IEEE Pervasive Computing (IEEE PERVAS COMPUT )

Publisher: IEEE Computer Society; IEEE Communications Society, Institute of Electrical and Electronics Engineers

Description

  • Impact factor
    2.06
    Show impact factor history
     
    Impact factor
  • 5-year impact
    2.57
  • Cited half-life
    7.00
  • Immediacy index
    0.19
  • Eigenfactor
    0.00
  • Article influence
    1.11
  • Website
    IEEE Pervasive Computing Magazine website
  • Other titles
    IEEE pervasive computing, Institute of Electrical and Electronics Engineers pervasive computing, Pervasive computing
  • ISSN
    1536-1268
  • OCLC
    47360632
  • Material type
    Periodical, Internet resource
  • Document type
    Journal / Magazine / Newspaper, Internet Resource

Publisher details

Institute of Electrical and Electronics Engineers

  • Pre-print
    • Author can archive a pre-print version
  • Post-print
    • Author can archive a post-print version
  • Conditions
    • Authors own and employers publicly accessible webpages
    • Preprint - Must be removed upon publication of final version and replaced with either full citation to IEEE work with a Digital Object Identifier or link to article abstract in IEEE Xplore or Authors post-print
    • Preprint - Set-phrase must be added once submitted to IEEE for publication ("This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible")
    • Preprint - Set phrase must be added when accepted by IEEE for publication ("(c) 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.")
    • Preprint - IEEE must be informed as to the electronic address of the pre-print
    • Postprint - Publisher copyright and source must be acknowledged (see above set statement)
    • Publisher's version/PDF cannot be used
    • Publisher copyright and source must be acknowledged
  • Classification
    ​ green

