Many data-intensive sensor network applications are potential big-data enabler: they are deployed in challenging environments to collect large volume of data for a long period of ...
Nowadays, it is prohibitive for apps market places, such as Google App Store, to thoroughly verify an app’s resource permission requests to be legitimate or malicious. As a resu...
Bahman Rashidi, Carol J. Fung, Gerrit Bond, Steven...
In cyber-physical systems such as automobiles, measurement data from sensor nodes should be delivered to other consumer nodes such as actuators in a regular fashion. But, in pract...
The backpressure routing policy is known to be a throughput optimal policy that supports any feasible traffic demand in data networks, but may have poor delay performance when pac...
Anurag Rai, Chih-Ping Li, Georgios S. Paschos, Eyt...
We introduce SmartGuide, a light-weighted and efficient approach to localize and recognize a distant unknown building. Our approach relies on shooting only a single photo of a tar...
Xi Xiong, Zheng Yang, Longfei Shangguan, Yun Fei, ...
Delay Tolerant Networks (DTNs) composed of commodity mobile devices have the potential to support communication applications resistant to blocking and censorship, as well as certa...
Yue Liu, David R. Bild, David Adrian, Gulshan Sing...
In crowdsensing, appropriate rewards are always expected to compensate the participants for their consumptions of physical resources and involvements of manual efforts. While con...
This paper introduces an architecture for supporting transportation operation in an ad hoc way using the technologies of mobile sensing, computing and communication. The architect...
The recent development of social services tightens wireless users’ social relationships and encourages them to generate more data traffic under network effect. This boosts the ...