Non-invasive sensor solutions for activity recognition in smart homes
暂无分享,去创建一个
[1] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[3] Eric C. Larson,et al. Disaggregated End-Use Energy Sensing for the Smart Grid , 2011, IEEE Pervasive Computing.
[4] Andry Rakotonirainy,et al. A Survey of Research on Context-Aware Homes , 2003, ACSW.
[5] Mani B. Srivastava,et al. NAWMS: nonintrusive autonomous water monitoring system , 2008, SenSys '08.
[6] Jennifer Healey,et al. A Long-Term Evaluation of Sensing Modalities for Activity Recognition , 2007, UbiComp.
[7] Les E. Atlas,et al. A Longitudinal Study of Pressure Sensing to Infer Real-World Water Usage Events in the Home , 2011, Pervasive.
[8] Mani B. Srivastava,et al. ViridiScope: design and implementation of a fine grained power monitoring system for homes , 2009, UbiComp.
[9] Andreas Savvides,et al. Estimating building consumption breakdowns using ON/OFF state sensing and incremental sub-meter deployment , 2010, SenSys '10.
[10] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[11] Rama Chellappa,et al. Machine Recognition of Human Activities: A Survey , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Masahiro Inoue,et al. A Home Automation System , 1985, IEEE Transactions on Consumer Electronics.
[13] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[14] Kamin Whitehouse,et al. Using Height Sensors for Biometric Identification in Multi-resident Homes , 2010, Pervasive.
[15] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[16] Toshio Hirotsu,et al. Proximity mining: finding proximity using sensor data history , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[17] James Fogarty,et al. Sensing from the basement: a feasibility study of unobtrusive and low-cost home activity recognition , 2006, UIST.
[18] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[19] Irfan A. Essa,et al. Exploiting human actions and object context for recognition tasks , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[20] Eric C. Larson,et al. GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home , 2010, Pervasive.
[21] M. Csíkszentmihályi,et al. The experience of psychopathology: Investigating mental disorders in their natural settings. , 1992 .
[22] Alan D. Smith,et al. Exploring the acceptability of biometrics and fingerprint technologies , 2005, Int. J. Serv. Stand..
[23] Rachel R. Stoiko. The Health and Retirement Study , 2014, International journal of aging & human development.
[24] M. D. Addlesee,et al. The ORL Active Floor , 1997 .
[25] Matthai Philipose,et al. Unsupervised Activity Recognition Using Automatically Mined Common Sense , 2005, AAAI.
[26] Gregory M. P. O'Hare,et al. Evaluation of energy-efficiency in lighting systems using sensor networks , 2009, BuildSys '09.
[27] Michel Barbeau,et al. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.
[28] Gwenn Englebienne,et al. Accurate activity recognition in a home setting , 2008, UbiComp.
[29] Robert Harle,et al. Pedestrian localisation for indoor environments , 2008, UbiComp.
[30] Gerhard P. Hancke,et al. Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.
[31] P. Mayer. Residential End Uses of Water , 1999 .
[32] Gregory D. Abowd,et al. At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line (Nominated for the Best Paper Award) , 2007, UbiComp.
[33] Shwetak N. Patel,et al. ElectriSense: single-point sensing using EMI for electrical event detection and classification in the home , 2010, UbiComp.
[34] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.
[35] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[36] Carla Schlatter Ellis,et al. Using Ground Reaction Forces from Gait Analysis: Body Mass as a Weak Biometric , 2007, Pervasive.
[37] Kamin Whitehouse,et al. The smart thermostat: using occupancy sensors to save energy in homes , 2010, SenSys '10.
[38] Ling Bao,et al. A context-aware experience sampling tool , 2003, CHI Extended Abstracts.
[39] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[40] Predrag V. Klasnja,et al. Exploring Privacy Concerns about Personal Sensing , 2009, Pervasive.
[41] R.N. Murty,et al. CitySense: An Urban-Scale Wireless Sensor Network and Testbed , 2008, 2008 IEEE Conference on Technologies for Homeland Security.
