callback( { "result":{ "query":":facetid:toc:\"db/conf/percom/percomw2010.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.95" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"182", "@dc":"182", "@oc":"182", "@id":"43406136", "text":":facetid:toc:db/conf/percom/percomw2010.bht" } }, "hits":{ "@total":"182", "@computed":"100", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"4969386", "info":{"authors":{"author":[{"@pid":"79/5835","text":"Alessandra Agostini"},{"@pid":"97/8359","text":"Elisa Di Biase"},{"@pid":"76/3286","text":"Marco Loregian"}]},"title":"Stimulating cooperative and participative learning to match digital natives' needs.","venue":"PerCom Workshops","pages":"274-279","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/AgostiniBL10","doi":"10.1109/PERCOMW.2010.5470657","ee":"https://doi.org/10.1109/PERCOMW.2010.5470657","url":"https://dblp.org/rec/conf/percom/AgostiniBL10"}, "url":"URL#4969386" }, { "@score":"1", "@id":"4969387", "info":{"authors":{"author":{"@pid":"51/6949","text":"Nova Ahmed"}},"title":"Reliable framework for unreliable RFID devices.","venue":"PerCom Workshops","pages":"871-872","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/Ahmed10","doi":"10.1109/PERCOMW.2010.5470571","ee":"https://doi.org/10.1109/PERCOMW.2010.5470571","url":"https://dblp.org/rec/conf/percom/Ahmed10"}, "url":"URL#4969387" }, { "@score":"1", "@id":"4969388", "info":{"authors":{"author":[{"@pid":"51/6949","text":"Nova Ahmed"},{"@pid":"64/8359","text":"S. Butler"},{"@pid":"r/URamachandran","text":"Umakishore Ramachandran"}]},"title":"GuardianAngel: An RFID-based indoor guidance and monitoring system.","venue":"PerCom Workshops","pages":"546-551","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/AhmedBR10","doi":"10.1109/PERCOMW.2010.5470498","ee":"https://doi.org/10.1109/PERCOMW.2010.5470498","url":"https://dblp.org/rec/conf/percom/AhmedBR10"}, "url":"URL#4969388" }, { "@score":"1", "@id":"4969389", "info":{"authors":{"author":[{"@pid":"61/5674","text":"Luca Maria Aiello"},{"@pid":"05/4635","text":"Giancarlo Ruffo"}]},"title":"Secure and flexible framework for decentralized social network services.","venue":"PerCom Workshops","pages":"594-599","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/AielloR10","doi":"10.1109/PERCOMW.2010.5470506","ee":"https://doi.org/10.1109/PERCOMW.2010.5470506","url":"https://dblp.org/rec/conf/percom/AielloR10"}, "url":"URL#4969389" }, { "@score":"1", "@id":"4969390", "info":{"authors":{"author":[{"@pid":"07/5565","text":"Jalal Al-Muhtadi"},{"@pid":"01/6803","text":"Andrea Passarella"}]},"title":"Message from the workshops chairs.","venue":"PerCom Workshops","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/Al-MuhtadiP10","doi":"10.1109/PERCOMW.2010.5470591","ee":"https://doi.org/10.1109/PERCOMW.2010.5470591","url":"https://dblp.org/rec/conf/percom/Al-MuhtadiP10"}, "url":"URL#4969390" }, { "@score":"1", "@id":"4969391", "info":{"authors":{"author":[{"@pid":"84/6337","text":"Cesare Alippi"},{"@pid":"78/1175","text":"Luigi Sportiello"}]},"title":"Robust hybrid wired-wireless sensor networks.","venue":"PerCom Workshops","pages":"462-467","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/AlippiS10","doi":"10.1109/PERCOMW.2010.5470624","ee":"https://doi.org/10.1109/PERCOMW.2010.5470624","url":"https://dblp.org/rec/conf/percom/AlippiS10"}, "url":"URL#4969391" }, { "@score":"1", "@id":"4969392", "info":{"authors":{"author":[{"@pid":"51/6825","text":"Florian Alt"},{"@pid":"53/781","text":"Alireza