Now showing items 461-480 of 656

    • Power and performance analysis of multimedia applications running on low-power devices by cache modeling 

      Asaduzzaman, Abu; Gunasekara, Govipalagodage H. (Springer, Part of Springer Science+Business Media, 2014-09)
      High processing speed is required to support computation intensive applications. Cache memory is used to improve processing speed by reducing the speed gap between the fast processing core and slow main memory. However, ...
    • Power-based intrusion detection for additive manufacturing: A deep learning approach 

      Rott, Michal; Monroy, Sergio A.Salinas (Springer, Cham, 2021-03-11)
      Due to the ability of 3D-printers to build a wide range of objects at low costs, many industries are rapidly adopting additive manufacturing. However due to their sensing and communications capabilities, 3D-printers are ...
    • A practical framework for preventing distracted redestrian-related Incidents using wrist wearables 

      Vinayaga-Sureshkanth, Nisha; Maiti, Anindya; Jadliwala, Murtuza Shabbir; Crager, Kirsten; He, Jibo; Rathore, Heena (IEEE, 2018-12)
      Distracted pedestrians, akin to their distracted driver counterparts, are an increasingly dangerous threat and precursors to pedestrian accidents in urban communities, often resulting in grave injuries and fatalities. ...
    • Pre-fetching with the segmented LRU algorithm 

      Pendse, Ravi; Bhagavathula, Ravi (IEEE, 1999)
      An economical solution to the need for unlimited amounts of fast memory is a memory hierarchy, which takes advantage of locality and cost/performance of memory technologies. Most of the advanced block replacement algorithms ...
    • Predictive analytics to estimate level of residential participation in residential demand response program 

      Basnet, Saurav Man Singh; Jewell, Ward T. (IEEE, 2019-03-21)
      Demand response programs are becoming an integral part of the power system, helping create a closer alignment between the electrical service providers and customers. The research described in this paper uses the residential ...
    • Preface 

      Rattani, Ajita; Derakhshani, Reza R.; Ross, Arun A. (Springer London, 2019-09)
      This book highlights the field of selfie biometrics, providing a clear overview and presenting recent advances and challenges. It also discusses numerous selfie authentication techniques on mobile devices. Biometric ...
    • Preface 

      Li, Haizhou; Ge, Shuzhi Sam; Wu, Yan; Wykowska, Agnieszka; He, Hongsheng (Springer, 2021-11-02)
      The 13th International Conference on Social Robotics (ICSR 2021) was held as a hybrid conference (onsite and online) in Singapore, during November 10–13, 2021, with the theme of “Robotics in our everyday lives”, emphasizing ...
    • Preface -- Social Robotics: 10th International Conference, ICSR 2018 

      Ge, Shuzhi Sam; Cabibihan, John-John; Salichs, Miguel A.; Broadbent, Elizabeth A.; He, Hongsheng; Wagner, Alan R.; Gonzalez, Alvaro Castro (Springer Nature, 2018)
      This book constitutes the refereed proceedings of the 10th International Conference on Social Robotics, ICSR 2018, held in Qingdao, China, in November 2018.The 60 full papers presented were carefully reviewed and selected ...
    • Preface -- Social Robotics: 11th International Conference, ICSR 2019 

      Salichs, Miguel A.; Ge, Shuzhi Sam; Barakova, Emilia; Cabibihan, John-John; Wagner, Alan R.; Gonzalez, Alvaro Castro; He, Hongsheng (Springer, 2019)
      The 11th International Conference on Social Robotics (ICSR 2019) was held in Madrid, Spain, during November 26–29, 2019. This book includes the proceedings of the conference, comprising 69 refereed papers, reviewed by the ...
    • Preventing shoulder surfing using randomized augmented reality keyboards 

