{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:06:17Z","timestamp":1730315177834,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,20]]},"DOI":"10.1145\/1860093.1860104","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T08:04:33Z","timestamp":1285142673000},"page":"71-80","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Detecting intra-room mobility with signal strength descriptors"],"prefix":"10.1145","author":[{"given":"Konstantinos","family":"Kleisouris","sequence":"first","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Bernhard","family":"Firner","sequence":"additional","affiliation":[{"name":"Rutgers University, North Brunswick, NJ, USA"}]},{"given":"Richard","family":"Howard","sequence":"additional","affiliation":[{"name":"Rutgers University, North Brunswick, NJ, USA"}]},{"given":"Yanyong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Rutgers University, North Brunswick, NJ, USA"}]},{"given":"Richard P.","family":"Martin","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,9,20]]},"reference":[{"volume-title":"http:\/\/grail.rutgers.edu\/mobilitytraces\/","year":"2009","key":"e_1_3_2_1_1_1","unstructured":"}}Mobility Traces. http:\/\/grail.rutgers.edu\/mobilitytraces\/ , 2009 . }}Mobility Traces. http:\/\/grail.rutgers.edu\/mobilitytraces\/, 2009."},{"key":"e_1_3_2_1_2_1","first-page":"27","volume-title":"Context Awareness via GSM Signal Strength Fluctuation","author":"Anderson I.","year":"2006","unstructured":"}} I. Anderson and H. Muller . Context Awareness via GSM Signal Strength Fluctuation . In The IEEE Pervasive Computing, Late Breaking Results , pages 27 -- 31 , 2006 . }}I. Anderson and H. Muller. Context Awareness via GSM Signal Strength Fluctuation. In The IEEE Pervasive Computing, Late Breaking Results, pages 27--31, 2006."},{"key":"e_1_3_2_1_3_1","first-page":"1","volume":"3001","author":"Bao L.","year":"2004","unstructured":"}} L. Bao and S. S. Intille . Activity Recognition from User-Annotated Acceleration Data. In Pervasive Computing (LNCS) , volume 3001 , pages 1 -- 17 , 2004 . }}L. Bao and S. S. Intille. Activity Recognition from User-Annotated Acceleration Data. In Pervasive Computing (LNCS), volume 3001, pages 1--17, 2004.","journal-title":"Activity Recognition from User-Annotated Acceleration Data. In Pervasive Computing (LNCS)"},{"key":"e_1_3_2_1_4_1","first-page":"1964","volume-title":"Attack Detection in Wireless Localization. In The 26th IEEE International Conference on Computer Communications","author":"Chen Y.","year":"2007","unstructured":"}} Y. Chen , W. Trappe , and R. P. Martin . Attack Detection in Wireless Localization. In The 26th IEEE International Conference on Computer Communications , pages 1964 -- 1972 , 2007 . }}Y. Chen, W. Trappe, and R. P. Martin. Attack Detection in Wireless Localization. In The 26th IEEE International Conference on Computer Communications, pages 1964--1972, 2007."},{"key":"e_1_3_2_1_5_1","first-page":"115","volume-title":"Cohen. Fast Effective Rule Induction. In The 12th International Conference on Machine Learning","author":"W.","year":"1995","unstructured":"}} W. W. Cohen. Fast Effective Rule Induction. In The 12th International Conference on Machine Learning , pages 115 -- 123 , 1995 . }}W. W. Cohen. Fast Effective Rule Induction. In The 12th International Conference on Machine Learning, pages 115--123, 1995."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_3_2_1_7_1","volume-title":"PIP Tags: Hardware Design and Power Optimization. In The 5th Workshop on Embedded Networked Sensors","author":"Firner B.","year":"2008","unstructured":"}} B. Firner , S. Medhekar , Y. Zhang , R. Howard , W. Trappe , P. Wolniansky , and E. Fenson . PIP Tags: Hardware Design and Power Optimization. In The 5th Workshop on Embedded Networked Sensors , 2008 . }}B. Firner, S. Medhekar, Y. Zhang, R. Howard, W. Trappe, P. Wolniansky, and E. Fenson. PIP Tags: Hardware Design and Power Optimization. In The 5th Workshop on Embedded Networked Sensors, 2008."