default search action
Personal and Ubiquitous Computing, Volume 22
Volume 22, Number 1, February 2018
- Cheonshik Kim, Bryan Kim, Joel J. P. C. Rodrigues, James C. N. Yang:
Special issue: Advanced technology for smart home automation and entertainment. 1-2 - Namje Park, Donghyeok Lee:
Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment. 3-10 - Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang:
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. 11-22 - Seongkee Lee, Sanghoon Lee, Taein Kang, Miyoung Kwon, Nohbok Lee, Hoon-Kyu Kim:
Resiliency of mobile OS security for secure personal ubiquitous computing. 23-34 - Yong-Joon Lee, Namkyun Baik, Cheonshik Kim, Ching-Nung Yang:
Study of detection method for spoofed IP against DDoS attacks. 35-44 - Cheng-Yu Yang, Cheng-Ta Huang, Ya-Ping Wang, Yen-Wen Chen, Shiuh-Jeng Wang:
File changes with security proof stored in cloud service systems. 45-53 - Da-Zhi Sun, Yi Mu, Willy Susilo:
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. 55-67 - Da-Zhi Sun, Yi Mu, Willy Susilo:
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. 69 - Jing Sang, Hongxia Wang, Qing Qian, Hanzhou Wu, Yi Chen:
An efficient fingerprint identification algorithm based on minutiae and invariant moment. 71-80 - Peng-Cheng Huang, Alan Chin-Chen Chang, Yung-Hui Li, Yanjun Liu:
Efficient access control system based on aesthetic QR code. 81-91 - Lu Leng, Fumeng Gao, Qi Chen, Cheonshik Kim:
Palmprint recognition system on mobile devices with double-line-single-point assistance. 93-104 - Byung Wook Kim:
Suboptimal LED selection for distributed MIMO visible light communications. 105-110 - Xiaodong Liu, Qi Liu:
A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system. 111-120 - Jie Zhang, Zhili Zhou, Shu Li, Leilei Gan, Xuyun Zhang, Lianyong Qi, Xiaolong Xu, Wanchun Dou:
Hybrid computation offloading for smart home automation in mobile cloud computing. 121-134 - Tae-Jung Kim, Chang-Ki Kim, Byung-Gyu Kim:
An efficient hybrid delivery technology for a broadcast TV service. 135-141 - Doowon Kim, Jinsuk Baek, Paul S. Fisher, Sangchul Kim:
fFTP: a fast file transfer protocol for home N-screen platform. 143-152 - Min Lei, Yu Yang, Nan Ma, Huizhong Sun, Chunru Zhou, Minyao Ma:
Dynamically enabled defense effectiveness evaluation of a home Internet based on vulnerability analysis and attack layer measurement. 153-162 - Avishek Saha, Young-Woon Lee, Young-Sup Hwang, Kostas E. Psannis, Byung-Gyu Kim:
Context-aware block-based motion estimation algorithm for multimedia internet of things (IoT) platform. 163-172 - Nam-Uk Kim, Yung-Lyul Lee:
Blocking-artifact detection in frequency domain for frame-rate up-conversion. 173-184 - Pradeep Kumar, Rajkumar Saini, Partha Pratim Roy, Pawan Kumar Sahu, Debi Prosad Dogra:
Envisioned speech recognition using EEG sensors. 185-199 - Yunjin Nam, Dongkyoo Shin, Dongil Shin:
Personal search system based on android using lifelog and machine learning. 201-218 - Paul S. Fisher, Jimmy James II, Jinsuk Baek, Cheonshik Kim:
Mining intelligent solution to compensate missing data context of medical IoT devices. 219-224
Volume 22, Number 2, April 2018
- Guglielmo Cola, Alessio Vecchio:
Wearable systems for e-health and wellbeing. 225 - Antonio L. Alfeo, Paolo Barsocchi, Mario G. C. A. Cimino, Davide La Rosa, Filippo Palumbo, Gigliola Vaglini:
Sleep behavior assessment via smartwatch and stigmergic receptive fields. 227-243 - Saumil Dharia, Magdalini Eirinaki, Vijesh Jain, Jvalant Patel, Iraklis Varlamis, Jainikkumar Vora, Rizen Yamauchi:
