Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Personal and Ubiquitous Computing
Springer-Verlag
 
   
 
Options:
 
  1-10 of 64 reviews Date Reviewed 
  Sleep behavior assessment via smartwatch and stigmergic receptive fields
Alfeo A., Barsocchi P., Cimino M., La Rosa D., Palumbo F., Vaglini G. Personal and Ubiquitous Computing 22(2): 227-243, 2018.  Type: Article

A stigmergic receptive field (SRF) is suggested as an improved variant of machine learning (ML). The authors successfully prove their proposed variant. They analyze heartbeat rate and accelerometer data coming from a smart watch to det...

Oct 18 2018
  A novel stock recommendation system using Guba sentiment analysis
Sun Y., Fang M., Wang X. Personal and Ubiquitous Computing 22(3): 575-587, 2018.  Type: Article

It’s pretty obvious that if you know what investors are thinking, you can predict what stocks they’ll buy and sell. Stock scams have operated for years on the complement of this thought, that is, attempt to change i...

Sep 5 2018
  Searching for the Internet of Things: where it is and what it looks like
Shemshadi A., Sheng Q., Qin Y., Sun A., Zhang W., Yao L. Personal and Ubiquitous Computing 21(6): 1097-1112, 2017.  Type: Article

The Internet of Things (IoT) is widely presented as a revolutionary technology, touching all aspects of our lives and being accessible to more people than ever before. The reality of the IoT, however, does not fulfill the hype, and we ...

Jul 24 2018
  Resiliency of mobile OS security for secure personal ubiquitous computing
Lee S., Lee S., Kang T., Kwon M., Lee N., Kim H. Personal and Ubiquitous Computing 22(1): 23-34, 2018.  Type: Article

More and more, mobile equipment is a working tool everywhere. The operating system is a fundamental component of the protection strategy, that is, by improving the operating system, we are contributing to more reliable equipment. One o...

Jun 25 2018
  SAViL: cross-display visual links for sensemaking in display ecologies
Chung H., North C. Personal and Ubiquitous Computing 22(2): 409-431, 2018.  Type: Article

This paper discusses software that links data scattered across separate displays. Software intended for users who need to integrate documents from different displays, from different devices. The example given is an investigator correla...

Jun 22 2018
  Gamification for development: a case of collaborative learning in Sri Lankan primary schools
Halloluwa T., Vyas D., Usoof H., Hewagamage K. Personal and Ubiquitous Computing 22(2): 391-407, 2018.  Type: Article

In this paper, the authors explore the gamification of mathematics curriculum in several primary school classrooms in Sri Lanka. They used standard processes to conduct their research; however, several important themes were uncovered a...

Jun 5 2018
  Man-in-the-middle attacks on secure simple pairing in Bluetooth standard V5.0 and its countermeasure
Sun D., Mu Y., Susilo W. Personal and Ubiquitous Computing 22(1): 55-67, 2018.  Type: Article

Sun et al. describe a vulnerability in the Bluetooth protocol. In particular, they show that a part of the so-called secure simple pairing (SSP) process can be attacked in a man-in-the-middle scenario. SSP is used by newer Bluetooth de...

May 3 2018
  Proxy-assisted access control scheme of cloud data for smart cities
Fan K., Wang J., Wang X., Yang Y. Personal and Ubiquitous Computing 21(5): 937-947, 2017.  Type: Article

The rapid development of cloud and fog computing accompanied by the deployment of the Internet of Things (IoT) ensure big data collection from various sources, including humans, devices, and assets. The core of any smart city project i...

Apr 5 2018
  Towards privacy protection and malicious behavior traceability in smart health
Zhang Y., Li J., Zheng D., Chen X., Li H. Personal and Ubiquitous Computing 21(5): 815-830, 2017.  Type: Article

In this paper, the authors address privacy and malicious behavior for e-health, since they argue that it is particularly ideal for use in smart cities. The authors’ concern for users is privacy protection through cryptographi...

Mar 20 2018
   Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
Lai J., Mu Y., Guo F., Susilo W., Chen R. Personal and Ubiquitous Computing 21(5): 855-868, 2017.  Type: Article

The “smart city” will provide numerous services via broadcasted encrypted data, such as a pin or key for paid users to access water service. These researchers go beyond data security and consider data access control...

Jan 10 2018
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy