06664nam 22008295 450 99646567330331620200705063249.03-540-32034-23-540-26008-010.1007/b136550(CKB)1000000000212996(SSID)ssj0000319412(PQKBManifestationID)11230363(PQKBTitleCode)TC0000319412(PQKBWorkID)10337448(PQKB)10889340(DE-He213)978-3-540-32034-0(MiAaPQ)EBC3067565(PPN)123094690(EXLCZ)99100000000021299620100713d2005 u| 0engurnn#008mamaatxtccrPervasive Computing[electronic resource] Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings /edited by Hans W. Gellersen, Roy Want, Albrecht Schmidt1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (XIV, 350 p.)Information Systems and Applications, incl. Internet/Web, and HCI ;3468Conference proceedings.Printed edition: 9783540260080 Includes bibliographic references and index.Location Techniques -- Audio Location: Accurate Low-Cost Location Sensing -- Using Sound Source Localization in a Home Environment -- Tracking Locations of Moving Hand-Held Displays Using Projected Light -- Activity and Context -- Bathroom Activity Monitoring Based on Sound -- Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors -- Enhancing Semantic Spaces with Event-Driven Context Interpretation -- The Java Context Awareness Framework (JCAF) – A Service Infrastructure and Programming Framework for Context-Aware Applications -- Location and Privacy -- Place Lab: Device Positioning Using Radio Beacons in the Wild -- Social Disclosure of Place: From Location Technology to Communication Practices -- A Formal Model of Obfuscation and Negotiation for Location Privacy -- Handheld Devices -- A Conceptual Framework for Camera Phone-Based Interaction Techniques -- u-Photo: Interacting with Pervasive Services Using Digital Still Images -- Towards Massively Multi-user Augmented Reality on Handheld Devices -- Sensor Systems -- Design Methodology for Context-Aware Wearable Sensor Systems -- Collaborative Sensing in a Retail Store Using Synchronous Distributed Jam Signalling -- Parasitic Mobility for Pervasive Sensor Networks -- User Interaction -- Decision-Theoretic Planning Meets User Requirements: Enhancements and Studies of an Intelligent Shopping Guide -- Integrating Intra and Extra Gestures into a Mobile and Multimodal Shopping Assistant -- AwareMirror: A Personalized Display Using a Mirror -- Embedded Assessment: Overcoming Barriers to Early Detection with Pervasive Computing.WelcometotheproceedingsofPervasive2005,The3rdInternationalConference on Pervasive Computing. We were honored to serve as chairs in this conference series, which was founded in 2002 and is now emerging as one of the most respected venues for publication of research on pervasive and ubiquitous c- puting. The conference is attracting research submissions of very high quality from all over the world, and from researchers representing a variety of disciplines and perspectives. We thank everybody who submitted their papers to Pervasive, demonstrating the extensive work going on in this area; and the Program C- mittee and our external reviewers who spent countless hours providing feedback and guidance in order to create the ?nal program. This year we received 130 submissions. By the end of the review process, we had 566 reviews on ?le, as well as long email discussion threads for each paper. In an initial phase we had each paper reviewed by two members of the Program Committee and two external reviewers. In a second phase, each paper wasdiscussedbyitsfourreviewerstoreachconsensusastoitstechnicalmerit. At the end of this phase, the top-rated papers as well as those that were found to be most controversial were selected for discussion at the PC meeting and reviewed by an additional PC member. The result being that each paper discussed in the PC meeting had 5 reviews and was read by three people who participated in the meeting, leading to a very informed and lively discussion.Information Systems and Applications, incl. Internet/Web, and HCI ;3468Computer communication systemsSpecial purpose computersOperating systems (Computers)Application softwareInformation storage and retrievalComputers and civilizationComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Special Purpose and Application-Based Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I13030Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Information Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Pervasive computingPERVASIVEComputer communication systems.Special purpose computers.Operating systems (Computers).Application software.Information storage and retrieval.Computers and civilization.Computer Communication Networks.Special Purpose and Application-Based Systems.Operating Systems.Information Systems Applications (incl. Internet).Information Storage and Retrieval.Computers and Society.004.16Gellersen Hans Wedthttp://id.loc.gov/vocabulary/relators/edtWant Royedthttp://id.loc.gov/vocabulary/relators/edtSchmidt Albrechtedthttp://id.loc.gov/vocabulary/relators/edtPervasive 2005BOOK996465673303316Pervasive Computing771987UNISA05330nam 22008055 450 99646556280331620200702235228.03-319-66332-110.1007/978-3-319-66332-6(CKB)4100000000881928(DE-He213)978-3-319-66332-6(MiAaPQ)EBC6284019(MiAaPQ)EBC5579000(Au-PeEL)EBL5579000(OCoLC)1007134307(PPN)220121044(EXLCZ)99410000000088192820171012d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierResearch in Attacks, Intrusions, and Defenses[electronic resource] 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings /edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XIII, 496 p. 115 illus.) Security and Cryptology ;104533-319-66331-3 VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of malicious domain registrations in the .eu TLD.This book constitutes the refereed conference proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2017, held in Atlanta, GA, USA, in September 2017. The 21 revised full papers were selected from 105 submissions. They are organized in the following topics: software security, intrusion detection, systems security, android security, cybercrime, cloud security, network security.Security and Cryptology ;10453Computer securityData protectionData encryption (Computer science)Management information systemsComputer scienceComputer communication systemsOperating systems (Computers)Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computer security.Data protection.Data encryption (Computer science).Management information systems.Computer science.Computer communication systems.Operating systems (Computers).Systems and Data Security.Security.Cryptology.Management of Computing and Information Systems.Computer Communication Networks.Operating Systems.004Dacier Marcedthttp://id.loc.gov/vocabulary/relators/edtBailey Michaeledthttp://id.loc.gov/vocabulary/relators/edtPolychronakis Michalisedthttp://id.loc.gov/vocabulary/relators/edtAntonakakis Manosedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465562803316Research in Attacks, Intrusions, and Defenses1912512UNISA