박사

Human Activity Inference Systems for Context-aware Internet of Things Applications : 상황 인지 기반 사물인터넷 어플리케이션을 위한 사람 행동 추론 시스템

박호민 2016년
논문상세정보
' Human Activity Inference Systems for Context-aware Internet of Things Applications : 상황 인지 기반 사물인터넷 어플리케이션을 위한 사람 행동 추론 시스템' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • Human Activity Inference Systems
  • IoT architectures
  • smart environments
  • smart-phones
  • wireless sensor networks
  • 무선 센서 네트워크
  • 사물인터넷구조
  • 스마트폰
  • 스마트환경
  • 행동 추론 시스템
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
1,325 0

0.0%

' Human Activity Inference Systems for Context-aware Internet of Things Applications : 상황 인지 기반 사물인터넷 어플리케이션을 위한 사람 행동 추론 시스템' 의 참고문헌

  • Z. Yu and Y. Nakamura. Smart meeting systems: A survey of state-of-the-art and open issues. ACM Comput. Surv., 42(2):8:1–8:20, 2010.
  • Youssouf Zatout, Eric Campo, and J-F Llibre. Wsn-hm: Energy-efficient wireless sensor network for home monitoring. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2009 5th International Conference on, pages 367–372. IEEE, 2009.
  • Yossi Rubner, Carlo Tomasi, and Leonidas J Guibas. The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision, 40(2):99–121, 2000.
  • Yohan Chon, Elmurod Talipov, Hyojeong Shin, and Hojung Cha. Smartdc: Mobility prediction-based adaptive duty cycling for everyday location monitoring. Mobile Computing, IEEE Transactions on, 13(3):512–525, 2014.
  • Yilin Mo, Emanuele Garone, Alessandro Casavola, and Bruno Sinopoli. False data injection attacks against state estimation in wireless sensor networks. In Decision and Control (CDC), 2010 49th IEEE Conference on, pages 5967–5972. IEEE, 2010.
  • Yanli Yu, Keqiu Li,Wanlei Zhou, and Ping Li. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3):867–880, 2012.
  • Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, and Richard P Martin. Sensing vehicle dynamics for determining driver phone use. In Proc. of MobiSys, 2013.
  • Y. Guo and M. Hazas. Localising speech, footsteps and other sounds using resource-constrained devices. In Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on, pages 330–341, 2011.
  • Xiao Pan, Jianliang Xu, and Xiaofeng Meng. Protecting location privacy against location-dependent attacks in mobile services. Knowledge and Data Engineering, IEEE Transactions on, 24(8):1506– 1519, 2012.
  • X. Sheng and Y. H. Hu. Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks. IEEE Transactions on Signal Processing, 53(1):44– 53, 2005.
  • X. Bian, G. D. Abowd, and J. M. Rehg. Using sound source localization in a home environment. Lecture Notes in Computer Science: Pervasive Computing, 3468:19–36, 2005.
  • Wolfgang Kabsch. A solution for the best rotation to relate two sets of vectors. Acta Crystallographica Section A: Crystal Physics, Diffraction, Theoretical and General Crystallography, 32(5):922– 923, 1976.
  • Wei Wang, Suparna De, Gilbert Cassar, and Klaus Moessner. Knowledge representation in the internet of things: semantic modelling and its applications. Automatika–Journal for Control, Measurement, Electronics, Computing and Communications, 54(4), 2013.
  • W. J. Bangs and P. M. Schultheiss. Space-time processing for optimal parameter estimation. In Signal Processing, pages 577–590. Academic Press, 1973.
  • Vladimir Brik, Suman Banerjee, Marco Gruteser, and Sangho Oh. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 116–127. ACM, 2008.
  • Vijay Srinivasan, John Stankovic, and Kamin Whitehouse. Protecting your daily in-home activity information from a wireless snooping attack. In Proceedings of the 10th international conference on Ubiquitous computing, pages 202–211. ACM, 2008.
  • Victoria K Lee, Chantelle R Champagne, and Louis Hugo Francescutti. Fatal distraction cell phone use while driving. Canadian Family Physician, 59(7):723–725, 2013.
