Now showing items 446-465 of 640

    • Polynomial learning of distribution families 

      Belkin, Mikhail; Sinha, Kaushik (Society for Industrial and Applied Mathematics, 2015-07-07)
      The question of polynomial learnability of probability distributions, particularly Gaussian mixture distributions, has recently received significant attention in theoretical computer science and machine learning. However, ...
    • Port address translation based route optimization for mobile IP 

      Badami, D.; Thanthry, Nagaraja; Best, Patricia K.; Bhagavathula, Ravi; Pendse, Ravi (IEEE, 2004-09-06)
      The current mobility management protocol mobile IP (MIP) specifies the use of a home agent (HA) in forwarding datagrams to/from the mobile node (MN). This often leads to the usage of either triangular routing or reverse ...
    • Power allocation for AF relaying network under channel phase misalignment 

      Lee, Kanghee; Kwon, Hyuck M.; Yang, Jie; Sawan, M. Edwin; Park, Hyuncheol; Lee, Yong H. (IEEE, 2013)
      This paper studies both cooperative and noncooperative amplify-and-forward (AF) wireless relay strategies with power constraints at the source and at the relays. The main objective is to design jointly and iteratively the ...
    • Power and performance analysis of multimedia applications running on low-power devices by cache modeling 

      Asaduzzaman, Abu; Gunasekara, Govipalagodage H. (Springer, Part of Springer Science+Business Media, 2014-09)
      High processing speed is required to support computation intensive applications. Cache memory is used to improve processing speed by reducing the speed gap between the fast processing core and slow main memory. However, ...
    • Power-based intrusion detection for additive manufacturing: A deep learning approach 

      Rott, Michal; Monroy, Sergio A.Salinas (Springer, Cham, 2021-03-11)
      Due to the ability of 3D-printers to build a wide range of objects at low costs, many industries are rapidly adopting additive manufacturing. However due to their sensing and communications capabilities, 3D-printers are ...
    • A practical framework for preventing distracted redestrian-related Incidents using wrist wearables 

      Vinayaga-Sureshkanth, Nisha; Maiti, Anindya; Jadliwala, Murtuza Shabbir; Crager, Kirsten; He, Jibo; Rathore, Heena (IEEE, 2018-12)
      Distracted pedestrians, akin to their distracted driver counterparts, are an increasingly dangerous threat and precursors to pedestrian accidents in urban communities, often resulting in grave injuries and fatalities. ...
    • Pre-fetching with the segmented LRU algorithm 

      Pendse, Ravi; Bhagavathula, Ravi (IEEE, 1999)
      An economical solution to the need for unlimited amounts of fast memory is a memory hierarchy, which takes advantage of locality and cost/performance of memory technologies. Most of the advanced block replacement algorithms ...
    • Predictive analytics to estimate level of residential participation in residential demand response program 

      Basnet, Saurav Man Singh; Jewell, Ward T. (IEEE, 2019-03-21)
      Demand response programs are becoming an integral part of the power system, helping create a closer alignment between the electrical service providers and customers. The research described in this paper uses the residential ...
    • Preface 

      Rattani, Ajita; Derakhshani, Reza R.; Ross, Arun A. (Springer London, 2019-09)
      This book highlights the field of selfie biometrics, providing a clear overview and presenting recent advances and challenges. It also discusses numerous selfie authentication techniques on mobile devices. Biometric ...
    • Preface -- Social Robotics: 10th International Conference, ICSR 2018 

      Ge, Shuzhi Sam; Cabibihan, John-John; Salichs, Miguel A.; Broadbent, Elizabeth A.; He, Hongsheng; Wagner, Alan R.; Gonzalez, Alvaro Castro (Springer Nature, 2018)
      This book constitutes the refereed proceedings of the 10th International Conference on Social Robotics, ICSR 2018, held in Qingdao, China, in November 2018.The 60 full papers presented were carefully reviewed and selected ...
    • Preface -- Social Robotics: 11th International Conference, ICSR 2019 

