Abstract is missing.
- A Practical Approach to Recognizing Physical ActivitiesJonathan Lester, Tanzeem Choudhury, Gaetano Borriello. 1-16 [doi]
- Building Reliable Activity Models Using Hierarchical Shrinkage and Mined OntologyEmmanuel Munguia Tapia, Tanzeem Choudhury, Matthai Philipose. 17-32 [doi]
- Need to Know : Examining Information Need in Location DiscourseDerek F. Reilly, David Dearman, Vicki Ha, Ian Smith, Kori Inkpen. 33-49 [doi]
- Collaborative Localization: Enhancing WiFi-Based Position Estimation with Neighborhood Links in ClustersLi-Wei Chan, Ji-Rung Chiang, Yi-Chao Chen, Chia-nan Ke, Jane Yung-jen Hsu, Hao-Hua Chu. 50-66 [doi]
- Risks of Using AP Locations Discovered Through War DrivingMinkyong Kim, Jeffrey J. Fielding, David Kotz. 67-82 [doi]
- Declarative Support for Sensor Data CleaningShawn R. Jeffery, Gustavo Alonso, Michael J. Franklin, Wei Hong, Jennifer Widom. 83-100 [doi]
- Detecting and Interpreting Muscle Activity with Wearable Force SensorsPaul Lukowicz, Friedrich Hanser, Christoph Szubski, Wolfgang Schobersberger. 101-116 [doi]
- The Design of a Portable Kit of Wireless Sensors for Naturalistic Data CollectionEmmanuel Munguia Tapia, Stephen S. Intille, Louis Lopez, Kent Larson. 117-134 [doi]
- The Smart Tachograph - Individual Accounting of Traffic Costs and Its ImplicationsVlad Coroama. 135-152 [doi]
- Domino: Exploring Mobile Collaborative Software AdaptationMarek Bell, Malcolm Hall, Matthew Chalmers, Philip D. Gray, Barry Brown. 153-168 [doi]
- Keep Your Eyes on the Road and Your Finger on the Trigger - Designing for Mixed Focus of Attention in a Mobile Game for Brief EncountersLiselott Brunnberg, Oskar Juhlin. 169-186 [doi]
- Unobtrusive Multimodal Biometrics for Ensuring Privacy and Information Security with Personal DevicesElena Vildjiounaite, Satu-Marja Mäkelä, Mikko Lindholm, Reima Riihimäki, Vesa Kyllönen, Jani Mäntyjärvi, Heikki Ailisto. 187-201 [doi]
- LoKey: Leveraging the SMS Network in Decentralized, End-to-End Trust EstablishmentAnthony J. Nicholson, Ian E. Smith, Jeff Hughes, Brian D. Noble. 202-219 [doi]
- Scalability in a Secure Distributed Proof SystemKazuhiro Minami, David Kotz. 220-237 [doi]
- Secure Mobile Computing Via Public TerminalsRichard Sharp, James Scott, Alastair R. Beresford. 238-253 [doi]
- iCAP: Interactive Prototyping of Context-Aware ApplicationsAnind K. Dey, Timothy Sohn, Sara Streng, Justin Kodama. 254-271 [doi]
- iCam: Precise at-a-Distance Interaction in the Physical EnvironmentShwetak N. Patel, Jun Rekimoto, Gregory D. Abowd. 272-287 [doi]
- Gesture Signature for Ambient Intelligence Applications: A Feasibility StudyElisabetta Farella, M. Sile O Modhrain, Luca Benini, Bruno Riccò. 288-304 [doi]
- Exploring the Effects of Target Location Size and Position System Accuracy on Location Based ApplicationsCliff Randell, Erik Geelhoed, Alan J. Dix, Henk L. Muller. 305-320 [doi]
- Displays in the Wild: Understanding the Dynamics and Evolution of a Display EcologyElaine M. Huang, Elizabeth D. Mynatt, Jay P. Trimble. 321-336 [doi]
- Modeling Human Behavior from Simple Sensors in the HomeRyan Aipperspach, Elliot Cohen, John F. Canny. 337-348 [doi]
- Using a Live-In Laboratory for Ubiquitous Computing ResearchStephen S. Intille, Kent Larson, Emmanuel Munguia Tapia, Jennifer Beaudin, Pallavi Kaushik, Jason Nawyn, Randy Rockinson. 349-365 [doi]
- The Diet-Aware Dining Table: Observing Dietary Behaviors over a Tabletop SurfaceKeng-hao Chang, Shih-yen Liu, Hao-Hua Chu, Jane Yung-jen Hsu, Cheryl Chen, Tung-yun Lin, Chieh-Yu Chen, Polly Huang. 366-382 [doi]
- Lessons for the Future: Experiences with the Installation and Use of Today s Domestic Sensors and TechnologiesMark Stringer, Geraldine Fitzpatrick, Eric Harris. 383-399 [doi]