UbiComp 2007: Ubiquitous Computing: 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, ProceedingsJohn Krumm, Gregory D. Abowd, Aruna Seneviratne, Thomas Strang The Ubiquitous Computing conference series provides the premier forum in which to present original research results in all areas relating to the design, implementation, app- cation and evaluation of ubiquitous computing technologies. It is a well-established platform to introduce and discuss research that enables new capabilities, appropriate security and privacy, improved user experiences and simplified and powerful devel- ment and deployment practices. These proceedings contain the papers presented at the Ninth International Conf- ence on Ubiquitous Computing (UbiComp 2007) in Innsbruck, Austria, in September 2007. Our call for papers resulted in 150 submissions, each of which was assigned to a primary and a secondary member of our Program Committee. Every primary and secondary member was responsible for assigning one or more additional qualified reviewers with specific expertise in the field. After double-blind reviews and an online discussion, we had a two-day face-to-face meeting with 38 of the 40 Program C- mittee members attending the PC meeting held just before the Pervasive 2007 conf- ence in Toronto, Canada, in May 2007. We are grateful to Khai Truong , Jeremy Knight and Alex Varshavsky of the University of Toronto for providing facilities and support for this meeting. At the PC meeting, about 80 of the submissions were in- vidually and extensively discussed in one of the three subgroups sensors, experiences and systems as well as in the calibration and decision panels. The PC finally selected 29 papers for publication in these proceedings. |
Contents
1 | |
Tracking FreeWeight Exercises | 19 |
Adopting Ubicomp and Persuasive Techniques into PlayBased Occupational Therapy for Reducing Poor Eating Behavior in Young Children | 38 |
Privacy Enhancing Technologies for RFID in Retail An Empirical Investigation | 56 |
Non Identity Based Privacy Preserving Authentication for Ubiquitous Environments | 73 |
A Study of Privacy Control and Feedback Mechanisms for Contextual IM | 91 |
Yours Mine and Ours? Sharing and Use of Technology in Domestic Environments | 109 |
The Evolution of the Networked Home and Household | 127 |
The Use of Electronic Sensors for Human Identification | 289 |
Key Generation Based on Acceleration Data of Shaking Processes | 304 |
A Study of Bluetooth Naming Practices Nominated for the Best Paper Award | 318 |
The Value of InSitu Studies When Designing Ubicomp Nominated for the Best Paper Award | 336 |
A Field Trial of the Whereabouts Clock Nominated for the Best Paper Award | 354 |
Safeguarding Location Privacy in Wireless AdHoc Networks | 372 |
Seamless Networking for Mobile Applications | 391 |
Exploiting Social Interactions in Mobile Systems | 409 |
Intimate Home Appliances | 145 |
Symbolic Object Localization Through Active Sampling of Acceleration and Sound Signatures Nominated for the Best Paper Award | 163 |
An Exploration of Location Error Estimation | 181 |
Using Relative Positioning to Authenticate Devices for Spontaneous Interaction | 199 |
Interactions and Adaptive Energy Management in Mobile Systems | 217 |
An Empirical Study of the Potential for ContextAware Power Management | 235 |
ProximityBased Authentication of Mobile Devices | 253 |
Detecting and Classifying Unique Electrical Events on the Residential Power Line Nominated for the Best Paper Award | 271 |
Rapidly Exploring Application Design Through Speed Dating | 429 |
Addressing Mobile Phone Diversity in Ubicomp Experience Development | 447 |
Sensor Networks or Smart Artifacts? An Exploration of Organizational Issues of an Industrial Health and Safety Monitoring System | 465 |
A LongTerm Evaluation of Sensing Modalities for Activity Recognition | 483 |
Cooperative Augmentation of Smart Objects with ProjectorCamera Systems | 501 |
519 | |
Other editions - View all
Common terms and phrases
acceleration accelerometer accuracy ACM Press agent algorithm anonymity application approach attacker authentication battery behavior Bluetooth names classifier Clock communication context deadlift described detection eating encounters energy environment EQUIP2 evaluation example experience explore feature feedback frequency Haggle Heidelberg Hidden Markov Model home network household identify IEEE IMBuddy infrastructure interaction interface J2ME laptops LCAs Llama LNCS man-in-the-middle attacks measurements method Microsoft Research mobile devices mobile phones multiple nodes parents participants performance Pervasive platform poster potential prediction profiles projector-camera system protocol prototype query initiator Racing Game recharge RFID robot Roomba scenario sensors service provider shared shows smart home smart objects social spatial Speed Dating Springer switching tags techniques UbiComp ubiquitous computing user’s vibration wireless