Scheduling Advertisement Delivery in Vehicular Networks
Vehicular users are emerging as a prime market for targeted advertisement, where advertisements (ads) are sent from network points of access to vehicles, and displayed to passengers only if they are...
View ArticleJointly Optimizing Content Caching and Recommendations in Small Cell Networks
Caching decisions typically seek to cache content that satisfies the maximum possible demand aggregated over all users. Recommendation systems, on the contrary, focus on individual users and recommend...
View ArticleAn Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in...
How to achieve reliable routing has always been a major issue in the design of communication networks, among which mobile ad hoc networks (MANETs) possess the most adversarial networking environment...
View ArticleImproving Network Formation in 6TiSCH Networks
The industrial Internet of Things (IIoT) is expected to revolutionize the current industry. The capillary introduction of sensors and actuators for real-time monitoring and remote control and their...
View ArticleSelfish Decentralized Computation Offloading for Mobile Cloud Computing in...
Offloading computation to a mobile cloud is a promising solution to augment the computation capabilities of mobile devices. In this paper, we consider selfish mobile devices in a dense wireless...
View ArticleMobile Display Power Reduction for Video Using Standardized Metadata
The inordinate power consumption of contemporary display panels accelerates battery depletion in mobile devices. Existing display-power reduction approaches are suboptimal because they incur additional...
View ArticleIntegrating Social Links into Wireless Networks: Modeling, Routing, Analysis,...
Social connections among network nodes have been well investigated as an additional opportunity in network design (e.g., in routing strategies and trusted networking). This paper presents a paradigm...
View ArticlePrimary User-Aware Optimal Discovery Routing for Cognitive Radio Networks
Routing protocols in multi-hop cognitive radio networks (CRNs) can be classified into two main categories: local and global routing. Local routing protocols aim at decreasing the overhead of the...
View ArticleA Concurrent Transmission Based Broadcast Scheme for Urban VANETs
Many applications in vehicular ad hoc networks (VANETs) are based on broadcast to disseminate information among vehicles. In conventional broadcast protocols, only one vehicle is scheduled to...
View ArticleFinding Decomposable Models for Efficient Distributed Inference over Sensor...
Graphical models have been widely applied in distributed network computation problems such as inference in large-scale sensor networks. While belief propagation (BP) based on message passing is a...
View ArticleHeterogeneous Multi-Task Assignment in Mobile Crowdsensing Using...
Mobile crowdsensing (MCS) is a new paradigm to collect sensing data and infer useful knowledge over a vast area for numerous monitoring applications. In urban environments, as more and more...
View ArticleThird-Party Cellular Congestion Detection and Augmentation
While cellular networks connect over 3.7 billion people worldwide, their availability and quality is not uniform across regions. Under-provisioned and overloaded networks, as are common in rural or...
View ArticleLearning-Constrained Enhancement of Cellular Networks Capacity
Every year, mobile operators spend hundreds of millions of dollars to improve their cellular capacities. Capacity improvements typically aim at adding carriers, frequency bands, radios, antenna...
View ArticleEnergy Efficiency of Secure Cognitive Radio Networks with Cooperative...
Energy-efficient and secure wireless communications have recently earned tremendous interests due to economic, environmental, and military concerns. This paper investigates the tradeoff between the...
View ArticleSensor-Based Proximity Detection in the Face of Active Adversaries
Context-centric sensor-based proximity detection (or, contextual co-presence detection) is a promising approach to defend against relay attacks in many mobile authentication systems, especially against...
View ArticleEfficient Locality Classification for Indoor Fingerprint-Based Systems
Locality classification is an important component to enable location-based services. It entails two sequential queries: 1) whether a target is within the site or not, i.e., inside/outside region...
View ArticleMobile Data Offloading with Uniform Pricing and Overlaps
Mobile data offloading is an emerging technology to alleviate cellular network congestion and improve user service quality. In this paper, we investigate the economics of mobile data offloading through...