      Salichs, Miguel A.; Ge, Shuzhi Sam; Barakova, Emilia; Cabibihan, John-John; Wagner, Alan R.; Gonzalez, Alvaro Castro; He, Hongsheng (Springer, 2019)
      The 11th International Conference on Social Robotics (ICSR 2019) was held in Madrid, Spain, during November 26–29, 2019. This book includes the proceedings of the conference, comprising 69 refereed papers, reviewed by the ...
    • Preventing shoulder surfing using randomized augmented reality keyboards 

      Maiti, Anindya; Jadliwala, Murtuza Shabbir; Weber, Chase (IEEE, 2017)
      Shoulder surfing or adversarial eavesdropping to infer users' keystrokes on physical QWERTY keyboards continues to be a serious privacy threat. Despite this, practical and efficient countermeasures against such attacks are ...
    • Prior detection of explosives to defeat tragic attacks using knowledge based sensor networks 

      Chidella, Kishore K.; Asaduzzaman, Abu; Mashhadi, Farshad (IEEE, 2017)
      In recent years, the concern due to targeted acts of terrorism has grown rapidly. The consequences from a terrorist attack lead to critical economic infrastructure, public safety, and environment. Traditional intelligence ...
    • Privacy of community pseudonyms in wireless peer-to-peer networks 

      Freudiger, Julien; Jadliwala, Murtuza Shabbir; Hubaux, Jean-Pierre; Niemi, Valtteri; Ginzboorg, Philip (SPRINGER, 2013-06)
      Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current ...
    • Privacy-preserving IoT devices 

      Almohaimeed, Abdulrahman; Gampa, Srikanth; Singh, Gurtaj (IEEE, 2019-05)
      With the recent exponential increase in network-based devices, it is expected that billions of devices will be connected to the Internet. In enabling this growth, effectively securing Internet of Things (IoT) devices while ...
    • Privacy-preserving optimal meeting location determination on mobile devices 

      Bilogrevic, Igor; Jadliwala, Murtuza Shabbir; Joneja, Vishal; Kalkan, Kubra; Hubaux, Jean-Pierre; Aad, Imad (IEEE, 2014-07)
      Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely ...
    • A probabilistic graphical model for system-wide analysis of gene regulatory networks 

      Kotiang, Stephen; Eslami, Ali (NLM (Medline), 2020-02-25)
      The inference of gene regulatory networks (GRNs) from DNA microarray measurements forms a core element of systems biology-based phenotyping. In the recent past, numerous computational methodologies have been formalized to ...
    • Probing fairness of mobile ocular biometrics methods across gender on VISOB 2.0 dataset 

      Krishnan, Anoop; Almadan, Ali; Rattani, Ajita (Springer, Cham, 2021-02-21)
      Recent research has questioned the fairness of face-based recognition and attribute classification methods (such as gender and race) for dark-skinned people and women. Ocular biometrics in the visible spectrum is an alternate ...
    • A promising parallel algorithm to manage the RSA decryption complexity 

      Asaduzzaman, Abu; Gummadi, Deepthi; Waichal, Puskar (IEEE, 2015)
      In the field of cryptography, public key algorithms are widely known to be slower than symmetric key alternatives for the reason of their basis in modular arithmetic. The modular arithmetic in RSA (short for Ron Rivest, ...
    • Propagator method for joint time delay and frequency estimation 

      Qasaymeh, Mahmoud Mohammad; Hiren, G.; Tayem, Nizar Abdel-Hafeeth Mohammad; Pendse, Ravi; Sawan, M. Edwin (IEEE, 2008-10-26)
      A novel method of estimating the differential delay of a sinusoidal signal is considered. The new method utilizes the propagator method (PM) which does not require the eigen-decomposition of the cross-spectral matrix (CSM) ...