The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Visible Light Communication (VLC) can dual purpose energy efficient LED-based lighting infrastructure for both illumination and data communication. Unfortunately, this dual-purposing is only inherent in the downlink direction, from infrastructure illumination sources to mobile devices. In this paper, we design, analyze, and implement LiRa, a Light-Radio WLAN that fuses light and radio capabilities...
Sensor networks and the Internet of Things motivate novel classes of job scheduling problems where each "job" corresponds to downloading some data object from the sensor network, i.e., querying the network for some portion of its current state. The purpose of scheduling a set of jobs may be to support decision tasks, where the user will make a choice, prior to a deadline, informed by all...
In state-of-the-art Delay Tolerant Network (DTN) routing algorithms, two encountering nodes rely on routing utilities (e.g., probabilities of meeting other nodes) to decide the better carrier (defined forwarder) for their packets. As the utilities and forwarder information reflect user privacy, nodes may be reluctant to disclose such information, which however is indispensable in routing. To handle...
In this paper, we investigate the problem of pilot optimization, resource allocation, and user association in a massive MIMO heterogeneous network (HetNet) with wireless backhaul (WB) and linear processing. The objective is to maximize the sum downlink rate of all users, subject to constraints on data rate of WB and fairness-aware constraints. Such a problem is formulated as an integer programming...
Because of the powerful mobile technology, many crowdsourcing applications emerge to implement location-dependent tasks. One common powerful function of crowdsourcing is to decompose huge or complex tasks into small sub-ones, which require users with different skills to implement. These tasks are composite and implemented completely only after all of their sub-tasks are finished. Meanwhile, users...
Radio Frequency Identification (RFID) technology brings a revolutionary change in warehouse management by automatically monitoring and tracking products. The grouping problem is to efficiently inform all tags which groups they belong to, such that tags in the same group have the same group ID. With this information, the reader can transmit data through efficient multicast rather than tedious unicast...
Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings.
Upload and download traffic often coexist in mobile networks. However, TCP download throughput could be substantially degraded by upload traffic even if the downlink is not the bottleneck. Previous works such as RSFC and TCP-RRE can substantially improve TCP download throughput in the presence of concurrent TCP upload flows, albeit at the expense of significantly degraded upload throughput performance...
We propose a new sensor MAC protocol, called Bird- MAC, which is highly energy efficient in the applications where sensors periodically report monitoring status with a very low rate, as in structural health monitoring and static environmental monitoring. Two key design ideas of Bird-MAC are: (a) no need of early-wake-up of transmitters and (b) taking the right balance between synchronization and coordination...
Jamming is one of the most famous and powerful attacks in wireless networks, and is advancing to be more stealthy and long-lasting with limited energy. Stealthy attackers transmit short jamming signals to become less detectable with less energy, and yet powerful enough to ruin the entire packet transmission procedures. For this study, we deal with three types of stealthy attacks: 'reactive jamming',...
With the explosive growth of users in mobile carrier, telecommunication fraud causes a serious loss to both of the users and carriers. The academia has an increasing interest in the issue of detecting and recognizing fraudster, and varies strategies have been proposed to prevent the attack and fraudulent activity. However, fraudsters are always inclined to hide their identity and perform the fraudulent...
As mobile computing platforms, head-mounted displays (HMDs) for augmented reality (AR) applications, similar to other mobile computing platforms, face challenges in minimizing their energy usage. While not yet as pervasive as smartphones, we can envision that more useful everyday AR applications can arise as we allow HMDs to enjoy longer operation times. This work takes a first step in designing an...
User's personal portable devices such as smartphone, tablet and laptop require continuous authentication of the user to prevent against illegitimate access to the device and personal data. Current authentication techniques require users to enter password or scan fingerprint, making frequent access to the devices inconvenient. In this work, we propose to exploit user's on-body wearable devices to detect...
Vital sign (e.g., breathing rate) monitoring has become increasingly more important because it offers useful clues of medical conditions such as sleep disorders or anomalies. It is necessary to provide contact-free, easy deployment, and long-term vital sign monitoring for healthcare. In this demo, we present SonarBeat to leverage a phase based active sonar to monitor breathing rates with smartphones.
Passive Radio Frequency Identification (RFID) tags have been widely applied in many applications, such as logistics, retailing, and warehousing. In many situations the relative locations of objects are more important than their absolute locations. However, state-of-art relative localization methods need continuing movement of tags and readers, which limit the application domain and scalability. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.