G. Siegemund, V. Turau, and K. Maamra, A self-stabilizing publish/subscribe middleware for wireless sensor networks, 2015 International Conference and Workshops on Networked Systems (NetSys), pp.1-8, 2015.
DOI : 10.1109/NetSys.2015.7089067

S. Murata and C. Goodman, Optimally regulating disturbed metro traffic with passenger inconvenience in mind, International Conference on Developments in Mass Transit Systems, 1998.
DOI : 10.1049/cp:19980102

F. Leurent, On seat congestion, passenger comfort and route choice in urban transit: a network equilibrium assignment model with application to Paris, Proceedings of the 88th Annual Meeting of the TRB CD Rom edition, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00348513

L. Bao and S. S. Intille, Activity recognition from user-annotated acceleration data, " in Pervasive computing, pp.1-17, 2004.

S. Garg, P. Singh, P. Ramanathan, and R. Sen, VividhaVahana: Smartphone Based Vehicle Classi???cation And Its Applications in Developing Regions, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2014.
DOI : 10.4108/icst.mobiquitous.2014.257982

E. Miluzzo, C. T. Cornelius, A. Ramaswamy, T. Choudhury, Z. Liu et al., Darwin phones, Proceedings of the 8th international conference on Mobile systems, applications, and services, MobiSys '10, 2010.
DOI : 10.1145/1814433.1814437

N. Brown and S. Barbara, Center for Spatially Integrated Social Science, Proxemic Theory, 1966.

G. P. Perrucci, F. H. Fitzek, G. Sasso, W. Kellerer, and J. Widmer, On the impact of 2G and 3G network usage for mobile phones' battery life, 2009 European Wireless Conference, pp.255-259, 2009.
DOI : 10.1109/EW.2009.5357972

N. Georgantas, G. Bouloukakis, S. Beauche, and V. Issarny, Serviceoriented Distributed Applications in the Future Internet: The Case for Interaction Paradigm Interoperability, European Conf. on Service- Oriented and Cloud Computing, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00841332

R. Racic, D. Ma, and H. Chen, Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery, 2006 Securecomm and Workshops, pp.1-10, 2006.
DOI : 10.1109/SECCOMW.2006.359550