},{"key":"e_1_3_2_1_8_1","first-page":"27","volume":"21","author":"M.","year":"1972","unstructured":"}} M. J. Gans. A Power-Spectral Theory of Propagation in the Mobile-Radio Environment. J. Vehicular Technology , 21 : 27 -- 38 , 1972 . }}M. J. Gans. A Power-Spectral Theory of Propagation in the Mobile-Radio Environment. J. Vehicular Technology, 21:27--38, 1972.","journal-title":"J. Gans. A Power-Spectral Theory of Propagation in the Mobile-Radio Environment. J. Vehicular Technology"},{"key":"e_1_3_2_1_9_1","first-page":"332","volume":"26","author":"F.","year":"1977","unstructured":"}} F. Hansen and F. I. Meno. Mobile Fading-Rayleigh and Lognormal Superimposed. J. Vehicular Technology , 26 : 332 -- 335 , 1977 . }}F. Hansen and F. I. Meno. Mobile Fading-Rayleigh and Lognormal Superimposed. J. Vehicular Technology, 26:332--335, 1977.","journal-title":"Hansen and F. I. Meno. Mobile Fading-Rayleigh and Lognormal Superimposed. J. Vehicular Technology"},{"key":"e_1_3_2_1_10_1","first-page":"90","volume":"2864","author":"Koile K.","year":"2003","unstructured":"}} K. Koile , K. Tollmar , D. Demirdjian , H. Shrobe , and T. Darrell . Activity Zones for Context-Aware Computing. In UbiComp (LNCS) , volume 2864 , pages 90 -- 106 , 2003 . }}K. Koile, K. Tollmar, D. Demirdjian, H. Shrobe, and T. Darrell. Activity Zones for Context-Aware Computing. In UbiComp (LNCS), volume 2864, pages 90--106, 2003.","journal-title":"Activity Zones for Context-Aware Computing. In UbiComp (LNCS)"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2004.1331705"},{"key":"e_1_3_2_1_12_1","first-page":"299","volume":"2498","author":"Krumm J.","year":"2002","unstructured":"}} J. Krumm , L. Williams , and G. Smith . SmartMoveX on a Graph - An Inexpensive Active Badge Tracker. In UbiComp (LNCS) , volume 2498 , pages 299 -- 307 , 2002 . }}J. Krumm, L. Williams, and G. Smith. SmartMoveX on a Graph - An Inexpensive Active Badge Tracker. In UbiComp (LNCS), volume 2498, pages 299--307, 2002.","journal-title":"In UbiComp (LNCS)"},{"key":"e_1_3_2_1_13_1","first-page":"766","volume-title":"The International Joint Conference on Artificial Intelligence","author":"Lester J.","year":"2005","unstructured":"}} J. Lester , T. Choudhury , N. Kern , G. Borriello , and B. Hannaford . A Hybrid Discriminative\/Generative Approach for Modeling Human Activities . In The International Joint Conference on Artificial Intelligence , pages 766 -- 772 , 2005 . }}J. Lester, T. Choudhury, N. Kern, G. Borriello, and B. Hannaford. A Hybrid Discriminative\/Generative Approach for Modeling Human Activities. In The International Joint Conference on Artificial Intelligence, pages 766--772, 2005."},{"key":"e_1_3_2_1_14_1","first-page":"773","volume-title":"The International Joint Conference on Artificial Intelligence","author":"Liao L.","year":"2005","unstructured":"}} L. Liao , D. Fox , and H. Kautz . Location-Based Activity Recognition using Relational Markov Networks . In The International Joint Conference on Artificial Intelligence , pages 773 -- 778 , 2005 . }}L. Liao, D. Fox, and H. Kautz. Location-Based Activity Recognition using Relational Markov Networks. In The International Joint Conference on Artificial Intelligence, pages 773--778, 2005."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.84"},{"key":"e_1_3_2_1_16_1","first-page":"62","volume-title":"Sensing Motion Using Spectral and Spatial Analysis of WLAN RSSI. In The 2nd European Conference on Smart Sensing and Context","author":"Muthukrishnan K.","year":"2007","unstructured":"}} K. Muthukrishnan , M. Lijding , N. Meratnia , and P. Havinga . Sensing Motion Using Spectral and Spatial Analysis of WLAN RSSI. In The 2nd European Conference on Smart Sensing and Context , pages 62 -- 76 , 2007 . }}K. Muthukrishnan, M. Lijding, N. Meratnia, and P. Havinga. Sensing Motion Using Spectral and Spatial Analysis of WLAN RSSI. In The 2nd European Conference on Smart Sensing and Context, pages 62--76, 2007."