Publications in this journal

  • [Show abstract] [Hide abstract]
    ABSTRACT: Transantiago, the smartcard-based public transportation system in Santiago, Chile, includes both a subway system and buses. An online information system lets card holders find detailed trip information, including start time and location, as well as frequency and type of transportation used, by simply providing its card ID. This article studies the privacy implications of the availability of the Transantiago online information system. The authors explore how much of a card holder's information and behavior could be extracted from something as simple as their card ID. They concluded that, given that the corresponding card IDs are known, they can use simple statistical techniques to correctly predict the nearest public transport station to the homes of more than half of the users. This article is part of a special issue on pervasive analytics and citizen science.
    IEEE Pervasive Computing 05/2014; 13(2):37--43.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In this letter to the editor, Sundaresan Jayaraman discusses the July--September 2013 Wearable Computing department on smart textiles, and Jingyuan Cheng, Paul Lukowicz, and Albrecht Schmidt respond.
    IEEE Pervasive Computing 01/2014; 13(2):5-6.
  • [Show abstract] [Hide abstract]
    ABSTRACT: This article discusses how digital fabrication affects the production of electronic devices, drawing on the author's experience making radios, speakers, mice, and cellphones. Several case studies demonstrate the differences between digital fabrication and traditional mass-production or do-it-yourself (DIY) practices. The author analyzes how the digital nature of design files and the flexibility of fabricating them into physical objects transform the design and production of enclosures and circuit boards, but has less effect on component sourcing, circuit assembly, and programming. The author also explores how different people can get involved in the process of fabricating devices, the skills required, and relevant motivations. This article is part of a special issue on printing and fabrication.
    IEEE Pervasive Computing 01/2014; 13(3):22-29.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Supply-chain RFID systems introduce significant privacy issues to consumers, making it necessary to encrypt communications. Because the resources available on tags are very small, it is generally assumed that only symmetric-key cryptography can be used in such systems. Unfortunately, symmetric-key cryptography imposes negative trust issues between the various stake-holders, and risks compromising the security of the whole system if even a single tag is reverse engineered. This work presents a working prototype implementation of a secure RFID system which uses public-key cryptography to simplify deployment, reduce trust issues between the supply-chain owner and tag manufacturer, and protect user privacy. The authors' prototype system consists of a UHF tag running custom firmware, a standard off-the-shelf reader and custom point-of-sale terminal software. No modifications were made to the reader or the air interface, proving that high-security EPC tags and standard EPC tags can coexist and share the same infrastructure.
    IEEE Pervasive Computing 01/2014; 13(2):52-60.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The 15th Workshop on Mobile Computing Systems and Applications (HotMobile 2014) was had over 90 attendees participating in two days of presentations and lively discussion. Learn about each of the sessions and prevalent themes throughout.
    IEEE Pervasive Computing 01/2014; 13(3):84-87.
  • [Show abstract] [Hide abstract]
    ABSTRACT: This article compares two rate-control approaches that a cloud messaging service can use to deliver notifications for a variety of applications. The author reviews the pros and cons of the two approaches in terms of metrics such as latency, fairness, and overhead related to carrier network signaling and battery life of the user device.
    IEEE Pervasive Computing 01/2014; 13(1):84-88.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The Facilitating Interactions for Dogs with Occupations (FIDO) project in the Animal Interaction Lab at Georgia Tech aims to facilitate communication between working dogs and their handlers. Here, the authors discuss their research on testing a working dog's ability to perform distinct tasks in response to vibrations at different points on their body.
    IEEE Pervasive Computing 01/2014; 13(2):80-83.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Classic research on human factors has found that automation never fully eliminates the human operator from the loop. Instead, it shifts the operator's responsibilities to the machine and changes the operator's control demands, sometimes with adverse consequences, called the "ironies of automation." In this article, the authors revisit the problem of automation in the era of social media, focusing on privacy concerns. Present-day social media automatically discloses information, such as users' whereabouts, likings, and undertakings. This review of empirical studies exposes three recurring privacy-related issues in automated disclosure: insensitivity to situational demands, inadequate control of nuance and veracity, and inability to control disclosure with service providers and third parties. The authors claim that "all-or-nothing" automation has proven problematic and that social network services should design their user controls with all stages of the disclosure process in mind.
    IEEE Pervasive Computing 01/2014; 13(1):56-63.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: A revolution is occurring in terms of how pervasive computing hardware is designed, prototyped, and manufactured. A broad set of researchers and users now have access to a host of digital fabrication tools and techniques that empower them to create new devices and realize new concepts more quickly, cheaply, and easily. This special issue brings together four articles that describe recent research in this space of printing and fabrication for pervasive computing.