  • Vana Jelicic, Michele Magno, Davide Brunelli, Giacomo Paci, and Luca Benini. Context-adaptive multimodal wireless sensor network for energy-efficient gas monitoring. Sensors Journal, IEEE, 13(1):328–338, 2013.
  • V. Stanford, J. Garofolo, O. Galibert, M. Michel, and C. Laprun. The nist smart space and meeting room projects: signals, acquisition annotation, and metrics. In Acoustics, Speech, and Signal Processing, 2003. Proceedings.(ICASSP’03). 2003 IEEE International Conference on, volume 4, pages IV–736. IEEE, 2003.
  • U.S. HEV sales by Model (1999-2013). http://www.afdc.energy.gov/data/10301.
  • Tim Van Kasteren, Athanasios Noulas, Gwenn Englebienne, and Ben Kr ose. Accurate activity recognition in a home setting. In Proceedings of the 10th international conference on Ubiquitous computing, pages 1–9. ACM, 2008.
  • Theodoros Evgeniou, Massimiliano Pontil, and Tomaso Poggio. Regularization networks and support vector machines. Advances in computational mathematics, 13(1):1–50, 2000.
  • Taejoon Park and Kang G Shin. Attack-tolerant localization via iterative verification of locations in sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 8(1):2, 2008.
  • Seungyoung Ahn and Joungho Kim. Magnetic field design for high efficient and low emf wireless power transfer in on-line electric vehicle. In Antennas and Propagation (EUCAP), Proceedings of the 5th European Conference on, pages 3979–3982. IEEE, 2011.
  • Sebastian OH Madgwick, Andrew JL Harrison, and Ravi Vaidyanathan. Estimation of imu and marg orientation using a gradient descent algorithm. In Rehabilitation Robotics (ICORR), 2011 IEEE International Conference on, pages 1–7. IEEE, 2011.
  • Sasu Tarkoma, Matti Siekkinen, Eemil Lagerspetz, and Yu Xiao. Smartphone energy consumption: modeling and optimization. Cambridge University Press, 2014.
  • Sascha Simon. System and method for identifying vehicle by utilizing detected magnetic field, November 5 2013. US Patent App. 14/072,231.
  • Sameer Shirdhonkar and David W Jacobs. Approximate earth mover’s distance in linear time. In Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on, pages 1–8. IEEE, 2008.
  • S. Renals, T. Hain, and H. Bourlard. Recognition and understanding of meetings the ami and amida projects. In Automatic Speech Recognition Understanding, 2007. ASRU. IEEE Workshop on, pages 238–247, 2007.
  • S. Araki, R. Mukai, S. Makino, T. Nishikawa, and H. Saruwatari. The fundamental limitation of frequency domain blind source separation for convolutive mixtures of speech. Speech and Audio Processing, IEEE Transactions on, 11(2):109–116, 2003.
  • Rosanna Heise and Bruce A MacDonald. Quaternions and motion interpolation: A tutorial. In New Advances in Computer Graphics, pages 229–243. Springer, 1989.
  • Richard Harper et al. The Connected Home: the future of domestic life. Springer, 2011.
  • ROHM Semiconductors. BH1600FVC - Analog Current Output Type Ambient Light Sensor IC BH1600FVC. Technical Note, 2012.
  • R. O. Schmidt. Multiple emitter location and signal parameter estimation. IEEE Transactions on Antennas and Propagation, 34(3):276–280, 1986.
  • Prabal Dutta, Mike Grimmer, Anish Arora, Steven Bibyk, and David Culler. Design of a wireless sensor network platform for detecting rare, random, and ephemeral events. In Proceedings of the 4th international symposium on Information processing in sensor networks, page 70. IEEE Press, 2005.
  • Phillip Reindl, Xiaojiang Du, Kendall Nygard, and Hongli Zhang. Lightweight source anonymity in wireless sensor networks. In Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, pages 1–5. IEEE, 2011.
  • Paul C Kocher. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In Advances in Cryptology-CRYPTO’96, pages 104–113. Springer, 1996.
