|
ROLE
BOOKMARK & SHARE
|
|
Result page:
1
2
3
4
5
6
7
8
9
10
>>
1
April 2016
IEEE/ACM Transactions on Networking (TON): Volume 24 Issue 2, April 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5, Downloads (12 Months): 39, Downloads (Overall): 39
Full text available:
PDF
Mobile crowd sensing (MCS) is a new paradigm that takes advantage of pervasive mobile devices to efficiently collect data, enabling numerous novel applications. To achieve good service quality for an MCS application, incentive mechanisms are necessary to attract more user participation. Most existing mechanisms apply only for the offline scenario ...
Keywords:
crowdsourcing, incentive mechanism design, online auction, mobile crowd sensing
2
April 2016
Pervasive and Mobile Computing: Volume 27 Issue C, April 2016
Publisher: Elsevier Science Publishers B. V.
Mobile Cloud Computing (MCC) enables mobile devices to use resource providers other than mobile devices themselves to host the execution of mobile applications. Various mobile cloud architectures and scheduling algorithms have been studied recently. However, how to utilize MCC to enable mobile devices to run complex real-time applications while keeping ...
Keywords:
Ad-hoc network, Offloading, Task scheduling, Mobile cloud computing
3
March 2016
NSDI'16: Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation
Publisher: USENIX Association
The introduction of wireless transmissions into the data center has been shown to be promising in improving the performance of data center networks (DCN) cost effectively. For high transmission flexibility and performance, a fundamental challenge is to increase the wireless availability and enable fully hybrid and seamless transmissions over both ...
4
September 2015
MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 17, Downloads (12 Months): 119, Downloads (Overall): 341
Recently a number of systems have been developed to implement and improve the visual communication over screen-camera links. In this paper we study an opposite problem: how to prevent unauthorized users from videotaping a video played on a screen, such as in a theater, while do not affect the viewing ...
Keywords:
image privacy, image copyright protection, screen-camera communication
5
September 2015
MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 11, Downloads (12 Months): 134, Downloads (Overall): 323
Through-wall tracking has gained a lot of attentions in civilian applications recently. Many applications would benefit from such device-free tracking, e.g. elderly people surveillance, intruder detection, gaming, etc. In this work, we present a system, named Tadar, for tracking moving objects without instrumenting them us- ing COTS RFID readers and ...
Keywords:
see-through walls, tadar, RFID, tracking
6
April 2015
Computer Communications: Volume 60 Issue C, April 2015
Publisher: Elsevier Science Publishers B. V.
Opportunistic vehicular sensing is a new paradigm which exploits variety of sensors embedded in vehicles or smartphones to collect data ubiquitously for large-scale urban sensing. Existing work lacks in-depth investigations on the coverage problem in such sensing systems: (1) how to define and measure the coverage? (2) what is the ...
Keywords:
Coverage, Urban sensing, Vehicular sensor networks, Opportunistic sensing
7
November 2014
SenSys '14: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 9, Downloads (12 Months): 69, Downloads (Overall): 292
Full text available:
PDF
The ever increasing popularity of social networks and the ever easier photo taking and sharing experience have led to unprecedented concerns on privacy infringement. Inspired by the fact that the Robot Exclusion Protocol, which regulates web crawlers' behavior according a per-site deployed robots.txt, and cooperative practices of major search service ...
Keywords:
QR-code, photo sharing, privacy protection
8
September 2014
MobiCom '14: Proceedings of the 20th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 37, Downloads (Overall): 238
Full text available:
PDF
Locating objects labeled with RFID tags is an important issue which should be addressed in many applications, such as warehouse management, goods management in supermarket and finding of lost objects. Some existing works use large numbers of reference tags which involve lots of manpower to deploy them. Others achieve high ...
Keywords:
antenna, tag, radiation pattern, rfid, localization
9
September 2014
MobiCom '14: Proceedings of the 20th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 52
Downloads (6 Weeks): 37, Downloads (12 Months): 308, Downloads (Overall): 2,298
In many applications, we have to identify an object and then locate the object to within high precision (centimeter- or millimeter-level). Legacy systems that can provide such accuracy are either expensive or suffering from performance degradation resulting from various impacts, e.g. , occlusion for computer vision based approaches. In this ...
Keywords:
dah, rfid, tagoram, tracking, localization
10
September 2014
MobiCom '14: Proceedings of the 20th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 11, Downloads (12 Months): 101, Downloads (Overall): 1,155
In this work, we explore a new networking mechanism with smart glasses, through which users can express their interest and connect to a target simply by a gaze. Doing this, we attempt to let wearable devices understand human attention and intention, and pair devices carried by users according to such ...
