![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
MobiQuitous 2019: Houston, TX, USA
- H. Vincent Poor, Zhu Han, Dario Pompili, Zhi Sun, Miao Pan:
MobiQuitous 2019, Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Houston, Texas, USA, November 12-14, 2019. ACM 2019, ISBN 978-1-4503-7283-1
Main track
- Josh Rands, Qi Han:
Regression-based network monitoring in swarm robotic systems. 1-10 - Virendra Singh Shekhawat, Ankur Vineet, Avinash Gautam
:
Efficient content caching for named data network nodes. 11-19 - Yanling Cui, Beihong Jin, Fusang Zhang, Xingwu Sun:
A deep spatio-temporal attention-based neural network for passenger flow prediction. 20-30 - Alexandre Campos, Nuno Correia
, Teresa Romão
, Isabel L. Nunes
, Mário Simões-Marques
:
Mobile augmented reality techniques for emergency response. 31-39 - Ying Zhao, Wenyuan Tao, Chung-Ming Own:
The impression of virtual experience: mobile augmented reality cloud solution. 40-49 - Jayanth Shenoy, Aditya Tyagi, Meha Halabe, Christine Julien
:
Jive: spatially-constrained encryption key sharing using visible light communication. 50-59 - Christian Meurisch, Sebastian Kauschke, Tim Grube, Bekir Bayrak, Max Mühlhäuser:
{P}Net: privacy-preserving personalization of AI-based models by anonymous inter-person similarity networks. 60-69 - Mazharul Islam, Novia Nurain, Mohammad Kaykobad, Sriram Chellappan, A. B. M. Alim Al Islam:
HEliOS: huffman coding based lightweight encryption scheme for data transmission. 70-79 - Bobai Zhao, Dali Zhu, Tong Xi, Siye Wang
, Di Wu:
Indoor localization based on subcarrier parameter estimation of LoS with wi-fi. 80-89 - Dongbiao He, Jinlei Jiang, Guangwen Yang, Cédric Westphal:
Pushing smart caching to the edge with BayCache. 90-99 - Shravan Aras, Chris Gniady, Hari Venugopalan:
MultiLock: biometric-based graded authentication for mobile devices. 100-109 - Shunan Ma, Xunbo Shuai, Yongcai Chai:
An intelligent optimization method for information recommendation. 110-115 - Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Sheila Alemany, Ahmed Imteaj
, Kia Makki, Edwin Aguilar:
Quantifying location privacy in permissioned blockchain-based internet of things (IoT). 116-125 - Mengnan Cai
, Siye Wang
, Xinling Shen
, Yijia Jin:
A scheme for anomalous RFID trajectory detection based on improved clustering algorithm under digital-twin-driven. 126-134 - Varun Kanal, Maher Abujelala, James Brady, Glenn Wylie, Fillia Makedon:
Adaptive robotic rehabilitation using muscle fatigue as a trigger. 135-142 - Murtadha Aldeer
, Jorge Ortiz, Richard E. Howard, Richard P. Martin:
PatientSense: patient discrimination from in-bottle sensors data. 143-152 - Zawar Hussain, Subhash Sagar
, Wei Emma Zhang
, Quan Z. Sheng
:
A cost-effective and non-invasive system for sleep and vital signs monitoring using passive RFID tags. 153-161 - Abu Zaher Md Faridee, Md Abdullah Al Hafiz Khan, Nilavra Pathak, Nirmalya Roy:
AugToAct: scaling complex human activity recognition with few labels. 162-171 - Tam Le, Matt W. Mutka
:
PPCA: privacy-preserving conditional actions for IoT environments using smart contracts. 172-179 - Jianchao Lu
, Xi Zheng
, Quan Z. Sheng
, Zawar Hussain, Jiaxing Wang
, Wanlei Zhou
:
MFE-HAR: multiscale feature engineering for human activity recognition using wearable sensors. 180-189 - Volkan Dedeoglu, Raja Jurdak
, Guntur D. Putra
, Ali Dorri, Salil S. Kanhere
:
A trust architecture for blockchain in IoT. 190-199 - Majid Salehi, Morteza Amini, Bruno Crispo:
Detecting malicious applications using system services request behavior. 200-209 - Yongqiang Jiang, Hai-Miao Hu, Yanglin Pu, Haoran Jiang:
WiLay: building wi-fi-based human activity recognition system through activity hierarchical relationship. 210-219 - Saad Sajid Hashmi
, Muhammad Ikram
, Stephen Smith
:
On optimization of ad-blocking lists for mobile devices. 220-227 - Roben Castagna Lunardi
, Regio A. Michelin, Charles V. Neu, Henry C. Nunes, Avelino F. Zorzo, Salil S. Kanhere
:
Impact of consensus on appendable-block blockchain for IoT. 228-237 - João A. Silva, Hervé Paulino
, João M. Lourenço
, João Leitão
, Nuno M. Preguiça
:
Time-aware reactive storage in wireless edge environments. 238-247 - Yongwoo Lee, Jingjie Li, Younghyun Kim:
MicPrint: acoustic sensor fingerprinting for spoof-resistant mobile device authentication. 248-257 - Yige Zhang, Yu Xiao, Kai Zhao, Weixiong Rao:
DeepLoc: deep neural network-based telco localization. 258-267 - Alejandro Sánchez Guinea, Andrey Boytsov, Ludovic Mouline, Yves Le Traon
:
Smart discovery of periodic-frequent human routines for home automation. 268-277 - Christian Meurisch, Artur Gogel, Bekir Bayrak, Max Mühlhäuser:
NextAct: a hybrid approach for high-resolution human activity predictions. 278-287 - Emirhan Poyraz, Prethvi Kashinkunti, Matthew Schuchhardt, Michael Kishinevsky, Niranjan Soundararajan, Gokhan Memik:
Understanding the impact of number of CPU cores on user satisfaction in smartphones. 288-297 - Abeer Hakeem, Narain Gehani, Xiaoning Ding
, Reza Curtmola, Cristian Borcea:
Multi-destination vehicular route planning with parking and traffic constraints. 298-307 - Bastian Schäfermeier
, Tom Hanika
, Gerd Stumme
:
Distances for wifi based topological indoor mapping. 308-317 - Michael Y. Kpiebaareh, Wei-Ping Wu, Strato Bayitaa
, Charles R. Haruna, Lawrence Tandoh:
User-connection behaviour analysis in service management using bipartite labelled property graph. 318-327 - Yan Zhu, Dong Wang, Run Zhao, Qian Zhang, Anna Huang:
FitAssist: virtual fitness assistant based on wifi. 328-337 - Md. Mizanur Rahman
, Atanu Shome, Sriram Chellappan, A. B. M. Alim Al Islam:
How smart your smartphone is in lie detection? 338-347 - Atanu Shome, Md. Mizanur Rahman
, Sriram Chellappan, A. B. M. Alim Al Islam:
A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analytics. 348-357 - Eun-Jeong Shin, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
SCARF: a scalable data management framework for context-aware applications in smart environments. 358-367 - Pedro Albuquerque Santos
, Rui Neves Madeira, Nuno Correia
:
YanuX: pervasive distribution of the user interface by co-located devices. 368-377 - T. Bosak, P. Jantos, Krzysztof Boryczko:
Simulation of a big number of microservices in a highly distributed vast network. 378-386 - Ismail Abumuhfouz, Yaser Mowafi:
An augmented real-world interactive classroom for developing learning numbers and counting skills for preschool children. 387-393 - Adita Kulkarni, Anand Seetharam, Arti Ramesh:
DeepFit: deep learning based fitness center equipment use modeling and prediction. 394-403 - Andreas Schuler
, Gabriele Anderst-Kotsis
:
Examining the energy impact of sorting algorithms on android: an empirical study. 404-413 - Bowen Li
, Shunliang Zhang, Xu Shan, Yongming Wang, Zhenxiang Gao:
A social-relation-based game model for distributed clustering in cooperative wireless networks. 414-423 - A. K. M. Mahtab Hossain, George Loukas
:
Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment. 424-433 - Jens Naber, Martin Pfannemüller
, Janick Edinger, Christian Becker:
PerFlow: configuring the information flow in a pervasive middleware via visual scripting. 434-443 - Guillaume Celosia, Mathieu Cunche:
Saving private addresses: an analysis of privacy issues in the bluetooth-low-energy advertising mechanism. 444-453 - Ahmed A. A. Gad-ElRab, Amin Y. Noaman:
Fuzzy clustering-based task allocation approach using bipartite graph in cloud-fog environment. 454-463 - Yuhuan Lu, Zhaocheng He, Liangkui Luo:
Learning trajectories as words: a probabilistic generative model for destination prediction. 464-472 - Tuo Yu, Wenyu Ren, Klara Nahrstedt:
MMLOC: multi-mode indoor localization system based on smart access points. 473-482 - Brandon Tsao, Yuhong Liu, Behnam Dezfouli:
Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device. 483-491
Workshop Session: 1st international workshop on UAV swarm networking for mobile and ubiquitous systems
- Hongxing Zhang, Hui Gao, Xin Su:
Channel prediction based on adaptive structure extreme learning machine for UAV mmWave communications. 492-497 - Lixiao Zhu, Xuejin Wen, Qi Han, Alex Fryer, Neil Suttora, Andrew J. Petruska:
Performance evaluation of wi-fi for underground robots. 498-503 - Ahmed Abdelmoamen Ahmed, Abel Olumide, Adeoluwa Akinwa, Mohamed F. Chouikha:
Constructing 3d maps for dynamic environments using autonomous UAVs. 504-513 - Oscar G. Bautista, Nico Saputro
, Kemal Akkaya, A. Selcuk Uluagac:
A novel routing metric for IEEE 802.11s-based swarm-of-drones applications. 514-521
Workshop Session: EFIOT workshop
- Ahmed H. Anwar
, Charles A. Kamhoua, Nandi Leslie:
A game-theoretic framework for dynamic cyber deception in internet of battlefield things. 522-526 - Daniel Maniglia A. da Silva, Godwin Asaamoning
, Hector Orrillo, Rute C. Sofia
, Paulo M. Mendes:
An analysis of fog computing data placement algorithms. 527-534 - Jun Zhuang, Mingchen Gao, Mohammad Al Hasan:
Lighter U-net for segmenting white matter hyperintensities in MR images. 535-539
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.