Social recommendations for personalized fitness assistance. 245-257 - Yinlong Zhang, Wei Liang, Yang Li, Haibo An, Jindong Tan:
Robust orientation estimate via inertial guided visual sample consensus. 259-274 - Wen-Fong Wang, Ching-Yu Yang, Yan-Fu Wu:
SVM-based classification method to identify alcohol consumption using ECG and PPG monitoring. 275-287
- Alan Chamberlain, Andy Crabtree, Hamed Haddadi, Richard Mortier:
Special theme on privacy and the Internet of things. 289-292 - Peter Tolmie, Andy Crabtree:
The practical politics of sharing personal data. 293-315 - Lachlan Urquhart, Neelima Sailaja, Derek McAuley:
Realising the right to data portability for the domestic Internet of things. 317-332 - Thomas F. J.-M. Pasquier, Jatinder Singh, Julia E. Powles, David M. Eyers, Margo I. Seltzer, Jean Bacon:
Data provenance to audit compliance with privacy policy in the Internet of Things. 333-344 - Ilaria Torre, Odnan Ref Sanchez, Frosina Koceva, Giovanni Adorni:
Supporting users to take informed decisions on privacy settings of personal devices. 345-364 - Joseph Korpela, Takuya Maekawa:
Privacy preserving recognition of object-based activities using near-infrared reflective markers. 365-377
- Caroline L. van Straten, Iris Smeekens, Emilia I. Barakova, Jeffrey Glennon, Jan K. Buitelaar, Aoju Chen:
Effects of robots' intonation and bodily appearance on robot-mediated communicative treatment outcomes for children with autism spectrum disorder. 379-390 - Thilina Halloluwa, Dhaval Vyas, Hakim Usoof, K. Priyantha Hewagamage:
Gamification for development: a case of collaborative learning in Sri Lankan primary schools. 391-407 - Haeyong Chung, Chris North:
SAViL: cross-display visual links for sensemaking in display ecologies. 409-431 - Mohammad Hossein Jarrahi, Nicci C. L. Gafinowitz, Grace Shin:
Activity trackers, prior motivation, and perceived informational and motivational affordances. 433-448
Volume 22, Number 3, June 2018
- Yunchuan Sun, Junsheng Zhang, Rongfang Bie, Jiguo Yu:
Advancing researches on IoT systems and intelligent applications. 449-452 - Jinbao Wang, Zhipeng Cai, Yingshu Li, Donghua Yang, Ji Li, Hong Gao:
Protecting query privacy with differentially private k-anonymity in location-based services. 453-469 - Junling Lu, Zhipeng Cai, Xiaoming Wang, Lichen Zhang, Peng Li, Zaobo He:
User social activity-based routing for cognitive radio networks. 471-487 - Shiwei Cheng, Jing Fan, Anind K. Dey:
Smooth Gaze: a framework for recovering tasks across devices using eye tracking. 489-501 - Yi Du, Lei Ren, Yuanchun Zhou, Jianhui Li, Feng Tian, Guozhong Dai:
Banded choropleth map. 503-510 - Yingwei Zhang, Yiqiang Chen, Hanchao Yu, Xiaodong Yang, Wang Lu, Hong Liu:
Wearing-independent hand gesture recognition method based on EMG armband. 511-524 - Lu Wang, Lai-Kuan Wong, Yajie Xu, Xiao Zhou, Siyuan Qiu, Xiangxu Meng, Chenglei Yang:
The design and empirical evaluations of 3D positioning techniques for pressure-based touch control on mobile devices. 525-533 - Anton Kos, Anton Umek:
Smart sport equipment: SmartSki prototype for biofeedback applications in skiing. 535-544 - Shaoqing Wang, Jiguo Yu, Mohammed Atiquzzaman, Honglong Chen, Lina Ni:
CRPD: a novel clustering routing protocol for dynamic wireless sensor networks. 545-559 - Gangyong Jia, Guangjie Han, Jinfang Jiang, Sammy Chan, Yuxin Liu:
Dynamic cloud resource management for efficient media applications in mobile computing environments. 561-573 - Yunchuan Sun, Mengting Fang, Xinyu Wang:
