts to focus on the events of higher priority. This in turn leads to improved decision making, allows for better resource management, and helps to reduce information overload. SVS approaches operate by trying to extract and interpret higher “semantic” level events that occur in video. On... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.