},{"key":"e_1_3_2_1_17_1","first-page":"73","volume":"2864","author":"Patterson D. J.","year":"2003","unstructured":"}} D. J. Patterson , L. Liao , D. Fox , and H. A. Kautz . Inferring High-Level Behavior from Low-Level Sensors. In UbiComp (LNCS) , volume 2864 , pages 73 -- 89 , 2003 . }}D. J. Patterson, L. Liao, D. Fox, and H. A. Kautz. Inferring High-Level Behavior from Low-Level Sensors. In UbiComp (LNCS), volume 2864, pages 73--89, 2003.","journal-title":"Inferring High-Level Behavior from Low-Level Sensors. In UbiComp (LNCS)"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287867"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/851037.856514"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026543900054"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_13"},{"key":"e_1_3_2_1_23_1","volume-title":"Introduction to Data Mining","author":"Tan P.","year":"2006","unstructured":"}} P. Tan , M. Steinback , and V. Kumar . Introduction to Data Mining . Addison Wesley , 2006 . }}P. Tan, M. Steinback, and V. Kumar. Introduction to Data Mining. Addison Wesley, 2006."},{"key":"e_1_3_2_1_24_1","volume-title":"The 3rd International Conference on Mobile Computing and Ubiquitous Networking","author":"Wallbaum M.","year":"2006","unstructured":"}} M. Wallbaum and S. Diepolder . A Motion Detection Scheme For Wireless LAN Stations . In The 3rd International Conference on Mobile Computing and Ubiquitous Networking , 2006 . }}M. Wallbaum and S. Diepolder. A Motion Detection Scheme For Wireless LAN Stations. In The 3rd International Conference on Mobile Computing and Ubiquitous Networking, 2006."},{"key":"e_1_3_2_1_25_1","volume-title":"Morgan Kaufmann","author":"Witten I. H.","year":"2005","unstructured":"}} I. H. Witten and E. Frank . Data Mining: Practical Machine Learning Tools and Techniques . Morgan Kaufmann , San Francisco , 2005 . }}I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, San Francisco, 2005."},{"key":"e_1_3_2_1_26_1","first-page":"4646","volume-title":"Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. In The IEEE International Conference on Communications","author":"Xiao L.","year":"2007","unstructured":"}} L. Xiao , J. L. Greenstein , N. B. Mandayam , and W. Trappe . Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. In The IEEE International Conference on Communications , pages 4646 -- 4651 , 2007 . }}L. Xiao, J. L. Greenstein, N. B. Mandayam, and W. Trappe. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. In The IEEE International Conference on Communications, pages 4646--4651, 2007."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.81"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287880"}],"event":{"name":"MobiCom\/MobiHoc '10: The 16th Annual International Conference on Mobile Computing and Networking and The 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Chicago Illinois USA","acronym":"MobiCom\/MobiHoc '10"},"container-title":["Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1860093.1860104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T03:33:17Z","timestamp":1673062397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1860093.1860104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,20]]},"references-count":28,"alternative-id":["10.1145\/1860093.1860104","10.1145\/1860093"],"URL":"https:\/\/doi.org\/10.1145\/1860093.1860104","relation":{},"subject":[],"published":{"date-parts":[[2010,9,20]]},"assertion":[{"value":"2010-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}