scispace - formally typeset
J

John Krumm

Researcher at Microsoft

Publications -  220
Citations -  18840

John Krumm is an academic researcher from Microsoft. The author has contributed to research in topics: Signal & Ubiquitous computing. The author has an hindex of 63, co-authored 216 publications receiving 18162 citations. Previous affiliations of John Krumm include University of Rochester & Sandia National Laboratories.

Papers
More filters
Proceedings ArticleDOI

Wallflower: principles and practice of background maintenance

TL;DR: This work develops Wallflower, a three-component system for background maintenance that is shown to outperform previous algorithms by handling a greater set of the difficult situations that can occur.
Proceedings ArticleDOI

EasyLiving: Technologies for Intelligent Environments

TL;DR: The current research in each of these areas of middleware, world modelling, perception, and service description is described, highlighting some common requirements for any intelligent environment.
Proceedings ArticleDOI

Hidden Markov map matching through noise and sparseness

TL;DR: A novel, principled map matching algorithm that uses a Hidden Markov Model (HMM) to find the most likely road route represented by a time-stamped sequence of latitude/longitude pairs, which elegantly accounts for measurement noise and the layout of the road network.
Proceedings ArticleDOI

Multi-camera multi-person tracking for EasyLiving

TL;DR: In this article, the authors used two sets of color stereo cameras for tracking multiple people during live demonstrations in a living room, and the stereo images were used for locating people and the color images are used for maintaining their identities.
Journal ArticleDOI

A survey of computational location privacy

TL;DR: This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information, which includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data.