  • Pandurang Kamat, Wenyuan Xu, Wade Trappe, and Yanyong Zhang. Temporal privacy in wireless sensor networks. In Distributed Computing Systems, 2007. ICDCS’07. 27th International Conference on, pages 23–23. IEEE, 2007.
  • P. Delacourt and C.J. Wellekens. Distbic: A speaker-based segmentation for audio data indexing. Speech Communication, 32(1–2):111–126, 2000.
  • Oliver Walter, Joerg Schmalenstroeer, Andreas Engler, and Reinhold Haeb-Umbach. Smartphonebased sensor fusion for improved vehicular navigation. In Positioning Navigation and Communication (WPNC), 2013 10th Workshop on, pages 1–6. IEEE, 2013.
  • Official website for distracted driving. http://www.distraction.gov/content/ get-the-facts/facts-and-statistics.html.
  • Nick Bobick. Rotating objects using quaternions. Game Developer, 2(26):21–31, 1998.
  • Na Li, Nan Zhang, Sajal K Das, and Bhavani Thuraisingham. Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks, 7(8):1501–1514, 2009.
  • N Sriraam, TS Bharath Balaji, M Elshin Joel, and S Prasanna. An ubiquitous healthcare system using a wearable shirt for a smart home-a pilot study. In Biomedical Engineering and Sciences (IECBES), 2010 IEEE EMBS Conference on, pages 205–209. IEEE, 2010.
  • N Mostofi, M Elhabiby, and N El-Sheimy. Indoor localization and mapping using camera and inertial measurement unit (imu). In Position, Location and Navigation Symposium-PLANS 2014, 2014 IEEE/ION, pages 1329–1335. IEEE, 2014.
  • Min Shao, Yi Yang, Sencun Zhu, and Guohong Cao. Towards statistically strong source anonymity for sensor networks. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008.
  • Michele Magno, David Boyle, Davide Brunelli, Emanuel Popovici, and Luca Benini. Ensuring survivability of resource-intensive sensor networks through ultra-low power overlays. Industrial Informatics, IEEE Transactions on, 10(2):946–956, 2014.
  • Michael Angelo A Pedrasa, Ted D Spooner, and Iain F MacGill. Coordinated scheduling of residential distributed energy resources to optimize smart home energy services. Smart Grid, IEEE Transactions on, 1(2):134–143, 2010.
  • Mark Leonard Davison. Multidimensional scaling. Wiley New York, 1983.
  • Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, pages 31–42. ACM, 2003.
  • M. Wu and D. Wang. A two-stage algorithm for one-microphone reverberant speech enhancement. Audio, Speech, and Language Processing, IEEE Transactions on, 14(3):774–784.
  • M. S. Brandstein and H. F. Silverman. A practical methodology for speech source localization with microphone arrays. Computer Speech & Language, 11(2):91–126, 1997.
  • Luigi Atzori, Antonio Iera, and Giacomo Morabito. The internet of things: A survey. Computer networks, 54(15):2787–2805, 2010.
  • Latanya Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557–570, 2002.
  • Lars Klack, Christian M ollering, Martina Ziefle, and Thomas Schmitz-Rode. Future care floor: A sensitive floor for movement monitoring and fall detection in home environments. In Wireless Mobile Communication and Healthcare, pages 211–218. Springer, 2011.
  • L. Gu, D. Jia, P. Vicaire, T. Yan, L. Luo, A. Tirumalaand Q. Cao, T. He, J. A. Stankovic, T. Abdelzaher, and B. H. Krogh. Lightweight detection and classification for wireless sensor networks in realistic environments. In Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, SenSys ’05, pages 205–217. ACM, 2005.
  • Kui Ren, Kai Zeng, andWenjing Lou. A new approach for random key pre-distribution in large-scale wireless sensor networks. Wireless Communications and Mobile Computing, 6(3):307–318, 2006.
  • Kiran Mehta, Donggang Liu, and Matthew Wright. Location privacy in sensor networks against a global eavesdropper. In Network Protocols, 2007. ICNP 2007. IEEE International Conference on, pages 314–323. IEEE, 2007.
  • Ken Shoemake. Animating rotation with quaternion curves. In ACM SIGGRAPH computer graphics, volume 19, pages 245–254. ACM, 1985.
