


default search action
MobiQuitous 2019: Houston, TX, USA
- H. Vincent Poor, Zhu Han, Dario Pompili, Zhi Sun, Miao Pan:

MobiQuitous 2019, Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Houston, Texas, USA, November 12-14, 2019. ACM 2019, ISBN 978-1-4503-7283-1
Main track
- Josh Rands, Qi Han:

Regression-based network monitoring in swarm robotic systems. 1-10 - Virendra Singh Shekhawat, Ankur Vineet, Avinash Gautam

:
Efficient content caching for named data network nodes. 11-19 - Yanling Cui, Beihong Jin, Fusang Zhang, Xingwu Sun:

A deep spatio-temporal attention-based neural network for passenger flow prediction. 20-30 - Alexandre Campos, Nuno Correia

, Teresa Romão
, Isabel L. Nunes
, Mário Simões-Marques
:
Mobile augmented reality techniques for emergency response. 31-39 - Ying Zhao, Wenyuan Tao, Chung-Ming Own:

The impression of virtual experience: mobile augmented reality cloud solution. 40-49 - Jayanth Shenoy, Aditya Tyagi, Meha Halabe, Christine Julien

:
Jive: spatially-constrained encryption key sharing using visible light communication. 50-59 - Christian Meurisch, Sebastian Kauschke, Tim Grube, Bekir Bayrak, Max Mühlhäuser:

{P}Net: privacy-preserving personalization of AI-based models by anonymous inter-person similarity networks. 60-69 - Mazharul Islam, Novia Nurain, Mohammad Kaykobad, Sriram Chellappan, A. B. M. Alim Al Islam:

HEliOS: huffman coding based lightweight encryption scheme for data transmission. 70-79 - Bobai Zhao, Dali Zhu, Tong Xi, Siye Wang

, Di Wu:
Indoor localization based on subcarrier parameter estimation of LoS with wi-fi. 80-89 - Dongbiao He, Jinlei Jiang, Guangwen Yang, Cédric Westphal:

Pushing smart caching to the edge with BayCache. 90-99 - Shravan Aras

, Chris Gniady, Hari Venugopalan:
MultiLock: biometric-based graded authentication for mobile devices. 100-109 - Shunan Ma, Xunbo Shuai, Yongcai Chai:

An intelligent optimization method for information recommendation. 110-115 - Abdur Rahman Bin Shahid, Niki Pissinou, Laurent Njilla, Sheila Alemany, Ahmed Imteaj

, Kia Makki, Edwin Aguilar:
Quantifying location privacy in permissioned blockchain-based internet of things (IoT). 116-125 - Mengnan Cai

, Siye Wang
, Xinling Shen
, Yijia Jin:
A scheme for anomalous RFID trajectory detection based on improved clustering algorithm under digital-twin-driven. 126-134 - Varun Kanal, Maher Abujelala, James Brady, Glenn Wylie, Fillia Makedon:

Adaptive robotic rehabilitation using muscle fatigue as a trigger. 135-142 - Murtadha Aldeer

, Jorge Ortiz, Richard E. Howard, Richard P. Martin:
PatientSense: patient discrimination from in-bottle sensors data. 143-152 - Zawar Hussain

, Subhash Sagar
, Wei Emma Zhang
, Quan Z. Sheng
:
A cost-effective and non-invasive system for sleep and vital signs monitoring using passive RFID tags. 153-161 - Abu Zaher Md Faridee, Md Abdullah Al Hafiz Khan, Nilavra Pathak

, Nirmalya Roy:
AugToAct: scaling complex human activity recognition with few labels. 162-171 - Tam Le, Matt W. Mutka

:
PPCA: privacy-preserving conditional actions for IoT environments using smart contracts. 172-179 - Jianchao Lu

, Xi Zheng
, Quan Z. Sheng
, Zawar Hussain
, Jiaxing Wang
, Wanlei Zhou
:
MFE-HAR: multiscale feature engineering for human activity recognition using wearable sensors. 180-189 - Volkan Dedeoglu, Raja Jurdak

, Guntur D. Putra
, Ali Dorri, Salil S. Kanhere
:
A trust architecture for blockchain in IoT. 190-199 - Majid Salehi, Morteza Amini, Bruno Crispo

:
Detecting malicious applications using system services request behavior. 200-209 - Yongqiang Jiang, Hai-Miao Hu, Yanglin Pu

, Haoran Jiang:
WiLay: building wi-fi-based human activity recognition system through activity hierarchical relationship. 210-219 - Saad Sajid Hashmi

, Muhammad Ikram
, Stephen Smith
:
On optimization of ad-blocking lists for mobile devices. 220-227 - Roben Castagna Lunardi

, Regio A. Michelin, Charles V. Neu, Henry C. Nunes, Avelino F. Zorzo
, Salil S. Kanhere
:
Impact of consensus on appendable-block blockchain for IoT. 228-237 - João A. Silva, Hervé Paulino

, João M. Lourenço
, João Leitão
, Nuno M. Preguiça
:
Time-aware reactive storage in wireless edge environments. 238-247 - Yongwoo Lee, Jingjie Li, Younghyun Kim

:
MicPrint: acoustic sensor fingerprinting for spoof-resistant mobile device authentication. 248-257 - Yige Zhang, Yu Xiao, Kai Zhao, Weixiong Rao:

DeepLoc: deep neural network-based telco localization. 258-267 - Alejandro Sánchez Guinea, Andrey Boytsov, Ludovic Mouline, Yves Le Traon

:
Smart discovery of periodic-frequent human routines for home automation. 268-277 - Christian Meurisch, Artur Gogel, Bekir Bayrak, Max Mühlhäuser:

NextAct: a hybrid approach for high-resolution human activity predictions. 278-287 - Emirhan Poyraz, Prethvi Kashinkunti, Matthew Schuchhardt, Michael Kishinevsky, Niranjan Soundararajan, Gokhan Memik:

Understanding the impact of number of CPU cores on user satisfaction in smartphones. 288-297 - Abeer Hakeem, Narain Gehani, Xiaoning Ding

, Reza Curtmola, Cristian Borcea:
Multi-destination vehicular route planning with parking and traffic constraints. 298-307 - Bastian Schäfermeier

, Tom Hanika
, Gerd Stumme
:
Distances for wifi based topological indoor mapping. 308-317 - Michael Y. Kpiebaareh, Wei-Ping Wu, Strato Bayitaa

, Charles R. Haruna, Lawrence Tandoh:
User-connection behaviour analysis in service management using bipartite labelled property graph. 318-327 - Yan Zhu, Dong Wang, Run Zhao, Qian Zhang, Anna Huang:

FitAssist: virtual fitness assistant based on wifi. 328-337 - Md. Mizanur Rahman

, Atanu Shome, Sriram Chellappan, A. B. M. Alim Al Islam:
How smart your smartphone is in lie detection? 338-347 - Atanu Shome, Md. Mizanur Rahman

, Sriram Chellappan, A. B. M. Alim Al Islam:
A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analytics. 348-357 - Eun-Jeong Shin, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:

SCARF: a scalable data management framework for context-aware applications in smart environments. 358-367 - Pedro Albuquerque Santos

, Rui Neves Madeira, Nuno Correia
:
YanuX: pervasive distribution of the user interface by co-located devices. 368-377 - T. Bosak, P. Jantos, Krzysztof Boryczko:

Simulation of a big number of microservices in a highly distributed vast network. 378-386 - Ismail Abumuhfouz, Yaser Mowafi:

An augmented real-world interactive classroom for developing learning numbers and counting skills for preschool children. 387-393 - Adita Kulkarni, Anand Seetharam, Arti Ramesh:

DeepFit: deep learning based fitness center equipment use modeling and prediction. 394-403 - Andreas Schuler

, Gabriele Anderst-Kotsis
:
Examining the energy impact of sorting algorithms on android: an empirical study. 404-413 - Bowen Li

, Shunliang Zhang, Xu Shan, Yongming Wang, Zhenxiang Gao:
A social-relation-based game model for distributed clustering in cooperative wireless networks. 414-423 - A. K. M. Mahtab Hossain, George Loukas

:
Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. 424-433 - Jens Naber, Martin Pfannemüller

, Janick Edinger, Christian Becker:
PerFlow: configuring the information flow in a pervasive middleware via visual scripting. 434-443 - Guillaume Celosia, Mathieu Cunche:

Saving private addresses: an analysis of privacy issues in the bluetooth-low-energy advertising mechanism. 444-453 - Ahmed A. A. Gad-ElRab

, Amin Y. Noaman:
Fuzzy clustering-based task allocation approach using bipartite graph in cloud-fog environment. 454-463 - Yuhuan Lu, Zhaocheng He, Liangkui Luo:

Learning trajectories as words: a probabilistic generative model for destination prediction. 464-472 - Tuo Yu, Wenyu Ren, Klara Nahrstedt:

MMLOC: multi-mode indoor localization system based on smart access points. 473-482 - Brandon Tsao, Yuhong Liu, Behnam Dezfouli:

Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device. 483-491
Workshop Session: 1st international workshop on UAV swarm networking for mobile and ubiquitous systems
- Hongxing Zhang, Hui Gao, Xin Su:

Channel prediction based on adaptive structure extreme learning machine for UAV mmWave communications. 492-497 - Lixiao Zhu, Xuejin Wen, Qi Han, Alex Fryer, Neil Suttora, Andrew J. Petruska:

Performance evaluation of wi-fi for underground robots. 498-503 - Ahmed Abdelmoamen Ahmed, Abel Olumide, Adeoluwa Akinwa, Mohamed F. Chouikha:

Constructing 3d maps for dynamic environments using autonomous UAVs. 504-513 - Oscar G. Bautista, Nico Saputro

, Kemal Akkaya, A. Selcuk Uluagac:
A novel routing metric for IEEE 802.11s-based swarm-of-drones applications. 514-521
Workshop Session: EFIOT workshop
- Ahmed H. Anwar

, Charles A. Kamhoua, Nandi Leslie:
A game-theoretic framework for dynamic cyber deception in internet of battlefield things. 522-526 - Daniel Maniglia A. da Silva, Godwin Asaamoning

, Hector Orrillo, Rute C. Sofia
, Paulo Mendes:
An analysis of fog computing data placement algorithms. 527-534 - Jun Zhuang, Mingchen Gao, Mohammad Al Hasan:

Lighter U-net for segmenting white matter hyperintensities in MR images. 535-539

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