Sahami Shirazi"},{"@pid":"98/3799","text":"Andreas Kaiser"},{"@pid":"83/8359","text":"Ken Pfeuffer"},{"@pid":"29/8359","text":"Emre Gurkan"},{"@pid":"s/AlbrechtSchmidt1","text":"Albrecht Schmidt 0001"},{"@pid":"60/2397","text":"Paul Holleis"},{"@pid":"33/4599-1","text":"Matthias Wagner 0001"}]},"title":"Exploring ambient visualizations of context information.","venue":"PerCom Workshops","pages":"788-791","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/AltSKPGSHW10","doi":"10.1109/PERCOMW.2010.5470542","ee":"https://doi.org/10.1109/PERCOMW.2010.5470542","url":"https://dblp.org/rec/conf/percom/AltSKPGSHW10"}, "url":"URL#4969392" }, { "@score":"1", "@id":"4969393", "info":{"authors":{"author":[{"@pid":"02/4953","text":"Oliver Amft"},{"@pid":"53/6669","text":"David Bannach"},{"@pid":"62/7813","text":"Gerald Pirkl"},{"@pid":"35/2757","text":"Matthias Kreil"},{"@pid":"l/PaulLukowicz","text":"Paul Lukowicz"}]},"title":"Towards wearable sensing-based assessment of fluid intake.","venue":"PerCom Workshops","pages":"298-303","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/AmftBPKL10","doi":"10.1109/PERCOMW.2010.5470653","ee":"https://doi.org/10.1109/PERCOMW.2010.5470653","url":"https://dblp.org/rec/conf/percom/AmftBPKL10"}, "url":"URL#4969393" }, { "@score":"1", "@id":"4969394", "info":{"authors":{"author":[{"@pid":"46/567","text":"Ville Antila"},{"@pid":"86/1673","text":"Jani Mäntyjärvi"},{"@pid":"44/1511","text":"Ville Könönen"}]},"title":"Optimizing meeting scheduling in collaborative mobile systems through distributed voting.","venue":"PerCom Workshops","pages":"238-243","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/AntilaMK10","doi":"10.1109/PERCOMW.2010.5470663","ee":"https://doi.org/10.1109/PERCOMW.2010.5470663","url":"https://dblp.org/rec/conf/percom/AntilaMK10"}, "url":"URL#4969394" }, { "@score":"1", "@id":"4969395", "info":{"authors":{"author":[{"@pid":"64/8297","text":"Wolfgang Apolinarski"},{"@pid":"35/3498","text":"Marcus Handte"},{"@pid":"65/3060","text":"Pedro José Marrón"}]},"title":"A secure context distribution framework for peer-based pervasive systems.","venue":"PerCom Workshops","pages":"505-510","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/ApolinarskiHM10","doi":"10.1109/PERCOMW.2010.5470619","ee":"https://doi.org/10.1109/PERCOMW.2010.5470619","url":"https://dblp.org/rec/conf/percom/ApolinarskiHM10"}, "url":"URL#4969395" }, { "@score":"1", "@id":"4969396", "info":{"authors":{"author":[{"@pid":"20/32","text":"Francisco J. Ballesteros"},{"@pid":"55/2858","text":"Gorka Guardiola"},{"@pid":"98/6833","text":"Enrique Soriano 0001"}]},"title":"UpperWare: Bringing resources back to the system.","venue":"PerCom Workshops","pages":"511-516","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BallesterosGS10","doi":"10.1109/PERCOMW.2010.5470592","ee":"https://doi.org/10.1109/PERCOMW.2010.5470592","url":"https://dblp.org/rec/conf/percom/BallesterosGS10"}, "url":"URL#4969396" }, { "@score":"1", "@id":"4969397", "info":{"authors":{"author":[{"@pid":"18/8360","text":"Karolina Baras"},{"@pid":"45/5350","text":"Adriano J. C. Moreira"}]},"title":"Anomaly detection in university campus WiFi zones.","venue":"PerCom Workshops","pages":"202-207","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BarasM10","doi":"10.1109/PERCOMW.2010.5470669","ee":"https://doi.org/10.1109/PERCOMW.2010.5470669","url":"https://dblp.org/rec/conf/percom/BarasM10"}, "url":"URL#4969397" }, { "@score":"1", "@id":"4969398", "info":{"authors":{"author":[{"@pid":"41/4577","text":"Aaron