View ArticlePTrack: Enhancing the Applicability of Pedestrian Tracking with Wearables
The ability to accurately track pedestrians is valuable for various application designs. Although pedestrian tracking has been investigated extensively and owns a well-suited sensing platform, the...
View ArticleEnergy-Efficient Traffic Regulation and Scheduling for Video Streaming...
To reduce power consumption of smartphones, this work proposes a novel discontinuous reception (DRX)-based power saving mechanism for LTE-A networks supporting multi-services. The novel designs of the...
View ArticleStreaming High-Definition Real-Time Video to Mobile Devices with Partially...
Delivering High-Definition (HD) real-time video to mobile devices is challenged with stringent constraints in delay and reliability. In the presence of network dynamics (e.g., channel errors and...
View ArticlePerformance Evaluation and Delay-Power Trade-off Analysis of ZigBee Protocol
In this paper, we analyze the superframe structure of the Medium Access Control (MAC) sublayer of IEEE 802.15.4 protocol (ZigBee), designed for Low-Rate Wireless Personal Area Networks (LR-WPANs), and...
View ArticleDRX over LAA-LTE-A New Design and Analysis Based on Semi-Markov Model
Ever-increasing demand of data rate and subscriber penetration are resulting in continuous growth of mobile data traffic. In order to meet this exponential data traffic growth 3GPP Release 13, we have...
View ArticleProximity-Aware Location Based Collaborative Sensing for Energy-Efficient...
A fundamental question in the study of location-based mobile sensing is how much energy can be saved while still guaranteeing the reliable localization accuracy. In this paper, we analyze key features...
View ArticleMulti-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using...
Vehicular Ad Hoc Networks (VANETs) bring many benefits and conveniences to road safety and drive comfort in future transportation systems. However, VANETs suffer from almost all security issues as same...
View ArticleMulti-User Cooperative Mobile Video Streaming: Performance Analysis and...
Adaptive bitrate streaming enables video users to adapt their playing bitrates to the real-time network conditions, hence achieving the desirable quality-of-experience (QoE). In a multi-user wireless...
View ArticleWriting in the Air with WiFi Signals for Virtual Reality Devices
Recently, handwriting recognition approaches has been widely applied to Human-Computer Interface (HCI) applications. The emergence of the novel mobile terminals urges a more man-machine friendly...
View ArticleCoded Caching Clusters with Device-to-Device Communications
We consider a geographically constrained caching community where popular data files are cached on mobile terminals and distributed through Device-to-Device (D2D) communications. To ensure availability,...
View ArticleOn the Strength of Privacy Metrics for Vehicular Communication
Vehicular communication plays a key role in near-future automotive transport, promising features such as increased traffic safety and wireless software updates. However, vehicular communication can...
View ArticleA Robust Load Balancing and Routing Protocol for Intra-Car Hybrid...
With the emergence of connected and autonomous vehicles, sensors are increasingly deployed within cars to support new functionalities. Traffic generated by these sensors congest traditional intra-car...
View ArticleEnergy-Efficient Dynamic Computation Offloading and Cooperative Task...
Mobile cloud computing (MCC) as an emerging and prospective computing paradigm, can significantly enhance computation capability and save energy for smart mobile devices (SMDs) by offloading...
View ArticleVirtual Safe: Unauthorized Walking Behavior Detection for Mobile Devices
The prevalence and monetary value of mobile devices, coupled with their compact and, indeed, mobile nature, lead to frequent theft due to a lack of proper anti-theft mechanisms. Currently, there only...
View ArticleToward Ultra-Low-Power Remote Health Monitoring: An Optimal and Adaptive...
Activity recognition, as an important component of behavioral monitoring and intervention, has attracted enormous attention, especially in Mobile Cloud Computing (MCC) and Remote Health Monitoring...
