LineKing: Coffee Shop Wait-Time Monitoring Using Smartphones
نویسندگان
چکیده
منابع مشابه
LineKing: Crowdsourced Line Wait-Time Estimation Using Smartphones
This paper describes the design, implementation and deployment of LineKing (LK), a crowdsourced line wait-time monitoring service. LK consists of a smartphone component (that provides automatic, energy-efficient, and accurate wait-time detection), and a cloud backend (that uses the collected data to provide accurate wait-time estimation). LK is used on a daily basis by hundreds of users to moni...
متن کاملPulmonary Monitoring Using Smartphones
Pulmonary assessment is widely employed by medical professionals and has become an important marker of health. It is used for screening, diagnostics, and management of chronic pulmonary diseases like asthma, chronic bronchitis, and chronic obstructive pulmonary disease. However, pulmonary assessment has mostly been restricted to self-report and routine monitoring at a physicians office. Smartph...
متن کاملSolving Re-entrant No-wait Flow Shop Scheduling Problem
In this study, we consider the production environment of no-wait reentrant flow shop with the objective of minimizing makespan of the jobs. In a reentrant flow shop, at least one job should visit at least one of the machines more than once. In a no-wait flowshop scheduling problem, when the process of a specific job begins on the first machine, it should constantly be processed without waiting ...
متن کاملParticipatory Air Pollution Monitoring Using Smartphones
Air quality monitoring is extremely important as air pollution has a direct impact on human health. In this paper we introduce a low-power and low-cost mobile sensing system for participatory air quality monitoring. In contrast to traditional stationary air pollution monitoring stations, we present the design, implementation, and evaluation of GasMobile, a small and portable measurement system ...
متن کاملMonitoring smartphones for anomaly detection
In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system (IDS) on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute rel...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Mobile Computing
سال: 2015
ISSN: 1536-1233
DOI: 10.1109/tmc.2014.2384032