Beach"},{"@pid":"75/3021","text":"Mike Gartrell"},{"@pid":"74/2447","text":"Richard Han 0001"}]},"title":"Social-K: Real-time K-anonymity guarantees for social network applications.","venue":"PerCom Workshops","pages":"600-606","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BeachGH10","doi":"10.1109/PERCOMW.2010.5470507","ee":"https://doi.org/10.1109/PERCOMW.2010.5470507","url":"https://dblp.org/rec/conf/percom/BeachGH10"}, "url":"URL#4969398" }, { "@score":"1", "@id":"4969399", "info":{"authors":{"author":{"@pid":"88/8359","text":"Bridget Beamon"}},"title":"Evaluation of first order Bayesian networks for context modeling and reasoning.","venue":"PerCom Workshops","pages":"867-868","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/Beamon10","doi":"10.1109/PERCOMW.2010.5470569","ee":"https://doi.org/10.1109/PERCOMW.2010.5470569","url":"https://dblp.org/rec/conf/percom/Beamon10"}, "url":"URL#4969399" }, { "@score":"1", "@id":"4969400", "info":{"authors":{"author":[{"@pid":"88/8359","text":"Bridget Beamon"},{"@pid":"68/5181","text":"Mohan Kumar"}]},"title":"HyCoRE: Towards a generalized hierarchical hybrid context reasoning engine.","venue":"PerCom Workshops","pages":"30-36","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BeamonK10","doi":"10.1109/PERCOMW.2010.5470599","ee":"https://doi.org/10.1109/PERCOMW.2010.5470599","url":"https://dblp.org/rec/conf/percom/BeamonK10"}, "url":"URL#4969400" }, { "@score":"1", "@id":"4969401", "info":{"authors":{"author":[{"@pid":"b/ChristianBecker","text":"Christian Becker 0001"},{"@pid":"17/4829","text":"Marco Conti"}]},"title":"Message from the general chairs.","venue":"PerCom Workshops","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BeckerC10","doi":"10.1109/PERCOMW.2010.5470590","ee":"https://doi.org/10.1109/PERCOMW.2010.5470590","url":"https://dblp.org/rec/conf/percom/BeckerC10"}, "url":"URL#4969401" }, { "@score":"1", "@id":"4969402", "info":{"authors":{"author":[{"@pid":"95/8359","text":"Johan Bergs"},{"@pid":"30/6459","text":"Dries Naudts"},{"@pid":"62/6602","text":"Nik Van den Wijngaert"},{"@pid":"89/1506","text":"Chris Blondia"},{"@pid":"77/5355","text":"Ingrid Moerman"},{"@pid":"d/PietDemeester","text":"Piet Demeester"},{"@pid":"75/8359","text":"Jerome Paquay"},{"@pid":"06/8360","text":"Frank De Reymaeker"},{"@pid":"07/8360","text":"John Baekelmans"}]},"title":"The ADAMO project: Architecture to support communication for emergency services.","venue":"PerCom Workshops","pages":"382-387","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BergsNWBMDPRB10","doi":"10.1109/PERCOMW.2010.5470639","ee":"https://doi.org/10.1109/PERCOMW.2010.5470639","url":"https://dblp.org/rec/conf/percom/BergsNWBMDPRB10"}, "url":"URL#4969402" }, { "@score":"1", "@id":"4969403", "info":{"authors":{"author":{"@pid":"b/CBettini","text":"Claudio Bettini"}},"title":"IEEE PerCom 2010 PhD Forum: Message from the PhD Forum chair.","venue":"PerCom Workshops","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/Bettini10","doi":"10.1109/PERCOMW.2010.5470584","ee":"https://doi.org/10.1109/PERCOMW.2010.5470584","url":"https://dblp.org/rec/conf/percom/Bettini10"}, "url":"URL#4969403" }, { "@score":"1", "@id":"4969404", "info":{"authors":{"author":[{"@pid":"72/8359","text":"Sachin Bhardwaj"},{"@pid":"o/TanirOzcelebi","text":"Tanir Özçelebi"},{"@pid":"l/JJLukkien","text":"Johan Lukkien"}]},"title":"Smart lighting using LED luminaries.","venue":"PerCom