The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the architecture and technologies used to develop a voice controlled system for home automation named Cassandra. We start with the goals of the project and a system description, then focusing on the main components and the way they interact with each other. We exemplify with a scenario where we ask the house to turn the lights off, going step-by-step over the communication sequence...
Achieving high QoE for AR applications on a mobile device is challenging because the required advanced computer vision and machine learning algorithms are computationally intensive by nature. Hence, some task for AR applications must be offloaded to more powerful remote servers. Offloading for mobile applications remains an active area of research. In the context of mobile AR applications which requires...
The exponential growth of mobile videos has enabled a variety of video crowdsourcing applications. However, existing crowdsourcing approaches require all video files to be uploaded, wasting a large amount of bandwidth since not all crowdsourced videos are useful. Moreover, it is difficult for applications to find desired videos based on user-generated annotations, which can be inaccurate or miss important...
The proliferation of mobile devices and ubiquitous access of the wireless network enables many new mobile applications such as augmented reality, mobile gaming and so on. As the applications are latency sensitive, researchers propose to offload the complex computations of these applications to the nearby mobile edge cloud, in order to reduce the latency. Existing works mostly consider the problem...
Abstract-With the rapid development of streaming media, communications between Device-to-Device is becoming a magnetic solution to improve the performance of cellular network.Although numerous papers have been published in the past, most of them just focus on novel description but ignore the classical theory to be innovated. In this paper, inspired by BitTorrent protocol, we propose a dynamic d2d...
With the continuing penetration of sensor devices and the development of wireless communication techniques, increasing number of applications involving context awareness in ubiquitous computing have been used in daily life. How to collect data from mobile devices at a low energy cost and to mine contextual habits of users remains a key challenge for ubiquitous computing. We proposed an efficient context-...
The popularity of Location-Based Services (LBSs) has resulted in varieties of applications with more conveniences in our daily life. However, since mobile users need to submit some sensitive information to the untrusted LBS servers, they may lose their privacy while they are enjoying the provided social activities. In this paper, we first point out and define the Time-Sensitive Side Information (TSSI)...
Recently, spectrum optimization solutions require mobile phones to obtain precise, accurate and fine-grained estimates of the radio link data rate. In particular, the effectiveness of anticipatory schemes depends on the granularity of these measurements. In this paper we use a reliable LTE control channel sniffer (OWL) to extensively compare mobile phone measurements against exact LTE radio link data...
The low performance and power limitations of mobile devices severely limit the complexity and the duration of playing sessions of mobile games. This article examines the possibility of using computation-offloading to mitigate these problems while keeping the game playable. We design Mirror, a framework for offloading computation targeted at the demanding performance requirements of sophisticated mobile...
One of the key features of 5G roadmap is mobile edge computing (MEC), as an effective way to bring information technology (IT) services close to the mobile user. Moving computation and caching resources at the edge of the access network enables low latency and high reliability services, as required in many of the verticals associated to 5G, such as Industry 4.0 or automated driving. Merging MEC with...
In mobile edge computing, a mobile or IoT device requests a nearby device to execute some functionality and return back the results. However, the executable code must either be pre-installed on the nearby device or be transferred from the requester device, reducing the utility or safety of device-to-device computing, respectively. To address this problem, we present a micro-service middleware that...
An important category of mobile crowdsensing applications involve collecting sensor measurements from mobile devices and querying mobile users for annotations to build machine learning models for inference and prediction. Trade-offs between inference performance and the costs of data acquisition (both unlabeled and labeled) are not yet well understood. In this paper, we develop, ALSense, a distributed...
We consider a general multi-user mobile cloud computing system with a computing access point (CAP), where each mobile user has multiple independent tasks that may be processed locally, at the CAP, or at a remote cloud server. The CAP serves both as the network access gateway and a computation service provider to the mobile users. We aim to jointly optimize the offloading decisions of all users' tasks...
In edge-cloud computing, a set of edge servers are deployed near the mobile devices such that these devices can offload jobs to the servers with low latency. One fundamental and critical problem in edge-cloud systems is how to dispatch and schedule the jobs so that the job response time (defined as the interval between the release of a job and the arrival of the computation result at its device) is...
Photos crowdsourced from mobile devices can be used in many applications such as disaster recovery to obtain information about a target area. However, such applications often have resource constraints in terms of bandwidth, storage, and processing capability, which limit the number of photos that can be crowdsourced. Thus, it is a challenge to use the limited resources to crowdsource photos that best...
Motivated by the great potential of implicit and seamless user authentication, we attempt to build an efficient middle layer running on mobile devices to support implicit authentication (IA) systems with adaptive sampling. Various activities, such as user location, application usage, user motion, and battery usage have been popular choices to generate behaviors, the soft biometrics, for implicit authentication...
Navigating unfamiliar places is a common problem pilgrim face during Hajj. There exists few research-based applications that provide support but are less suited for highly crowded situations such as Hajj religious event. Therefore there is need to investigate support systems for use in large crowded events. Towards Developing an Intelligent HAJJ Guide system is a PhD thesis that investigates the issues...
With the development of Artificial Intelligence, gesture recognition technology has been applied in practical schemes. We built up the Dynamic Matrix Sound system (DMS system) which makes an excellent sound field reproduction effect. However, because of the weak controllability of the large-scale system, the application of the DMS system is very limited. In order to control a DMS system by gesture,...
Due to the limited computing resources in mobile devices, it is desirable to offload the computation intensive and time sensitive tasks to the network edge. This paper aims at optimizing the total consumption cost incurred by the usage of the limited computational resources in mobile edge (e.g. small cell, access point, macro base station) while satisfying all the computational demands from each network...
The proliferation of wireless technologies in today's everyday life is one of the key drivers of the Internet of Things (IoT). In addition to being an enabler of connectivity, the vast penetration of wireless devices today gives rise to a secondary functionality as a means of tracking and localization of the devices themselves. Indeed, in order to discover and automatically connect to known Wi-Fi...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.