Keywords:
attention driven networking, smart glasses, gaze tracking, device paring
11
September 2014
MobiCom '14: Proceedings of the 20th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 20, Downloads (Overall): 251
Full text available:
PDF
In this demo, we propose a proof-of-concept networking system for smart glasses, through which users can express their interest and connect to a target simply by a gaze. Our system iGaze is a visual attention driven networking suite: an iGaze glass (hardware) and a networking protocol VAN (software). Our glass ...
Keywords:
device paring, attention driven networking, smart glasses, gaze tracking
12
September 2014
MobiCom '14: Proceedings of the 20th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5, Downloads (12 Months): 48, Downloads (Overall): 354
Full text available:
PDF
In many applications, we have to identify an object and then locate the object to within high precision (centimeter- or millimeter-level). Tracking mobile RFID tags in real time has been a daunting task, especially challenging for achieving high precision. We achieve these three goals by leveraging the phase value of ...
Keywords:
rfid, tracking, localization
13
July 2014
IEEE Transactions on Parallel and Distributed Systems: Volume 25 Issue 7, July 2014
Publisher: IEEE Press
Wireless sensor networks (WSNs) consist of a large number of battery-powered wireless sensor nodes, and one key issue in WSNs is to reduce the energy consumption while maintaining the normal functions of WSNs. Data aggregation, as a typical operation in data gathering applications, can cause a lot of energy wastage ...
14
June 2014
IEEE Transactions on Computers: Volume 63 Issue 6, June 2014
Publisher: IEEE Computer Society
A critical function of wireless sensor networks (WSNs) is data gathering. One is often only interested in collecting a specific function of the sensor measurements at a sink node, rather than downloading all the raw data from all the sensors. In this paper, we study the capacity of computing and ...
15
December 2013
IEEE/ACM Transactions on Networking (TON): Volume 21 Issue 6, December 2013
Publisher: IEEE Press
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 1, Downloads (12 Months): 4, Downloads (Overall): 147
Full text available:
PDF
Constructive interference-based flooding (CIBF) is a latency-optimal flooding protocol, which can realize millisecond network flooding latency and submicrosecond time synchronization accuracy, require no network state information, and be adapted to topology changes. However, constructive interference (CI) has a precondition to function, i.e., the maximum temporal displacement Δ of concurrent packet ...
Keywords:
network flooding, concurrent transmissions, constructive interference (CI), topology control, wireless networks
16
October 2013
CRAB '13: Proceedings of the 1st ACM workshop on Cognitive radio architectures for broadband
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6, Downloads (12 Months): 17, Downloads (Overall): 128
Full text available:
PDF
Understanding the asymptotic network capacity has been one of the heavily investigated research problems that are instrumental to network design and planning. The majority of the past efforts has been focusing on a single technology network without dynamic channel states and dynamic channel access. In this talk, we will discuss ...
Keywords:
MIMO, capacity, coexistence, cognitive, wireless, physical layer, sensor networks
17
September 2013
MobiCom '13: Proceedings of the 19th annual international conference on Mobile computing & networking
Publisher: ACM
Bibliometrics:
Citation Count: 20
Downloads (6 Weeks): 9, Downloads (12 Months): 173, Downloads (Overall): 829
Full text available:
PDF
In this work, we present SilentSense, a framework to authenticate users silently and transparently by exploiting the user touch behavior biometrics and leveraging the integrated sensors to capture the micro-movement of the device caused by user's screen-touch actions. By tracking the fine-detailed touch actions of the user, we build a ...
Keywords:
identification, mobile device, SilentSense
18
September 2013
MobiCom '13: Proceedings of the 19th annual international conference on Mobile computing & networking
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 4, Downloads (12 Months): 78, Downloads (Overall): 566
Full text available:
PDF
In this work, we address a critical task of detecting the user behavior of driving and texting simultaneously using smartphones. We propose, design, and implement TEXIVE which achieves the goal of distinguishing drivers and passengers, and detecting texting operations during driving utilizing irregularities and rich micro-movements of users. Without relying ...
Keywords:
classification, smartphone, texive
19
September 2013
MobiCom '13: Proceedings of the 19th annual international conference on Mobile computing & networking
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 4, Downloads (12 Months): 47, Downloads (Overall): 537
Full text available:
PDF
We present SmartLoc , a localization system to estimate the location and the traveling distance by leveraging the lower-power inertial sensors embedded in smartphones as a supplementary to GPS. To minimize the negative impact of sensor noises, SmartLoc exploits the intermittent strong GPS signals and uses the linear regression to ...
Keywords:
smartloc, localization, inertial sensor
20
July 2013
MobiHoc '13: Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 15, Downloads (Overall): 242
Full text available:
PDF
Information propagation in delay tolerant networks (DTN) is difficult due to the lack of continues connectivity. Most of previous work put their focus on the information propagation in static network. In this work, we examine two closely related problems on information propagation in predicable DTN. In particular, we assume that ...
Keywords:
temporal, DTN, propagation, submodular
|
|