  • Kamran Etemad and Rama Chellappa. Discriminant analysis for recognition of human face images. JOSA A, 14(8):1724–1733, 1997.
  • KL Courtney. Privacy and senior willingness to adopt smart home information technology in residential care facilities. Methods of information in medicine, 47(1):76–81, 2008.
  • Jun-geun Park, Ami Patel, Dorothy Curtis, Seth Teller, and Jonathan Ledlie. Online pose classification and walking speed estimation using handheld devices. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pages 113–122. ACM, 2012.
  • Jonathan Lester, Tanzeem Choudhury, and Gaetano Borriello. A practical approach to recognizing physical activities. In Pervasive Computing, pages 1–16. Springer, 2006.
  • John Greer Elias. Driver handheld computing device lock-out, April 22 2014. US Patent 8,706,143.
  • Jing Deng, Richard Han, and Shivakant Mishra. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In Dependable Systems and Networks, 2004 International Conference on, pages 637–646. IEEE, 2004.
  • Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, Tam Vu, Hongbo Liu, Nicolae Cecan, Yingying Chen, Marco Gruteser, and Richard P Martin. Detecting driver phone use leveraging car speakers. In Proceedings of the 17th annual international conference on Mobile computing and networking, pages 97–108. ACM, 2011.
  • Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting. In In IASTED International Conference on Communications and Computer Networks. Citeseer, 2006.
  • JeongGil Ko, JongHyun Lim, Yin Chen, Razvan Musaloiu-E., Andreas Terzis, Gerald Masson, Tia Gao, Walt Destler, Leo Selavo, and Richard Dutton. MEDiSN: Medical Emergency Detection in Sensor Networks. ACM Transactions on Embedded Computing Systems (TECS), Special Issue on Wireless Health Systems, 2010.
  • JeongGil Ko, Chenyang Lu, Mani B Srivastava, John A Stankovic, Andreas Terzis, and Matt Welsh. Wireless sensor networks for healthcare. Proceedings of the IEEE, 98(11):1947–1960, 2010.
  • Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. Internet of things (iot): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7):1645–1660, 2013.
  • Javier Lopez, Rodrigo Roman, and Cristina Alcaraz. Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In Foundations of Security Analysis and Design V, pages 289–338. Springer, 2009.
  • James MacQueen et al. Some methods for classification and analysis of multivariate observations. In Proceedings of the fifth Berkeley symposium on mathematical statistics and probability, volume 1, pages 281–297. California, USA, 1967.
  • Jacques Demongeot, Gilles Virone, Florence Duchˆene, Gila Benchetrit, Thierry Herv e, Norbert Noury, and Vincent Rialle. Multi-sensors acquisition, data fusion, knowledge mining and alarm triggering in health smart homes for elderly people. Comptes Rendus Biologies, 325(6):673–682, 2002.
  • J. E. McGrath. Groups: Interaction and performance, volume 14. Prentice-Hall Englewood Cliffs, NJ, 1984.
  • I. McCowan, D. Gatica-Perez, S. Bengio, G. Lathoud, M. Barnard, and D. Zhang. Automatic analysis of multimodal group actions in meetings. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 27(3):305–317, 2005.
  • Hua-Dong Ma. Internet of things: Objectives and scientific challenges. Journal of Computer science and Technology, 26(6):919–924, 2011.
  • Hon Lung Chu, Vijay Raman, Jeffrey Shen, R Choudhury, Aman Kansal, and Victor Bahl. In-vehicle driver detection using mobile phone sensors. In ACM MobiSys, 2011.
  • Hon Chu, Vasumathi Raman, Jianbing Shen, Apoorv Kansal, Victor Bahl, and Romit Roy Choudhury. I am a smartphone and i know my user is driving. In Communication Systems and Networks (COMSNETS), 2014 Sixth International Conference on, pages 1–8. IEEE, 2014.
  • Homin Park, Taejoon Park, and Sang Hyuk Son. A comparative study of privacy protection methods for smart home environments. International Journal of Smart Home, 7(2), 2013.
  • H. Wang and M. Kaveh. Coherent signal-subspace processing for the detection and estimation of angles of arrival of multiple wide-band sources. IEEE Transactions on Acoustics, Speech and Signal Processing, 33(4):823–831, 1985.
