Loading…
N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
Meidan, Yair, Bohadana, Michael, Mathov, Yael, Mirsky, Yisroel, Shabtai, Asaf, Breitenbacher, Dominik, Elovici, Yuval
Published in IEEE pervasive computing (01.07.2018)
Published in IEEE pervasive computing (01.07.2018)
Get full text
Journal Article
Loading…
Help from the Sky: Leveraging UAVs for Disaster Management
Erdelj, Milan, Natalizio, Enrico, Chowdhury, Kaushik R., Akyildiz, Ian F.
Published in IEEE pervasive computing (01.01.2017)
Published in IEEE pervasive computing (01.01.2017)
Get full text
Journal Article
Loading…
Recognizing Detailed Human Context in the Wild from Smartphones and Smartwatches
Vaizman, Yonatan, Ellis, Katherine, Lanckriet, Gert
Published in IEEE pervasive computing (01.10.2017)
Published in IEEE pervasive computing (01.10.2017)
Get full text
Journal Article
Loading…
Edge Analytics in the Internet of Things
Satyanarayanan, Mahadev, Simoens, Pieter, Yu Xiao, Pillai, Padmanabhan, Zhuo Chen, Kiryong Ha, Wenlu Hu, Amos, Brandon
Published in IEEE pervasive computing (01.04.2015)
Published in IEEE pervasive computing (01.04.2015)
Get full text
Journal Article
Loading…
Squeezing Deep Learning into Mobile and Embedded Devices
Lane, Nicholas D., Bhattacharya, Sourav, Mathur, Akhil, Georgiev, Petko, Forlivesi, Claudio, Kawsar, Fahim
Published in IEEE pervasive computing (2017)
Published in IEEE pervasive computing (2017)
Get full text
Journal Article
Loading…
The Case for VM-Based Cloudlets in Mobile Computing
Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.
Published in IEEE pervasive computing (01.10.2009)
Published in IEEE pervasive computing (01.10.2009)
Get full text
Journal Article
Loading…
Semi-Automated Tracking: A Balanced Approach for Self-Monitoring Applications
Eun Kyoung Choe, Abdullah, Saeed, Rabbi, Mashfiqui, Thomaz, Edison, Epstein, Daniel A., Cordeiro, Felicia, Kay, Matthew, Abowd, Gregory D., Choudhury, Tanzeem, Fogarty, James, Lee, Bongshin, Matthews, Mark, Kientz, Julie A.
Published in IEEE pervasive computing (01.01.2017)
Published in IEEE pervasive computing (01.01.2017)
Get full text
Journal Article
Loading…
Earables for Personal-Scale Behavior Analytics
Kawsar, Fahim, Min, Chulhong, Mathur, Akhil, Montanari, Alessandro
Published in IEEE pervasive computing (01.07.2018)
Published in IEEE pervasive computing (01.07.2018)
Get full text
Journal Article
Loading…
Loading…
Loading…
In-Ear PPG for Vital Signs
Ferlini, Andrea, Montanari, Alessandro, Min, Chulhong, Li, Hongwei, Sassi, Ugo, Kawsar, Fahim
Published in IEEE pervasive computing (01.01.2022)
Published in IEEE pervasive computing (01.01.2022)
Get full text
Journal Article
Loading…
Revolution or Evolution? Speech Interaction and HCI Design Guidelines
Murad, Christine, Munteanu, Cosmin, Cowan, Benjamin R., Clark, Leigh
Published in IEEE pervasive computing (01.04.2019)
Published in IEEE pervasive computing (01.04.2019)
Get full text
Journal Article
Loading…
Loading…
Beyond the Star of Stars: An Introduction to Multihop and Mesh for LoRa and LoRaWAN
Centelles, Roger Pueyo, Freitag, Felix, Meseguer, Roc, Navarro, Leandro
Published in IEEE pervasive computing (01.04.2021)
Published in IEEE pervasive computing (01.04.2021)
Get full text
Journal Article
Loading…
Loading…
Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice
Das, Anupam, Degeling, Martin, Smullen, Daniel, Sadeh, Norman
Published in IEEE pervasive computing (01.07.2018)
Published in IEEE pervasive computing (01.07.2018)
Get full text
Journal Article
Loading…
Loading…
Building a Practical Wi-Fi-Based Indoor Navigation System
Han, Dongsoo, Jung, Sukhoon, Lee, Minkyu, Yoon, Giwan
Published in IEEE pervasive computing (01.04.2014)
Published in IEEE pervasive computing (01.04.2014)
Get full text
Journal Article
Loading…
Loading…
The Role of Cloudlets in Hostile Environments
Satyanarayanan, Mahadev, Lewis, Grace, Morris, Edwin, Simanta, Soumya, Boleng, Jeff, Kiryong Ha
Published in IEEE pervasive computing (01.10.2013)
Published in IEEE pervasive computing (01.10.2013)
Get full text
Journal Article