default search action
MobiQuitous 2019: Houston, TX, USA
- H. Vincent Poor, Zhu Han, Dario Pompili, Zhi Sun, Miao Pan:
MobiQuitous 2019, Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Houston, Texas, USA, November 12-14, 2019. ACM 2019, ISBN 978-1-4503-7283-1
Main track
- Josh Rands, Qi Han:
Regression-based network monitoring in swarm robotic systems. 1-10 - Virendra Singh Shekhawat, Ankur Vineet, Avinash Gautam:
Efficient content caching for named data network nodes. 11-19 - Yanling Cui, Beihong Jin, Fusang Zhang, Xingwu Sun:
A deep spatio-temporal attention-based neural network for passenger flow prediction. 20-30 - Alexandre Campos, Nuno Correia, Teresa Romão, Isabel L. Nunes, Mário Simões-Marques:
Mobile augmented reality techniques for emergency response. 31-39 - Ying Zhao, Wenyuan Tao, Chung-Ming Own:
The impression of virtual experience: mobile augmented reality cloud solution. 40-49 - Jayanth Shenoy, Aditya Tyagi, Meha Halabe, Christine Julien:
Jive: spatially-constrained encryption key sharing using visible light communication. 50-59 - Christian Meurisch, Sebastian Kauschke, Tim Grube, Bekir Bayrak, Max Mühlhäuser:
{P}Net: privacy-preserving personalization of AI-based models by anonymous inter-person similarity networks. 60-69 - Mazharul Islam, Novia Nurain, Mohammad Kaykobad, Sriram Chellappan, A. B. M. Alim Al Islam:
HEliOS: huffman coding based lightweight encryption scheme for data transmission. 70-79 - Bobai Zhao, Dali Zhu, Tong Xi, Siye Wang, Di Wu:
Indoor localization based on subcarrier parameter estimation of LoS with wi-fi. 80-89 - Dongbiao He, Jinlei Jiang, Guangwen Yang, Cédric Westphal:
Pushing smart caching to the edge with BayCache. 90-99 - Shravan Aras, Chris Gniady, Hari Venugopalan:
MultiLock: biometric-based graded authentication for mobile devices. 100-109 - Shunan Ma, Xunbo Shuai, Yongcai Chai:
An intelligent optimization method for information recommendation. 110-115 - Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Sheila Alemany, Ahmed Imteaj, Kia Makki, Edwin Aguilar:
Quantifying location privacy in permissioned blockchain-based internet of things (IoT). 116-125 - Mengnan Cai, Siye Wang, Xinling Shen, Yijia Jin:
A scheme for anomalous RFID trajectory detection based on improved clustering algorithm under digital-twin-driven. 126-134 - Varun Kanal, Maher Abujelala, James Brady, Glenn Wylie, Fillia Makedon:
Adaptive robotic rehabilitation using muscle fatigue as a trigger. 135-142 - Murtadha Aldeer, Jorge Ortiz, Richard E. Howard, Richard P. Martin:
PatientSense: patient discrimination from in-bottle sensors data. 143-152 - Zawar Hussain, Subhash Sagar, Wei Emma Zhang, Quan Z. Sheng:
A cost-effective and non-invasive system for sleep and vital signs monitoring using passive RFID tags. 153-161 - Abu Zaher Md Faridee, Md Abdullah Al Hafiz Khan, Nilavra Pathak, Nirmalya Roy:
AugToAct: scaling complex human activity recognition with few labels. 162-171 - Tam Le, Matt W. Mutka:
PPCA: privacy-preserving conditional actions for IoT environments using smart contracts. 172-179 - Jianchao Lu, Xi Zheng, Quan Z. Sheng, Zawar Hussain, Jiaxing Wang, Wanlei Zhou:
MFE-HAR: multiscale feature engineering for human activity recognition using wearable sensors. 180-189 - Volkan Dedeoglu, Raja Jurdak, Guntur D. Putra, Ali Dorri, Salil S. Kanhere:
A trust architecture for blockchain in IoT. 190-199 - Majid Salehi, Morteza Amini, Bruno Crispo:
Detecting malicious applications using system services request behavior. 200-209 - Yongqiang Jiang, Hai-Miao Hu, Yanglin Pu, Haoran Jiang:
WiLay: building wi-fi-based human activity recognition system through activity hierarchical relationship. 210-219 - Saad Sajid Hashmi, Muhammad Ikram, Stephen Smith:
On optimization of ad-blocking lists for mobile devices. 220-227 - Roben Castagna Lunardi, Regio A. Michelin, Charles V. Neu, Henry C. Nunes, Avelino F. Zorzo, Salil S. Kanhere:
Impact of consensus on appendable-block blockchain for IoT. 228-237 - João A. Silva, Hervé Paulino, João M. Lourenço, João Leitão, Nuno M. Preguiça:
Time-aware reactive storage in wireless edge environments. 238-247 - Yongwoo Lee, Jingjie Li, Younghyun Kim:
MicPrint: acoustic sensor fingerprinting for spoof-resistant mobile device authentication. 248-257 - Yige Zhang, Yu Xiao, Kai Zhao, Weixiong Rao:
DeepLoc: deep neural network-based telco localization. 258-267 - Alejandro Sánchez Guinea, Andrey Boytsov, Ludovic Mouline, Yves Le Traon:
Smart discovery of periodic-frequent human routines for home automation. 268-277 - Christian Meurisch, Artur Gogel, Bekir Bayrak, Max Mühlhäuser:
NextAct: a hybrid approach for high-resolution human activity predictions. 278-287 - Emirhan Poyraz, Prethvi Kashinkunti, Matthew Schuchhardt, Michael Kishinevsky, Niranjan Soundararajan, Gokhan Memik:
Understanding the impact of number of CPU cores on user satisfaction in smartphones. 288-297 - Abeer Hakeem, Narain Gehani, Xiaoning Ding, Reza Curtmola, Cristian Borcea:
Multi-destination vehicular route planning with parking and traffic constraints. 298-307 - Bastian Schäfermeier, Tom Hanika, Gerd Stumme:
Distances for wifi based topological indoor mapping. 308-317 - Michael Y. Kpiebaareh, Wei-Ping Wu, Strato Bayitaa, Charles R. Haruna, Lawrence Tandoh:
User-connection behaviour analysis in service management using bipartite labelled property graph. 318-327 - Yan Zhu, Dong Wang, Run Zhao, Qian Zhang, Anna Huang:
FitAssist: virtual fitness assistant based on wifi. 328-337 - Md. Mizanur Rahman, Atanu Shome, Sriram Chellappan, A. B. M. Alim Al Islam:
How smart your smartphone is in lie detection? 338-347 - Atanu Shome, Md. Mizanur Rahman, Sriram Chellappan, A. B. M. Alim Al Islam:
A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analytics. 348-357 - Eun-Jeong Shin, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
SCARF: a scalable data management framework for context-aware applications in smart environments. 358-367 - Pedro Albuquerque Santos, Rui Neves Madeira, Nuno Correia:
YanuX: pervasive distribution of the user interface by co-located devices. 368-377 - T. Bosak, P. Jantos, Krzysztof Boryczko:
Simulation of a big number of microservices in a highly distributed vast network. 378-386 - Ismail Abumuhfouz, Yaser Mowafi:
An augmented real-world interactive classroom for developing learning numbers and counting skills for preschool children. 387-393 - Adita Kulkarni, Anand Seetharam, Arti Ramesh:
DeepFit: deep learning based fitness center equipment use modeling and prediction. 394-403 - Andreas Schuler, Gabriele Anderst-Kotsis:
Examining the energy impact of sorting algorithms on android: an empirical study. 404-413 - Bowen Li, Shunliang Zhang, Xu Shan, Yongming Wang, Zhenxiang Gao:
A social-relation-based game model for distributed clustering in cooperative wireless networks. 414-423 - A. K. M. Mahtab Hossain, George Loukas:
Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. 424-433 - Jens Naber, Martin Pfannemüller, Janick Edinger, Christian Becker:
PerFlow: configuring the information flow in a pervasive middleware via visual scripting. 434-443 - Guillaume Celosia, Mathieu Cunche:
Saving private addresses: an analysis of privacy issues in the bluetooth-low-energy advertising mechanism. 444-453 - Ahmed A. A. Gad-ElRab, Amin Y. Noaman:
Fuzzy clustering-based task allocation approach using bipartite graph in cloud-fog environment. 454-463 - Yuhuan Lu, Zhaocheng He, Liangkui Luo:
Learning trajectories as words: a probabilistic generative model for destination prediction. 464-472 - Tuo Yu, Wenyu Ren, Klara Nahrstedt:
MMLOC: multi-mode indoor localization system based on smart access points. 473-482 - Brandon Tsao, Yuhong Liu, Behnam Dezfouli:
Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device. 483-491
Workshop Session: 1st international workshop on UAV swarm networking for mobile and ubiquitous systems
- Hongxing Zhang, Hui Gao, Xin Su:
Channel prediction based on adaptive structure extreme learning machine for UAV mmWave communications. 492-497 - Lixiao Zhu, Xuejin Wen, Qi Han, Alex Fryer, Neil Suttora, Andrew J. Petruska:
Performance evaluation of wi-fi for underground robots. 498-503 - Ahmed Abdelmoamen Ahmed, Abel Olumide, Adeoluwa Akinwa, Mohamed F. Chouikha:
Constructing 3d maps for dynamic environments using autonomous UAVs. 504-513 - Oscar G. Bautista, Nico Saputro, Kemal Akkaya, A. Selcuk Uluagac:
A novel routing metric for IEEE 802.11s-based swarm-of-drones applications. 514-521
Workshop Session: EFIOT workshop
- Ahmed H. Anwar, Charles A. Kamhoua, Nandi Leslie:
A game-theoretic framework for dynamic cyber deception in internet of battlefield things. 522-526 - Daniel Maniglia A. da Silva, Godwin Asaamoning, Hector Orrillo, Rute C. Sofia, Paulo M. Mendes:
An analysis of fog computing data placement algorithms. 527-534 - Jun Zhuang, Mingchen Gao, Mohammad Al Hasan:
Lighter U-net for segmenting white matter hyperintensities in MR images. 535-539
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.