Workshops","pages":"654-659","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BhardwajOL10","doi":"10.1109/PERCOMW.2010.5470516","ee":"https://doi.org/10.1109/PERCOMW.2010.5470516","url":"https://dblp.org/rec/conf/percom/BhardwajOL10"}, "url":"URL#4969404" }, { "@score":"1", "@id":"4969405", "info":{"authors":{"author":[{"@pid":"18/1840","text":"Chatschik Bisdikian"},{"@pid":"d/SajalKDas","text":"Sajal K. Das 0001"},{"@pid":"76/5895","text":"Qi Han"},{"@pid":"k/HolgerKarl","text":"Holger Karl"}]},"title":"2nd IEEE International Workshop on Information Quality and Quality of Service for Pervasive Computing IQ2S 2010: Message from the workshop chairs.","venue":"PerCom Workshops","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BisdikianDHK10","doi":"10.1109/PERCOMW.2010.5470574","ee":"https://doi.org/10.1109/PERCOMW.2010.5470574","url":"https://dblp.org/rec/conf/percom/BisdikianDHK10"}, "url":"URL#4969405" }, { "@score":"1", "@id":"4969406", "info":{"authors":{"author":[{"@pid":"79/5846","text":"Ulf Blanke"},{"@pid":"s/BerntSchiele","text":"Bernt Schiele"},{"@pid":"35/2757","text":"Matthias Kreil"},{"@pid":"l/PaulLukowicz","text":"Paul Lukowicz"},{"@pid":"21/4593","text":"Bernhard Sick"},{"@pid":"90/2876","text":"Thiemo Gruber"}]},"title":"All for one or one for all? Combining heterogeneous features for activity spotting.","venue":"PerCom Workshops","pages":"18-24","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BlankeSKLSG10","doi":"10.1109/PERCOMW.2010.5470597","ee":"https://doi.org/10.1109/PERCOMW.2010.5470597","url":"https://dblp.org/rec/conf/percom/BlankeSKLSG10"}, "url":"URL#4969406" }, { "@score":"1", "@id":"4969407", "info":{"authors":{"author":[{"@pid":"26/8360","text":"Stefano Bonetti"},{"@pid":"m/SharadMehrotra","text":"Sharad Mehrotra"},{"@pid":"66/1875","text":"Nalini Venkatasubramanian"}]},"title":"Exploring quality in multisensor pervasive systems - a localization case study.","venue":"PerCom Workshops","pages":"81-86","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BonettiMV10","doi":"10.1109/PERCOMW.2010.5470607","ee":"https://doi.org/10.1109/PERCOMW.2010.5470607","url":"https://dblp.org/rec/conf/percom/BonettiMV10"}, "url":"URL#4969407" }, { "@score":"1", "@id":"4969408", "info":{"authors":{"author":[{"@pid":"26/5462","text":"Dario Bonino"},{"@pid":"59/2777","text":"Fulvio Corno"}]},"title":"DogSim: A state chart simulator for Domotic Environments.","venue":"PerCom Workshops","pages":"208-213","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BoninoC10","doi":"10.1109/PERCOMW.2010.5470666","ee":"https://doi.org/10.1109/PERCOMW.2010.5470666","url":"https://dblp.org/rec/conf/percom/BoninoC10"}, "url":"URL#4969408" }, { "@score":"1", "@id":"4969409", "info":{"authors":{"author":[{"@pid":"57/368","text":"Aidan Boran"},{"@pid":"16/508","text":"Declan O'Sullivan"},{"@pid":"w/VincentPWade","text":"Vincent Wade"}]},"title":"Managing ontology based integration systems using dependencies.","venue":"PerCom Workshops","pages":"165-170","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BoranOW10","doi":"10.1109/PERCOMW.2010.5470675","ee":"https://doi.org/10.1109/PERCOMW.2010.5470675","url":"https://dblp.org/rec/conf/percom/BoranOW10"}, "url":"URL#4969409" }, { "@score":"1", "@id":"4969410", "info":{"authors":{"author":[{"@pid":"35/5335","text":"Swastik Brahma"},{"@pid":"05/5385","text":"Mainak Chatterjee"},{"@pid":"86/3876","text":"Kevin A. Kwiat"}]},"title":"Congestion control and fairness in wireless sensor networks.","venue":"PerCom