- Yong-Joon Lee
, Namkyun Baik, Cheonshik Kim, Ching-Nung Yang:
Study of detection method for spoofed IP against DDoS attacks. Pers. Ubiquitous Comput. 22(1): 35-44 (2018) - Seongkee Lee, Sanghoon Lee, Taein Kang, Miyoung Kwon, Nohbok Lee, Hoon-Kyu Kim:
Resiliency of mobile OS security for secure personal ubiquitous computing. Pers. Ubiquitous Comput. 22(1): 23-34 (2018) - Min Lei, Yu Yang, Nan Ma, Huizhong Sun
, Chunru Zhou, Minyao Ma:
Dynamically enabled defense effectiveness evaluation of a home Internet based on vulnerability analysis and attack layer measurement. Pers. Ubiquitous Comput. 22(1): 153-162 (2018) - Lu Leng, Fumeng Gao, Qi Chen, Cheonshik Kim:
Palmprint recognition system on mobile devices with double-line-single-point assistance. Pers. Ubiquitous Comput. 22(1): 93-104 (2018) - Xiaodong Liu, Qi Liu
:
A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system. Pers. Ubiquitous Comput. 22(1): 111-120 (2018) - Junling Lu, Zhipeng Cai
, Xiaoming Wang, Lichen Zhang, Peng Li, Zaobo He:
User social activity-based routing for cognitive radio networks. Pers. Ubiquitous Comput. 22(3): 471-487 (2018) - Gunasekaran Manogaran, Naveen K. Chilamkurti, Ching-Hsien Hsu:
Emerging trends, issues, and challenges in Internet of Medical Things and wireless networks. Pers. Ubiquitous Comput. 22(5-6): 879-882 (2018) - Rashid Mehmood
, Saeed El-Ashram
, Rongfang Bie, Yunchuan Sun:
Effective cancer subtyping by employing density peaks clustering by using gene expression microarray. Pers. Ubiquitous Comput. 22(3): 615-619 (2018) - Yunjin Nam, Dongkyoo Shin, Dongil Shin:
Personal search system based on android using lifelog and machine learning. Pers. Ubiquitous Comput. 22(1): 201-218 (2018) - Kher Hui Ng
, Hai Huang, Claire O'Malley:
Treasure codes: augmenting learning from physical museum exhibits through treasure hunting. Pers. Ubiquitous Comput. 22(4): 739-750 (2018) - Namje Park, Donghyeok Lee:
Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment. Pers. Ubiquitous Comput. 22(1): 3-10 (2018) - Thomas F. J.-M. Pasquier
, Jatinder Singh, Julia E. Powles
, David M. Eyers
, Margo I. Seltzer, Jean Bacon:
Data provenance to audit compliance with privacy policy in the Internet of Things. Pers. Ubiquitous Comput. 22(2): 333-344 (2018) - S. Periyanayagi, V. Sumathy:
Swarm-based defense technique for tampering and cheating attack in WSN using CPHS. Pers. Ubiquitous Comput. 22(5-6): 1165-1179 (2018) - Haodi Ping, Zhangbing Zhou, Zhensheng Shi, Taj Rahman Siddiqi:
Accurate and energy-efficient boundary detection of continuous objects in duty-cycled wireless sensor networks. Pers. Ubiquitous Comput. 22(3): 597-613 (2018) - Katrin Plaumann, Matthias Weing, Christian Winkler, Michael Müller, Enrico Rukzio:
Towards accurate cursorless pointing: the effects of ocular dominance and handedness. Pers. Ubiquitous Comput. 22(4): 633-646 (2018) - Hang Qin, Min Wang, Zhongbo Wu:
Efficiency-based multi-item bargaining design in cognitive radio networks with spectrum coordination. Pers. Ubiquitous Comput. 22(5-6): 1049-1060 (2018) - Elizabeth Rey, Aadhar Jain, Saeed Abdullah
, Tanzeem Choudhury, David Erickson:
Personalized stress monitoring: a smartphone-enabled system for quantification of salivary cortisol. Pers. Ubiquitous Comput. 22(4): 867-877 (2018) - Avishek Saha, Young-Woon Lee
, Young-Sup Hwang, Kostas E. Psannis
, Byung-Gyu Kim
:
Context-aware block-based motion estimation algorithm for multimedia internet of things (IoT) platform. Pers. Ubiquitous Comput. 22(1): 163-172 (2018) - Jing Sang
, Hongxia Wang, Qing Qian, Hanzhou Wu
, Yi Chen
:
An efficient fingerprint identification algorithm based on minutiae and invariant moment. Pers. Ubiquitous Comput. 22(1): 71-80 (2018) - Ying Sheng, Tie Zhang:
The finite volume method for two-dimensional Burgers' equation. Pers. Ubiquitous Comput. 22(5-6): 1133-1139 (2018) - V. Sivakumar
, D. Rekha:
Node scheduling problem in underwater acoustic sensor network using genetic algorithm. Pers. Ubiquitous Comput. 22(5-6): 951-959 (2018) - Aaron Springer
, Victoria Hollis, Steve Whittaker:
Mood modeling: accuracy depends on active logging and reflection. Pers. Ubiquitous Comput. 22(4): 723-737 (2018) - Caroline L. van Straten, Iris Smeekens, Emilia I. Barakova
, Jeffrey Glennon
, Jan K. Buitelaar, Aoju Chen
:
Effects of robots' intonation and bodily appearance on robot-mediated communicative treatment outcomes for children with autism spectrum disorder. Pers. Ubiquitous Comput. 22(2): 379-390 (2018) - Yunchuan Sun, Mengting Fang, Xinyu Wang:
A novel stock recommendation system using Guba sentiment analysis. Pers. Ubiquitous Comput. 22(3): 575-587 (2018) - Da-Zhi Sun
, Yi Mu, Willy Susilo
:
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquitous Comput. 22(1): 55-67 (2018) - Da-Zhi Sun
, Yi Mu, Willy Susilo
:
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure. Pers. Ubiquitous Comput. 22(1): 69 (2018) - Yunchuan Sun, Junsheng Zhang, Rongfang Bie, Jiguo Yu:
Advancing researches on IoT systems and intelligent applications. Pers. Ubiquitous Comput. 22(3): 449-452 (2018) - M. TamilNidhi, K. Gunaseelan:
Examining the variation of vascular structure in digital fundus images using textural pattern. Pers. Ubiquitous Comput. 22(5-6): 961-970 (2018) - Lisa Thomas
, Elaine Farrow
, Matthew P. Aylett, Pam Briggs
:
A life story in three parts: the use of triptychs to make sense of personal digital data. Pers. Ubiquitous Comput. 22(4): 691-705 (2018) - Peter Tolmie
, Andy Crabtree
:
The practical politics of sharing personal data. Pers. Ubiquitous Comput. 22(2): 293-315 (2018)