Author image not provided
 Anthony LaMarca

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article43.24
Citation Count2,508
Publication count58
Publication years1999-2016
Available for download29
Average downloads per article1,275.62
Downloads (cumulative)36,993
Downloads (12 Months)1,562
Downloads (6 Weeks)163
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


58 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 58
Result page: 1 2 3

Sort by:

1 published by ACM
September 2016 UbiComp '16: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9,   Downloads (12 Months): 214,   Downloads (Overall): 380

Full text available: PDFPDF
We describe the design of a hybrid system -- a combination of a Dynamic Graphical Model (DGM) with a Deep Neural Network (DNN) -- to identify activities performed during synthetic biology experiments. The purpose is to provide real-time feedback to experimenters, thus helping to reduce human errors and improve experimental ...
Keywords: synthetic biology, activity recognition, deep learning, dynamic graphical models

2 published by ACM
March 2016 GetMobile: Mobile Computing and Communications: Volume 19 Issue 4, October 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 21,   Downloads (Overall): 62

Full text available: PDFPDF

3 published by ACM
September 2015 UbiComp '15: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 4,   Downloads (12 Months): 66,   Downloads (Overall): 383

Full text available: PDFPDF
Always-on continuous sensing apps drain the battery quickly because they prevent the main processor from sleeping. Instead, sensor hub hardware, available in many smartphones today, can run continuous sensing at lower power while keeping the main processor idle. However, developers have to divide functionality between the main processor and the ...
Keywords: dynamic taint tracking, sensor hub, energy-efficiency, machine learning, mobile sensing

4 published by ACM
September 2014 UbiComp '14: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 2,   Downloads (12 Months): 41,   Downloads (Overall): 945

Full text available: PDFPDF
Indoor object localization can enable many ubicomp applications, such as asset tracking and object-related activity recognition. Most location and tracking systems rely on either battery-powered devices which create cost and maintenance issues or cameras which have accuracy and privacy issues. This paper introduces a system that is able to detect ...
Keywords: RFID, activity recognition, object tracking, localization

5 published by ACM
September 2011 UbiComp '11: Proceedings of the 13th international conference on Ubiquitous computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 31,   Downloads (Overall): 495

Full text available: PDFPDF
Every year, loose objects inside cars during crashes cause hundreds of serious injuries and even deaths. In this paper, we describe findings from a study of 25 cars and drivers, examining the objects present in the car cabin, the reasons for them being there, and driver awareness of the potential ...
Keywords: in-car safety, loose objects, unrestrained cargo, awareness

6
December 2010 IEEE Transactions on Mobile Computing: Volume 9 Issue 12, December 2010
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

The four papers in this special section are extended versions of papers presented at the Seventh Annual International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), held in June 2009 in Krakow, Poland.

7 published by ACM
June 2010 MobiSys '10: Proceedings of the 8th international conference on Mobile systems, applications, and services
Publisher: ACM
Bibliometrics:
Citation Count: 20
Downloads (6 Weeks): 7,   Downloads (12 Months): 47,   Downloads (Overall): 599

Full text available: PDFPDF
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their personal devices with previously unknown devices by simply placing them close to each other (e.g., users can pair their phones by just bringing them ...
Keywords: proximity, authentication, ensemble

8 published by ACM
January 2010 TEI '10: Proceedings of the fourth international conference on Tangible, embedded, and embodied interaction
Publisher: ACM
Bibliometrics:
Citation Count: 37
Downloads (6 Weeks): 3,   Downloads (12 Months): 38,   Downloads (Overall): 740

Full text available: PDFPDF
We introduce Whack Gestures, an inexact and inattentive interaction technique. This approach seeks to provide a simple means to interact with devices with minimal attention from the user -- in particular, without the use of fine motor skills or detailed visual attention (requirements found in nearly all conventional interaction techniques). ...
Keywords: gesture-based interfaces, lightweight interaction, adaptive user interfaces, sensing, physical interaction

9 published by ACM
October 2009 UIST '09: Proceedings of the 22nd annual ACM symposium on User interface software and technology
Publisher: ACM
Bibliometrics:
Citation Count: 57
Downloads (6 Weeks): 25,   Downloads (12 Months): 128,   Downloads (Overall): 1,805