A novel stock recommendation system using Guba sentiment analysis. 575-587 - Jianen Yan, Hongli Zhang, Haiyan Xu, Zhaoxin Zhang:
Discrete PSO-based workload optimization in virtual machine placement. 589-596 - Haodi Ping, Zhangbing Zhou, Zhensheng Shi, Taj Rahman Siddiqi:
Accurate and energy-efficient boundary detection of continuous objects in duty-cycled wireless sensor networks. 597-613 - Rashid Mehmood, Saeed El-Ashram, Rongfang Bie, Yunchuan Sun:
Effective cancer subtyping by employing density peaks clustering by using gene expression microarray. 615-619
Volume 22, Number 4, August 2018
- Ofer Bergman, Nimrod Yanai:
Personal information retrieval: smartphones vs. computers, emails vs. files. 621-632 - Katrin Plaumann, Matthias Weing, Christian Winkler, Michael Müller, Enrico Rukzio:
Towards accurate cursorless pointing: the effects of ocular dominance and handedness. 633-646 - Luis Valente, Bruno Feijó, Julio César Sampaio do Prado Leite, Esteban Clua:
A method to assess pervasive qualities in mobile games. 647-670 - Elena Vildjiounaite, Johanna Kallio, Vesa Kyllönen, Mikko Nieminen, Ilmari Määttänen, Mikko Lindholm, Jani Mäntyjärvi, Georgy L. Gimel'farb:
Unobtrusive stress detection on the basis of smartphone usage data. 671-688 - Elena Vildjiounaite, Johanna Kallio, Vesa Kyllönen, Mikko Nieminen, Ilmari Määttänen, Mikko Lindholm, Jani Mäntyjärvi, Georgy L. Gimel'farb:
Correction to: Unobtrusive stress detection on the basis of smartphone usage data. 689 - Lisa Thomas, Elaine Farrow, Matthew P. Aylett, Pam Briggs:
A life story in three parts: the use of triptychs to make sense of personal digital data. 691-705 - Tim Walton, Michael Evans, David Stanley Kirk, Frank Melchior:
Exploring object-based content adaptation for mobile audio. 707-720 - Tim Walton, Michael Evans, David Stanley Kirk, Frank Melchior:
Correction to: Exploring object-based content adaptation for mobile audio. 721 - Aaron Springer, Victoria Hollis, Steve Whittaker:
Mood modeling: accuracy depends on active logging and reflection. 723-737 - Kher Hui Ng, Hai Huang, Claire O'Malley:
Treasure codes: augmenting learning from physical museum exhibits through treasure hunting. 739-750 - Alessio Bellino:
SEQUENCE: a remote control technique to select objects by matching their rhythm. 751-770 - Marco Furini, Manuela Montangero:
Sentiment analysis and Twitter: a game proposal. 771-785 - Bin Yu, Jun Hu, Mathias Funk, Loe M. G. Feijs:
DeLight: biofeedback through ambient light for stress intervention and relaxation assistance. 787-805 - Tuomas Vaittinen, David K. McGookin:
Uncover: supporting city exploration with egocentric visualizations of location-based content. 807-824 - Zhao Xiao, Yuelei Li, Kang Zhang:
Visual analysis of risks in peer-to-peer lending market. 825-838 - Alissa Nicole Antle, Leslie Chesick, Srilekha Kirshnamachari Sridharan, Emily S. Cramer:
East meets west: a mobile brain-computer system that helps children living in poverty learn to self-regulate. 839-866 - Elizabeth Rey, Aadhar Jain, Saeed Abdullah, Tanzeem Choudhury, David Erickson:
Personalized stress monitoring: a smartphone-enabled system for quantification of salivary cortisol. 867-877
Volume 22, Numbers 5-6, October 2018
- Gunasekaran Manogaran, Naveen K. Chilamkurti, Ching-Hsien Hsu:
Emerging trends, issues, and challenges in Internet of Medical Things and wireless networks. 879-882 - (Withdrawn) Design and development of microstrip patch antenna with circular and rectangular slot for structural health monitoring. 883-893
