[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 29 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
A Query Processing Framework for Efficient Network Resource Utilization in Shared Sensor Networks
Article No.: 31, Pages 1–28https://doi.org/10.1145/3397809

Shared Sensor Network (SSN) refers to a scenario where the same sensing and communication resources are shared and queried by multiple Internet applications. Due to the burgeoning growth in Internet applications, multiple application queries can exhibit ...

research-article
Distributed Reliable and Energy-Efficient Scheduling for LR-WPANs
Article No.: 32, Pages 1–20https://doi.org/10.1145/3399805

Pervasiveness of wireless networks drives the heterogeneity and density of devices in a vast diversity of environments. To achieve high reliability and low energy consumption while enabling pervasiveness is inherently a resource allocation problem. In ...

research-article
RF-AMOC: Human-related RFID Tag Movement Identification in Access Management of Carries
Article No.: 33, Pages 1–23https://doi.org/10.1145/3399678

The use of radio-frequency identification (RFID) technology in supply chain has been a fairly mature application in recent years, which can be extended to the field of carrier management for the inventory and access control of sensitive files and mobile ...

research-article
DAML: Practical Secure Protocol for Data Aggregation Based on Machine Learning
Article No.: 34, Pages 1–18https://doi.org/10.1145/3404192

Data aggregation based on machine learning (ML), in mobile edge computing, allows participants to send ephemeral parameter updates of local ML on their private data instead of the exact data to the untrusted aggregator. However, it still enables the ...

research-article
Identifying Child Users via Touchscreen Interactions
Article No.: 35, Pages 1–25https://doi.org/10.1145/3403574

With the proliferation of smart devices, children can be easily exposed to violent or adult-only content on the Internet. Without any precaution, the premature and unsupervised use of smart devices can be harmful to both children and their parents. Thus,...

research-article
Open Access
ACES: Automatic Configuration of Energy Harvesting Sensors with Reinforcement Learning
Article No.: 36, Pages 1–31https://doi.org/10.1145/3404191

Many modern smart building applications are supported by wireless sensors to sense physical parameters, given the flexibility they offer and the reduced cost of deployment. However, most wireless sensors are powered by batteries today, and large ...

research-article
dWatch: A Reliable and Low-Power Drowsiness Detection System for Drivers Based on Mobile Devices
Article No.: 37, Pages 1–22https://doi.org/10.1145/3407899

Drowsiness detection is critical to driver safety, considering thousands of deaths caused by drowsy driving annually. Professional equipment is capable of providing high detection accuracy, but the high cost limits their applications in practice. The ...

research-article
Resilience Bounds of Network Clock Synchronization with Fault Correction
Article No.: 38, Pages 1–30https://doi.org/10.1145/3409804

Naturally occurring disturbances and malicious attacks can lead to faults in synchronizing the clocks of two network nodes. In this article, we investigate the fundamental resilience bounds of network clock synchronization for a system of N nodes ...

research-article
Incentive Mechanisms for Crowdsensing: Motivating Users to Preprocess Data for the Crowdsourcer
Article No.: 39, Pages 1–24https://doi.org/10.1145/3409475

Crowdsensing is a popular method that leverages a crowd of sensor users to collect data. For many crowdsensing applications, the collected raw data need to be preprocessed before further analysis, and the preprocessing work is mainly done by the ...

research-article
Pushing the Limits of Transmission Concurrency for Low Power Wireless Networks
Article No.: 40, Pages 1–29https://doi.org/10.1145/3406834

Concurrent transmission (CT) has been widely adopted to optimize the throughput of various data transmissions in wireless networks, such as bulk data dissemination and high-rate data collection. In CT, besides the possible data frame collision at ...

research-article
Ultra-wideband Concurrent Ranging
Article No.: 41, Pages 1–41https://doi.org/10.1145/3409477

We propose a novel concurrent ranging technique for distance estimation with ultra-wideband (UWB) radios. Conventional schemes assume that the necessary packet exchanges occur in isolation to avoid collisions. Concurrent ranging relies on the ...

research-article
Urban Scale Trade Area Characterization for Commercial Districts with Cellular Footprints
Article No.: 42, Pages 1–20https://doi.org/10.1145/3412372

Understanding customer mobility patterns to commercial districts is crucial for urban planning, facility management, and business strategies. Trade areas are a widely applied measure to quantify where the visitors are from. Traditional trade area ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.