Pervasive Computing: 6th International Conference, PERVASIVE 2008, Sydney, Australia, May 19-22, 2008 by Jadwiga IndulskaPervasive Computing: 6th International Conference, PERVASIVE 2008, Sydney, Australia, May 19-22, 2008 by Jadwiga Indulska

Pervasive Computing: 6th International Conference, PERVASIVE 2008, Sydney, Australia, May 19-22…

byJadwiga IndulskaEditorDonald Patterson, Tom Rodden

Paperback | April 29, 2008

Pricing and Purchase Info

$140.95

Earn 705 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

On behalf of the Organizing Committee for Pervasive 2008, welcome to the proceedings of the 6th International Conference on Pervasive Computing. The year2008wasthesecondtimeinasmanyyearsthatthePervasiveconferencehas attempted to "globalize": For the second year in a row the conference was held outside of Europe. The conference is seen as one of the most respected venues for publishing researchon pervasive and ubiquitous computing and captures the state of the art in pervasive computing research. In 2008, as in previous years, the proceedings present solutions for challenging research problems and help to identify upcoming research opportunities. Pervasive 2008 attracted 114 high-quality submissions, from which the Te- nical Program Committee accepted 18 papers, resulting in a competitive 15. 8% acceptance rate. There were over 335 individual authors from 27 countries,c- ing from a wide range of disciplines and from both academic and industrial organizations. Papers were selected solely on the quality of their peer reviews using a double-blind review process. The review process was carried out by 38 members of the international Technical ProgramCommittee (TPC) who are - perts of international standing. The TPC members were aided by 104 external reviewers. It wasa rigorousreviewprocess,in whicheachpaper had atleastfour reviews: three reviews provided by by the Committee members and one review written by an external reviewer. The reviews were followed by a substantive - liberation on each paper during an electronic discussion phase before the start of the Committee meeting.
Sensing and Activity Recognition.- Detecting Human Movement by Differential Air Pressure Sensing in HVAC System Ductwork: An Exploration in Infrastructure Mediated Sensing.- Robust Recognition of Reading Activity in Transit Using Wearable Electrooculography.- Pressing the Flesh: Sensing Multiple Touch and Finger Pressure on Arbitrary S...
Loading
Title:Pervasive Computing: 6th International Conference, PERVASIVE 2008, Sydney, Australia, May 19-22…Format:PaperbackDimensions:315 pagesPublished:April 29, 2008Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540795758

ISBN - 13:9783540795759

Reviews

From the Author

On behalf of the Organizing Committee for Pervasive 2008, welcome to the proceedings of the 6th International Conference on Pervasive Computing. The year2008wasthesecondtimeinasmanyyearsthatthePervasiveconferencehas attempted to "globalize": For the second year in a row the conference was held outside of Europe. The conference is seen as one of the most respected venues for publishing researchon pervasive and ubiquitous computing and captures the state of the art in pervasive computing research. In 2008, as in previous years, the proceedings present solutions for challenging research problems and help to identify upcoming research opportunities. Pervasive 2008 attracted 114 high-quality submissions, from which the Te- nical Program Committee accepted 18 papers, resulting in a competitive 15. 8% acceptance rate. There were over 335 individual authors from 27 countries,c- ing from a wide range of disciplines and from both academic and industrial organizations. Papers were selected solely on the quality of their peer reviews using a double-blind review process. The review process was carried out by 38 members of the international Technical ProgramCommittee (TPC) who are - perts of international standing. The TPC members were aided by 104 external reviewers. It wasa rigorousreviewprocess,in whicheachpaper had atleastfour reviews: three reviews provided by by the Committee members and one review written by an external reviewer. The reviews were followed by a substantive - liberation on each paper during an electronic discussion phase before the start of the Committee meeting.

Table of Contents

Sensing and Activity Recognition.- Detecting Human Movement by Differential Air Pressure Sensing in HVAC System Ductwork: An Exploration in Infrastructure Mediated Sensing.- Robust Recognition of Reading Activity in Transit Using Wearable Electrooculography.- Pressing the Flesh: Sensing Multiple Touch and Finger Pressure on Arbitrary Surfaces.- Applications for Mobile Devices.- MakeIt: Integrate User Interaction Times in the Design Process of Mobile Applications.- Cooperative Techniques Supporting Sensor-Based People-Centric Inferencing.- Microsearch: When Search Engines Meet Small Devices.- Location in Pervasive Systems.- Identifying Meaningful Places: The Non-parametric Way.- An Integrated Platform for the Management of Mobile Location-Aware Information Systems.- Calibree: Calibration-Free Localization Using Relative Distance Estimations.- Location Conflict Resolution with an Ontology.- Platforms for Pervasive Computing.- Evaluation and Analysis of a Common Model for Ubiquitous Systems Interoperability.- A Context-Aware System that Changes Sensor Combinations Considering Energy Consumption.- Providing an Integrated User Experience of Networked Media, Devices, and Services through End-User Composition.- Lessons Learned from Displays, Games and Health Applications.- Overcoming Assumptions and Uncovering Practices: When Does the Public Really Look at Public Displays?.- Gaming Tourism: Lessons from Evaluating REXplorer, a Pervasive Game for Tourists.- Opportunities for Pervasive Computing in Chronic Cancer Care.- Privacy and Security.- AnonySense: Opportunistic and Privacy-Preserving Context Collection.- Privacy Protection for RFID with Hidden Subset Identifiers.