- Weiping Zhang, Jingzhi Yang, Hang Su, Mohit Kumar, Yihua Mao:
Medical data fusion algorithm based on Internet of things. 895-902 - Guizhen He, Jun Yang, Seven Behnke:
Research on geometric features and point cloud properties for tree skeleton extraction. 903-910 - M. S. Murali Dhar, R. Manimegalai:
A policy-oriented secured service for the e-commerce applications in cloud. 911-919 - Ching-Hsue Cheng, You-Shyang Chen, Arun Kumar Sangaiah, Yin-Hsiu Su:
Evidence-based personal applications of medical computing models in risk factors of cardiovascular disease for the middle-aged and elderly. 921-936 - (Withdrawn) Man-machine dialogue system optimization based on cloud computing. 937-942
- (Withdrawn) Optimization of QoS parameters using scheduling techniques in heterogeneous network. 943-950
- V. Sivakumar, D. Rekha:
Node scheduling problem in underwater acoustic sensor network using genetic algorithm. 951-959 - M. TamilNidhi, K. Gunaseelan:
Examining the variation of vascular structure in digital fundus images using textural pattern. 961-970 - Yue-Feng Zheng, Ying Li, Gang Wang, Yu-Peng Chen, Qian Xu, Jia-Hao Fan, Xue-Ting Cui:
A novel hybrid algorithm for feature selection. 971-985 - Chunzhe Zhao, Donghai Li, Jianwei Cui, Lingling Tian:
Decentralized low-order ADRC design for MIMO system with unknown order and relative degree. 987-1004 - (Withdrawn) Photographer trajectory detection from images. 1005-1015
- (Withdrawn) Recurrent learning of context for salient region detection. 1017-1027
- Aiwan Fan, Zhaofeng Yang:
Image spam filtering using convolutional neural networks. 1029-1037 - Ting Gao, Yaguang Hao, Haipeng Zhang, Lina Hu, Hongzhi Li, Hui Li, Li Hong Hu, Bing Han:
Predicting pathological response to neoadjuvant chemotherapy in breast cancer patients based on imbalanced clinical data. 1039-1047 - Hang Qin, Min Wang, Zhongbo Wu:
Efficiency-based multi-item bargaining design in cognitive radio networks with spectrum coordination. 1049-1060 - (Withdrawn) Efficiency optimization and simulation to manufacturing and service systems based on manufacturing technology Just-In-Time. 1061-1073
- Haibo Yi, Zhe Nie:
On the security of MQ cryptographic systems for constructing secure Internet of medical things. 1075-1081 - (Withdrawn) Speech recognition with improved support vector machine using dual classifiers and cross fitness validation. 1083-1091
- (Withdrawn) Region-specific multi-attribute white mass estimation-based mammogram classification. 1093-1098
- Yumei Wu, Yuanyuan Fang, Bin Liu, Zehui Zhao:
A novel service deployment approach based on resilience metrics for service-oriented system. 1099-1107 - Dingju Zhu:
Deep learning over IoT big data-based ubiquitous parking guidance robot for parking near destination especially hospital. 1109-1116 - (Withdrawn) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. 1117-1132
- Ying Sheng, Tie Zhang:
The finite volume method for two-dimensional Burgers' equation. 1133-1139 - (Withdrawn) Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. 1141-1151
- Zaoli Yang, Jinping Chang:
Solving dynamic normal distribution stochastic decision-making problems based on time degree and vertical projection distance. 1153-1163 - S. Periyanayagi, V. Sumathy:
Swarm-based defense technique for tampering and cheating attack in WSN using CPHS. 1165-1179
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.