Full text available: PDFPDF
We present Bonfire, a self-contained mobile computing system that uses two laptop-mounted laser micro-projectors to project an interactive display space to either side of a laptop keyboard. Coupled with each micro-projector is a camera to enable hand gesture tracking, object recognition, and information transfer within the projected space. Thus, Bonfire ...
Keywords: computer vision, extended display, gestures, surface, tabletop, tangible bits, micro-projector, ambient interaction, laptop, object recognition, peripheral display

10
February 2009 International Journal of Security and Networks: Volume 4 Issue 1/2, February 2009
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 7

Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices using knowledge of their shared radio environment as proof of physical proximity. We present evaluation results that show that our technique is robust ...
Keywords: passive attacks, active attacks, co-located devices, mobile devices, radio authentication, security, proximity-based authentication, secure pairing

11 published by ACM
September 2008 UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 9,   Downloads (12 Months): 24,   Downloads (Overall): 568

Full text available: PDFPDF
Users' ability to accurately recall frequent, habitual activities is fundamental to a number of disciplines, from health sciences to machine learning. However, few, if any, studies exist that have assessed optimal sampling strategies for in situ self-reports. In addition, few technologies exist that facilitate benchmarking self-report accuracy for routine activities. ...
Keywords: experience sampling method, recall accuracy, user study, empirical evaluation, self-reports, ESM, survey frequency

12

13 published by ACM
April 2008 CHI '08: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 332
Downloads (6 Weeks): 46,   Downloads (12 Months): 443,   Downloads (Overall): 3,632

Full text available: PDFPDF
Recent advances in small inexpensive sensors, low-power processing, and activity modeling have enabled applications that use on-body sensing and machine learning to infer people's activities throughout everyday life. To address the growing rate of sedentary lifestyles, we have developed a system, UbiFit Garden, which uses these technologies and a personal, ...
Keywords: sensing, activity-based applications, ambient display, fitness, mobile phone, persuasive technology, physical activity, activity inference

14
April 2008 IEEE Pervasive Computing: Volume 7 Issue 2, April 2008
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 119

The Mobile Sensing Platform (MSP) is a small-form-factor wearable device designed for embedded activity recognition. The MSP aims broadly to support context-aware ubiquitous computing applications. It incorporates multimodal sensing, data processing and inference, storage, all-day battery life, and wireless connectivity into a single 4 oz (115 g) wearable unit. Several ...
Keywords: activity recognition, activity recognition, embedded systems, machine learning, wearable computers, embedded systems, wearable computers, machine learning

15
December 2007 Pervasive and Mobile Computing: Volume 3 Issue 6, December, 2007
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 49

Accurate indoor localization has long been an objective of the ubiquitous computing research community, and numerous indoor localization solutions based on 802.11, Bluetooth, ultrasound and infrared technologies have been proposed. This paper presents the first accurate GSM indoor localization system that achieves median within floor accuracy of 4 m in ...
Keywords: Location, Fingerprinting, GSM, Localization, Ubicomp

16
September 2007 UbiComp '07: Proceedings of the 9th international conference on Ubiquitous computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 31

Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices using knowledge of their shared radio environment as proof of physical proximity. We present evaluation results that show that our technique is robust ...

17
March 2007 PERCOM '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 17

When a mobile user dials 911, a key to arriving to the emergency scene promptly is knowing the location of the mobile user. This paper presents SkyLoc, a GSM fingerprinting-based localization system that runs on a mobile phone and identifies the current floor of a user in tall multi-floor buildings. ...

18
March 2007 HOTMOBILE '07: Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

With the proliferation of mobile devices, spontaneous interactions between co-located devices that do not know each other a priori will become commonplace. Securing these interactions against eavesdropping and man-in-themiddle attacks is an important and challenging task. In this paper, we postulate that mobile devices that are positioned in close proximity ...

19
September 2006 UbiComp'06: Proceedings of the 8th international conference on Ubiquitous Computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 69

This paper examines the positioning accuracy of a GSM beacon-based location system in a metropolitan environment. We explore five factors effecting positioning accuracy: location algorithm choice, scan set size, simultaneous use of cells from different providers, training and testing on different devices, and calibration data density. We collected a 208-hour, ...

20
September 2006 UbiComp'06: Proceedings of the 8th international conference on Ubiquitous Computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 77

Recognition of everyday physical activities is difficult due to the challenges of building informative, yet unobtrusive sensors. The most widely deployed and used mobile computing device today is the mobile phone, which presents an obvious candidate for recognizing activities. This paper explores how coarse-grained GSM data from mobile phones can ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us