[42] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[43] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[44] Sencun Zhu,et al. Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.
[45] Markus G. Kuhn,et al. Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.
[46] Chaouki Kasmi,et al. Voice Biometrics , 2011, Encyclopedia of Cryptography and Security.
[47] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[48] Christopher G. Atkeson,et al. Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors , 2005, Pervasive.
[49] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[50] Eric C. Larson,et al. HydroSense: infrastructure-mediated single-point sensing of whole-home water activity , 2009, UbiComp.
[51] Sunny Consolvo,et al. Using the Experience Sampling Method to Evaluate Ubicomp Applications , 2003, IEEE Pervasive Comput..
[52] Matt Welsh,et al. Sensor networks for medical care , 2005, SenSys '05.
[53] Matthai Philipose,et al. Hands-on RFID: wireless wearables for detecting use of objects , 2005, Ninth IEEE International Symposium on Wearable Computers (ISWC'05).
[54] Gang Zhou,et al. VigilNet: An integrated sensor network system for energy-efficient surveillance , 2006, TOSN.
[55] John A. Stankovic,et al. ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring , 2006 .
[56] Kamin Whitehouse,et al. The hitchhiker's guide to successful residential sensing deployments , 2011, SenSys.
[57] Emmanuel,et al. Activity recognition in the home setting using simple and ubiquitous sensors , 2003 .
[58] Trevor Darrell,et al. Integrated face and gait recognition from multiple views , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[59] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[60] Matt Welsh,et al. MoteTrack: a robust, decentralized approach to RF-based location tracking , 2006, Personal and Ubiquitous Computing.
[61] Gregory D. Abowd,et al. PowerLine Positioning: A Practical Sub-Room-Level Indoor Location System for Domestic Use , 2006, UbiComp.
[62] Kamin Whitehouse,et al. WaterSense: water flow disaggregation using motion sensors , 2011, BuildSys '11.
[63] Tadayoshi Kohno,et al. Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing , 2007, USENIX Security Symposium.
[64] Larry S. Davis,et al. Person identification using automatic height and stride estimation , 2002, Object recognition supported by user interaction for service robots.
[65] Anthony Rowe,et al. Contactless sensing of appliance state transitions through variations in electromagnetic fields , 2010, BuildSys '10.
[66] Ling Bao,et al. Activity Recognition from User-Annotated Acceleration Data , 2004, Pervasive.
[67] Kamin Whitehouse,et al. The self-programming thermostat: optimizing setback schedules based on home occupancy patterns , 2009, BuildSys '09.
[68] David E. Culler,et al. Design and implementation of a high-fidelity AC metering network , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[69] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[70] Christopher James Jenkins,et al. The Weakly Identifying System for Doorway Monitoring , 2007 .
[71] Gregory D. Abowd,et al. TrackSense: Infrastructure Free Precise Indoor Positioning Using Projected Patterns , 2007, Pervasive.
[72] Y. Nishida,et al. Minimally privacy-violative human location sensor by ultrasonic radar embedded on ceiling , 2004, Proceedings of IEEE Sensors, 2004..
[73] John A. Stankovic,et al. Empath: a continuous remote emotional health monitoring system for depressive illness , 2011, Wireless Health.
[74] Roman Lim. Wireless Fire Sensor Network Demonstrator , 2006 .
[75] M. Csíkszentmihályi,et al. Validity and Reliability of the Experience‐Sampling Method , 1987, The Journal of nervous and mental disease.
[76] Harold W. Kuhn,et al. The Hungarian method for the assignment problem , 1955, 50 Years of Integer Programming.
[77] Joshua R. Smith,et al. RFID-based techniques for human-activity detection , 2005, Commun. ACM.
[78] A. Glascock,et al. Behavioral Telemedicine: A New Approach to the Continuous Nonintrusive Monitoring of Activities of Daily Living , 2000 .
[79] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[80] Laurie J. Heyer,et al. Exploring expression data: identification and analysis of coexpressed genes. , 1999, Genome research.
[81] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.