View ArticleVision-Based Mobile Indoor Assistive Navigation Aid for Blind People
This paper presents a new holistic vision-based mobile assistive navigation system to help blind and visually impaired people with indoor independent travel. The system detects dynamic obstacles and...
View ArticleBackup Battery Analysis and Allocation against Power Outage for Cellular Base...
Base stations have been widely deployed to satisfy the service coverage and explosive demand increase in today's cellular networks. Their reliability and availability heavily depend on the electrical...
View ArticleDolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones
Dual-channel screen-camera communication has been proposed to enable simultaneous screen viewing and hidden screen-camera communication. However, it strictly requires a well-controlled camera-screen...
View ArticleTCP Closure Optimization for Enhanced Battery Life in Smart Devices
Applications (Apps) in Smart devices make our life connected to Internet all the time. Many of the Apps like Google Apps, Facebook, and Twitter generate periodic background traffic. Due to this...
View ArticleAn Investigation of Using Loop-Back Mechanism for Channel Reciprocity...
Physical layer security key generation exploits unpredictable features from wireless channels to achieve high security, which requires high reciprocity in order to set up symmetric keys between two...
View ArticleDandelion: A Unified Code Offloading System for Wearable Computing
Execution speed seriously bothers application developers and users for wearable devices such as Google Glass. Intensive applications like 3D games suffer from significant delays when CPU is busy....
View ArticleMaxlifd: Joint Maximum Likelihood Localization Fusing Fingerprints and Mutual...
Fusing mutual distance information with fingerprints can substantially improve indoor localization accuracy. Such distance information may be spatial (e.g., measurement among users or from installed...
View ArticlePolarization-Based Visible Light Positioning
Visible Light Positioning (VLP) provides a promising means to achieve indoor localization with sub-meter accuracy. We observe that the Visible Light Communication (VLC) methods in existing VLP systems...
View ArticleA Reverse Bearings Only Target Motion Analysis for Autonomous Underwater...
We present a non-linear navigation solution, referred to as the Reverse Bearing Only Target Motion Analysis (Reverse BO-TMA). Reverse BO-TMA is a passive method for the self-localization of an...
View ArticlePower Allocation and 3-D Placement for Floating Relay Supporting Indoor...
With the rapid development of mobile Internet and urban constructions, high-volume and dynamic indoor communications bring challenges to cellular systems. High penetration loss and deep shadowing...
View ArticleFair Coexistence of Regular and Multipath TCP over Wireless Last-Miles
Recent advancements in Internet congestion control have introduced a multipath TCP (MPTCP) that aims to simultaneously utilize multiple available paths in the network. In this paper, we develop an...
View ArticleTraffic-Aware Sensor Grouping for IEEE 802.11ah Networks: Regression Based...
Traditional IEEE 802.11 network is designed for the use of small scale local wireless networks. However, the emergence of the Internet of Things (IoT) has changed the scene of wireless communications....
View ArticleSignal Processing of Multimodal Mobile Lifelogging Data Towards Detecting...
Stress is a negative emotion that is part of everyday life. However, frequent episodes or prolonged periods of stress can be detrimental to long-term health. Nevertheless, developing self-awareness is...
View ArticleBloom Hopping: Bloom Filter Based 2-Hop Neighbor Management in VANETs
Recent works have shown that it would be beneficial for nodes in wireless networks with very dynamic topology to maintain a list of 2-hop neighbors, namely, the neighbors of its neighbors. This is...
View ArticleFast Deployment of UAV Networks for Optimal Wireless Coverage
Unmanned Aerial Vehicle (UAV) networks have emerged as a promising technique to rapidly provide wireless coverage to a geographical area, where a flying UAV can be fast deployed to serve as cell site....
View ArticleZone Probabilistic Routing for Wireless Sensor Networks
This article modeled the data routing problem in Wireless Sensor Networks as an in-zone random process. The data packets are randomly routed from the source to the sink within the defined Routing Zone...
View Article
More Pages to Explore .....