  • H. F. Silverman and S. E. Kirtman. A two-stage algorithm for determining talker location from linear microphone array data. Computer Speech & Language, 6(2):129–152, 1992.
  • Governors highway safety association. http://www.ghsa.org/html/issues/ distraction/index.html.
  • Giuseppe Anastasi, Marco Conti, Mario Di Francesco, and Andrea Passarella. Energy conservation in wireless sensor networks: A survey. Ad hoc networks, 7(3):537–568, 2009.
  • Galaxy S5, Samsung. http://www.samsung.com/sec/galaxys5/.
  • F. Bimbot, J.F. Bonastre, C. Fredouille, G. Gravier, I. Magrin-Chagnolleau, S. Meignier, T. Merlin, J. Ortega-Garc ıa, D. Petrovska-Delacr etaz, and D. A. Reynolds. A tutorial on text-independent speaker verification. EURASIP J. Appl. Signal Process., 2004:430–451, 2004.
  • Etienne Parizet, Erald Guyader, and Valery Nosulenko. Analysis of car door closing sound quality. Applied Acoustics, 69(1):12–22, 2008.
  • Emmanuel Munguia Tapia, Stephen S Intille, and Kent Larson. Activity recognition in the home using simple and ubiquitous sensors. Springer, 2004.
  • Elizaveta Levina and Peter Bickel. The earth mover’s distance is the mallows distance: some insights from statistics. In Computer Vision, 2001. ICCV 2001. Proceedings. Eighth IEEE International Conference on, volume 2, pages 251–256. IEEE, 2001.
  • Electromagnetic capability. https://www.iso.org/obp/ui/#iso:std:iso:16750: -2:ed-4:v1:en.
  • Distracted driving laws. http://www.ghsa.org/html/stateinfo/laws/cellphone_ laws.html.
  • Diane J Cook. Learning setting-generalized activity models for smart spaces. IEEE intelligent systems, 2010(99):1, 2010.
  • David S anchez, Jordi Castell`a-Roca, and Alexandre Viejo. Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines. Information Sciences, 218:17–30, 2013.
  • David Moss, Jonathan Hui, and Kevin Klues. Low power listening. TinyOS TEP 105.
  • David MJ Tax and Robert PW Duin. Support vector data description. Machine learning, 54(1):45–66, 2004.
  • David A Knox and Thomas Kunz. Secure authentication in wireless sensor networks using rf fingerprints. In Embedded and Ubiquitous Computing, 2008. EUC’08. IEEE/IFIP International Conference on, volume 1, pages 230–237. IEEE, 2008.
  • Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac. Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7):1497–1516, 2012.
  • Dae-Ki Cho, Min Mun, Uichin Lee,William J Kaiser, and Mario Gerla. Autogait: A mobile platform that accurately estimates the distance walked. In Pervasive computing and communications (PerCom), 2010 IEEE international conference on, pages 116–124. IEEE, 2010.
  • D. Zhang, D. Gatica-Perez, S. Bengio, and I. McCowan. Modeling individual and group actions in meetings with layered hmms. Multimedia, IEEE Transactions on, 8(3):509–520, 2006.
  • D. Sun and J. Canny. A high accuracy, low-latency, scalable microphone-array system for conversation analysis. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp ’12, pages 290–300. ACM, 2012.
  • D. Gatica-Perez. Automatic nonverbal analysis of social interaction in small groups: A review. Image and Vision Computing, 27(12):1775–1787, 2009.
  • Chunyi Peng, Guobin Shen, Yongguang Zhang, Yanlin Li, and Kun Tan. Beepbeep: A high accuracy acoustic ranging system using cots mobile devices. In Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, SenSys ’07, pages 1–14, New York, NY, USA, 2007. ACM.
  • Cheng Bo, Xuesi Jian, Xiang-Yang Li, Xufei Mao, Yu Wang, and Fan Li. You’re driving and texting: detecting drivers using personal smart phones by leveraging inertial sensors. In Proc. of MobiCom, 2013.