      Maiti, Anindya; Jadliwala, Murtuza Shabbir; Weber, Chase (IEEE, 2017)
      Shoulder surfing or adversarial eavesdropping to infer users' keystrokes on physical QWERTY keyboards continues to be a serious privacy threat. Despite this, practical and efficient countermeasures against such attacks are ...
    • Prior detection of explosives to defeat tragic attacks using knowledge based sensor networks 

      Chidella, Kishore K.; Asaduzzaman, Abu; Mashhadi, Farshad (IEEE, 2017)
      In recent years, the concern due to targeted acts of terrorism has grown rapidly. The consequences from a terrorist attack lead to critical economic infrastructure, public safety, and environment. Traditional intelligence ...
    • Privacy of community pseudonyms in wireless peer-to-peer networks 

      Freudiger, Julien; Jadliwala, Murtuza Shabbir; Hubaux, Jean-Pierre; Niemi, Valtteri; Ginzboorg, Philip (SPRINGER, 2013-06)
      Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current ...
    • Privacy-preserving IoT devices 

      Almohaimeed, Abdulrahman; Gampa, Srikanth; Singh, Gurtaj (IEEE, 2019-05)
      With the recent exponential increase in network-based devices, it is expected that billions of devices will be connected to the Internet. In enabling this growth, effectively securing Internet of Things (IoT) devices while ...
    • Privacy-preserving optimal meeting location determination on mobile devices 

      Bilogrevic, Igor; Jadliwala, Murtuza Shabbir; Joneja, Vishal; Kalkan, Kubra; Hubaux, Jean-Pierre; Aad, Imad (IEEE, 2014-07)
      Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely ...
    • Private classical communication over quantum multiple-access channels 

      Chou, Rémi (IEEE, 2021-07-12)
      We study private classical communication over quantum multiple-access channels. For an arbitrary number of transmitters, we derive a regularized expression of the capacity region. In the case of degradable channels, we ...
    • A probabilistic graphical model for system-wide analysis of gene regulatory networks 

      Kotiang, Stephen; Eslami, Ali (NLM (Medline), 2020-02-25)
      The inference of gene regulatory networks (GRNs) from DNA microarray measurements forms a core element of systems biology-based phenotyping. In the recent past, numerous computational methodologies have been formalized to ...
    • Probing fairness of mobile ocular biometrics methods across gender on VISOB 2.0 dataset 

      Krishnan, Anoop; Almadan, Ali; Rattani, Ajita (Springer, Cham, 2021-02-21)
      Recent research has questioned the fairness of face-based recognition and attribute classification methods (such as gender and race) for dark-skinned people and women. Ocular biometrics in the visible spectrum is an alternate ...
    • A promising parallel algorithm to manage the RSA decryption complexity 

      Asaduzzaman, Abu; Gummadi, Deepthi; Waichal, Puskar (IEEE, 2015)
      In the field of cryptography, public key algorithms are widely known to be slower than symmetric key alternatives for the reason of their basis in modular arithmetic. The modular arithmetic in RSA (short for Ron Rivest, ...
    • Propagator method for joint time delay and frequency estimation 

      Qasaymeh, Mahmoud Mohammad; Hiren, G.; Tayem, Nizar Abdel-Hafeeth Mohammad; Pendse, Ravi; Sawan, M. Edwin (IEEE, 2008-10-26)
      A novel method of estimating the differential delay of a sinusoidal signal is considered. The new method utilizes the propagator method (PM) which does not require the eigen-decomposition of the cross-spectral matrix (CSM) ...
    • Pulsed ferrite magnetic field generator for through-the-earth communication systems for disaster situation in mines 

      Bae, Seok; Hong, Yang-Ki; Lee, Jaejin; Park, Jihoon; Jalli, Jeevan; Abo, Gavin S.; Kwon, Hyuck M.; Jayasooriya, Chandana K. K. (Korean Magnetics Society, 2013-03)
      A pulsed ferrite magnetic field generator (FMFG) was designed for the use in the 1000 m long through-theearth (TTE) communication system for mining disaster situations. To miniaturize the TTE system, a ferrite core having ...