    IEEE Pervasive Computing 01/2014; 13(3):18-21.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Pervasive computing technology enables social mapping and sharing of local knowledge to create relationships beyond established social and cultural boundaries; it also enables the development of new practices around place, identity, and community. For more than a decade, the authors have explored the potential costs and benefits of using pervasive computing to facilitate codiscovery with communities across London, with the aim of supporting grassroots activities that help urban communities take action toward environmental sustainability. A core ingredient of these explorations is the making of artifacts to provide both the focus for communal experiences and a way to create public goods--that is, tangible representations of the intangible things we value most about our communities. Specific projects explore alternative material representations of stories, skills, games, songs, techniques, memories, hyper-local lore, and experiential knowledge of the environment. In this article, the authors present work that investigates how public goods can provide the focus for the development of grassroots community groups focused on hyper-local concerns. They also show how creating objects constructed to communicate the activist message of these communities in a tangible manner provides more affective and illustrative ways to facilitate the codiscovery of uncommon insights. This article is part of a special issue on pervasive analytics and citizen science.
    IEEE Pervasive Computing 01/2014; 13(2):44-51.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Is pervasive computing fundamentally incompatible with aging? Our industry designs devices to last for only a couple of years, yet those who struggle with short-term-memory loss find it difficult to adapt to constant changes. At some point, our industry must recognize this specialized need and create a platform with some amount of constancy that can be upgraded to new hardware as necessary. The Web extra offers a list of the reviewers who made IEEE Pervasive Computing's volume 12 possible.
    IEEE Pervasive Computing 01/2014; 13(2):2-4.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Infotainment applications can provide new business opportunities when they're used in vehicular networks. However, these applications are challenging by nature, and a testing platform is required to validate that they work properly. Existing simulation platforms focus mainly on providing a testing framework for safety applications that don't require infrastructure. To address this, the Vehicular Emulations Platform for Real Applications (Vespa) was developed to allow for experiments with many vehicles running real-world applications with real-time requirements in complex network scenarios. To demonstrate Vespa's usefulness, a use case on the performance of video-streaming applications is offered. In this use case, the applications are tested in highway conditions in which packet losses occur due to network layer handoffs.
    IEEE Pervasive Computing 01/2014; 13(3):58-66.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Systematically and quantitatively determining patterns in consumer flow is an important problem in marketing research. Identifying these patterns can facilitate an understanding of where and when consumers purchase products and services at physical retail shops. Collecting data on real consumers who shop at retail stores is one of the most challenging and expensive aspects of these studies. This article introduces ConvenienceProbe, a phone-based data collection system for retail trade-area analysis. The proposed method targets local residents shopping at neighborhood convenience stores. This study deploys and tests the system by collecting real customer flow data in neighborhood convenience stores. Results show that the consumer flow data collected from the ConvenienceProbe system is comparable to that from a traditional face-to-face interview method.
    IEEE Pervasive Computing 01/2014; 13(1):64-71.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Smartphones have emerged as ubiquitous devices that are being used to host a rich array of pervasive apps in diverse areas, including healthcare, gaming, and social networking. A key requirement of many of these apps is that they keep their mobile users up-to-date as changes occur in some subject of interest. One way of providing timely updates to smartphone apps is to use push notification technology. In this article, the authors identify design issues for push notification systems and reveal underlying concepts for the notification channels that bind mobile devices to push services. They describe five service offerings and report on the performance of their channels based on an empirical study.
    IEEE Pervasive Computing 01/2014; 13(2):61-71.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The recently developed conductive inkjet printing process enables conductive circuits to be created quickly, cheaply, and easily using a consumer-grade inkjet printer. In its basic form, the technique supports a single layer of wiring on a flexible substrate. This can be a valuable tool for pervasive computing research because it allows simple electronic circuits and devices to be built and iterated quickly, in an analogous manner to the use of 3D printers for prototyping mechanical structures. It is possible to rapidly create touch- and proximity-sensitive surfaces, to cut and fold the printed conductive patterns, and to augment them with off-the-shelf electronic components and custom-made subcircuits. The authors present the possibilities enabled by conductive inkjet printing, bringing together their previously published results and presenting their latest insights and findings. They consider these printing and fabrication techniques as a suite of tools for researchers and practitioners who wish to fabricate a variety of functional device prototypes. They aim to enable others to understand the strengths, weaknesses, and applicability of conductive inkjet printing across a range of pervasive computing applications. This article is part of a special issue on printing and fabrication.
    IEEE Pervasive Computing 01/2014; 13(3):30-38.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Improvements in health behavior theory will be central to creating successful interventions that encourage and support behavior change and maintenance. The authors discuss dynamic, multimethod, conceptually driven, and data-rich approaches for the development of testable computational models of health-related behaviors in real time.
    IEEE Pervasive Computing 01/2014; 13(3):13-17.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Smart health devices monitor certain health parameters, are connected to an Internet service, and target primarily a lay consumer seeking a healthy lifestyle rather than the medical expert or the chronically ill person. These devices offer tremendous opportunities for wellbeing and self-management of health. This department reviews smart health devices from a pervasive computing perspective, discussing various devices and their functionality, limitations, and potential.
    IEEE Pervasive Computing 01/2014; 13(2):10-13.