  • Charith Perera, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. Context aware computing for the internet of things: A survey. IEEE Communications Surveys & Tutorials, 16(1):414–454, 2014.
  • Charalampos Doukas, Thomas Pliakas, and Ilias Maglogiannis. Mobile healthcare information management utilizing cloud computing and android os. In Engineering in Medicine and Biology Society (EMBC), 2010 Annual International Conference of the IEEE, pages 1037–1040. IEEE, 2010.
  • CRZ Technologies. Mango Z1 Board Specifications. Available at http://www.mangoboard. com/sub2.html?ptype=view&prdcode=1105170004, 2014.
  • C. Lin, C. Federspiel, and D. Auslander. Multi-Sensor Single Actuator Control of HVAC Systems. In Internationl Conference for Enhanced Building Operations, 2002.
  • C. Knapp and G. C. Carter. The generalized correlation method for estimation of time delay. IEEE Transactions on Acoustics, Speech and Signal Processing, 24(4):320–327, 1976.
  • Byoungyoung Lee, Jinoh Oh, Hwanjo Yu, and Jong Kim. Protecting location privacy using location semantics. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1289–1297. ACM, 2011.
  • Bureau of Labor Statistics, american time use survey. http://www.bls.gov/news. release/atus.nr0.htm.
  • Boris Danev, Thomas S Heydt-Benjamin, and Srdjan Capkun. Physical-layer identification of rfid devices. In Usenix Security Symposium, pages 199–214, 2009.
  • Bo Jiang, Binoy Ravindran, and Hyeonjoong Cho. Probability-based prediction and sleep scheduling for energy-efficient target tracking in sensor networks. Mobile Computing, IEEE Transactions on, 12(4):735–747, 2013.
  • Bluetooth car kits, bluetooth. http://www.bluetooth.com/Pages/ Handsfree-Calling.aspx.
  • Basel Alomair, Andrew Clark, Jorge Cuellar, and Radha Poovendran. Statistical framework for source anonymity in sensor networks. In Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, pages 1–6. IEEE, 2010.
  • Andreas Willig and Robert Mitschke. Results of Bit Error Measurements with Sensor Nodes and Casuistic Consequences for Design of Energy-Efficient Error Control Schemes. In Proceedings of EWSN, February 2006.
  • Andreas Riener and Alois Ferscha. Supporting implicit human-to-vehicle interaction: Driver identification from sitting postures. In The First Annual International Symposium on Vehicular Computing Systems (ISVCS 2008), page 10, 2008.
  • Alina Olteanu, Yang Xiao, Fei Hu, Bo Sun, and Hongmei Deng. A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and rfid. Wireless Communications and Mobile Computing, 11(2):254–266, 2011.
  • Alex J Smola and Bernhard Sch olkopf. Learning with kernels. Citeseer, 1998.
  • Abdul Qudoos Memon, Sian Lun Lau, and Klaus David. Investigation and compensation of the magnetic deviation on a magnetometer of a smartphone caused by a vehicle. In Vehicular Technology Conference (VTC Fall), 2013 IEEE 78th, pages 1–5. IEEE, 2013.
  • AT&T drivemode app. http://www.att.com/gen/press-room?pid=23185.
  • A. Schaeper, C. Palazuelos, D. Denteneer, and O. Garcia-Morchon. Intelligent lighting control using sensor networks. In Networking, Sensing and Control (ICNSC), 2013 10th IEEE International Conference on, pages 170–175, April 2013.
  • A. Lombard, Y. Zheng, H. Buchner, and W. Kellermann. TDOA estimation for multiple sound sources in noisy and reverberant environments using broadband independent component analysis. IEEE Transactions on Audio, Speech, and Language Processing, 19(6):1490–1503, 2003.
  • A. Janin, J. Ang, S. Bhagat, R. Dhillon, J. Edwards, J. Marc ıas-Guarasa, N. Morgan, B. Peskin, E. Shriberg, A. Stolckeand C. Wooters, and B. Wrede. The icsi meeting project: Resources and research. In IEEE International Conference on Acoustics, Speech and Signal Processing 2004 Meeting Recognition Workshop (NIST RT-04 Spring Recognition Evaluation), 2004.