Learn More
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without(More)
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw RFID data. Cascadia provides three important services. First, it allows application developers and even users to specify events using either a declarative query language or an(More)
In this paper, we introduce a compact system for fusing location data with data from simple, low-cost, non-location sensors to infer a user's place and situational context. Specifically, the system senses location with a GSM cell phone and a WiFi-enabled mobile device (each running Place Lab), and collects additional sensor data using a 2 " x 1 " sensor(More)
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deployments that involve humans raise new and critical problems related to privacy, security, uncertainty, and a more diverse and evolving set of applications. At the University of(More)
We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce or eliminate critical barriers to deployment of emerging location-aware business activity monitoring applications in domains like hospitals and office buildings. Panoramic does not(More)
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such deployments, important challenges must be addressed, from managing RFID data streams to handling limitations in reader accuracy and coverage. Furthermore, deployments that support(More)
E d it o r s : Fr é d é r ic Th ie s s e • fr e der i c .t hie s se @uni sg.c h Fl o r i a n M ic h a h e ll e s • fmi c ha he l le s@et hz .c h T he rapid proliferation of passive RFID tags in the past decade has given rise to various concepts that integrate the physical world with the virtual one. One of the most popular is the Internet of Things (IoT), a(More)
In this paper, we design a rule-based privacy policy for the RFID Ecosystem, an RFID-based ubiquitous computing system. We start from the physical access control (PAC) rule (Kriplean et al., IEEE Pervasive Computing 2007) that provides a default level of privacy but constrains the possible set of applications. We extend it by using principled ways of(More)