Workshops","pages":"413-418","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BrahmaCK10","doi":"10.1109/PERCOMW.2010.5470632","ee":"https://doi.org/10.1109/PERCOMW.2010.5470632","url":"https://dblp.org/rec/conf/percom/BrahmaCK10"}, "url":"URL#4969410" }, { "@score":"1", "@id":"4969411", "info":{"authors":{"author":[{"@pid":"54/2905","text":"Boris Brandherm"},{"@pid":"13/6029","text":"Jens Haupert"},{"@pid":"39/4695","text":"Alexander Kröner"},{"@pid":"01/689-1","text":"Michael Schmitz 0001"},{"@pid":"99/4262-2","text":"Frank Lehmann 0002"}]},"title":"Roles and rights management concept with identification by electronic identity card.","venue":"PerCom Workshops","pages":"768-771","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BrandhermHKSL10","doi":"10.1109/PERCOMW.2010.5470537","ee":"https://doi.org/10.1109/PERCOMW.2010.5470537","url":"https://dblp.org/rec/conf/percom/BrandhermHKSL10"}, "url":"URL#4969411" }, { "@score":"1", "@id":"4969412", "info":{"authors":{"author":[{"@pid":"54/2905","text":"Boris Brandherm"},{"@pid":"13/6029","text":"Jens Haupert"},{"@pid":"39/4695","text":"Alexander Kröner"},{"@pid":"01/689-1","text":"Michael Schmitz 0001"},{"@pid":"99/4262-2","text":"Frank Lehmann 0002"}]},"title":"Demo: Authorized access on and interaction with Digital Product Memories.","venue":"PerCom Workshops","pages":"838-840","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BrandhermHKSL10a","doi":"10.1109/PERCOMW.2010.5470556","ee":"https://doi.org/10.1109/PERCOMW.2010.5470556","url":"https://dblp.org/rec/conf/percom/BrandhermHKSL10a"}, "url":"URL#4969412" }, { "@score":"1", "@id":"4969413", "info":{"authors":{"author":[{"@pid":"37/1312","text":"Wouter Van den Broeck"},{"@pid":"42/5539","text":"Ciro Cattuto"},{"@pid":"67/3434","text":"Alain Barrat"},{"@pid":"35/3308","text":"Martin Szomszor"},{"@pid":"61/5152","text":"Gianluca Correndo"},{"@pid":"74/2147","text":"Harith Alani"}]},"title":"The Live Social Semantics application: a platform for integrating face-to-face presence with on-line social networking.","venue":"PerCom Workshops","pages":"226-231","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BroeckCBSCA10","doi":"10.1109/PERCOMW.2010.5470665","ee":"https://doi.org/10.1109/PERCOMW.2010.5470665","url":"https://dblp.org/rec/conf/percom/BroeckCBSCA10"}, "url":"URL#4969413" }, { "@score":"1", "@id":"4969414", "info":{"authors":{"author":[{"@pid":"89/7170","text":"Arne Bröring"},{"@pid":"90/1610","text":"Theodor Foerster"},{"@pid":"32/7924","text":"Simon Jirka"}]},"title":"Interaction patterns for bridging the gap between sensor networks and the Sensor Web.","venue":"PerCom Workshops","pages":"732-737","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BroringFJ10","doi":"10.1109/PERCOMW.2010.5470529","ee":"https://doi.org/10.1109/PERCOMW.2010.5470529","url":"https://dblp.org/rec/conf/percom/BroringFJ10"}, "url":"URL#4969414" }, { "@score":"1", "@id":"4969415", "info":{"authors":{"author":[{"@pid":"03/1660","text":"Nicola Bui"},{"@pid":"03/5308","text":"Osman Ugus"},{"@pid":"09/8360","text":"Moreno Dissegna"},{"@pid":"19/3912","text":"Michele Rossi"},{"@pid":"14/2991","text":"Michele Zorzi"}]},"title":"An integrated system for secure code distribution in Wireless Sensor Networks.","venue":"PerCom Workshops","pages":"575-581","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/percom/BuiUDRZ10","doi":"10.1109/PERCOMW.2010.5470503","ee":"https://doi.org/10.1109/PERCOMW.2010.5470503","url":"https://dblp.org/rec/conf/percom/BuiUDRZ10"}, "url":"URL#4969415" } ] } } } )