Now showing items 462-481 of 651

    • Predictive analytics to estimate level of residential participation in residential demand response program 

      Basnet, Saurav Man Singh; Jewell, Ward T. (IEEE, 2019-03-21)
      Demand response programs are becoming an integral part of the power system, helping create a closer alignment between the electrical service providers and customers. The research described in this paper uses the residential ...
    • Preface 

      Rattani, Ajita; Derakhshani, Reza R.; Ross, Arun A. (Springer London, 2019-09)
      This book highlights the field of selfie biometrics, providing a clear overview and presenting recent advances and challenges. It also discusses numerous selfie authentication techniques on mobile devices. Biometric ...
    • Preface -- Social Robotics: 10th International Conference, ICSR 2018 

      Ge, Shuzhi Sam; Cabibihan, John-John; Salichs, Miguel A.; Broadbent, Elizabeth A.; He, Hongsheng; Wagner, Alan R.; Gonzalez, Alvaro Castro (Springer Nature, 2018)
      This book constitutes the refereed proceedings of the 10th International Conference on Social Robotics, ICSR 2018, held in Qingdao, China, in November 2018.The 60 full papers presented were carefully reviewed and selected ...
    • Preface -- Social Robotics: 11th International Conference, ICSR 2019 

      Salichs, Miguel A.; Ge, Shuzhi Sam; Barakova, Emilia; Cabibihan, John-John; Wagner, Alan R.; Gonzalez, Alvaro Castro; He, Hongsheng (Springer, 2019)
      The 11th International Conference on Social Robotics (ICSR 2019) was held in Madrid, Spain, during November 26–29, 2019. This book includes the proceedings of the conference, comprising 69 refereed papers, reviewed by the ...
    • Preventing shoulder surfing using randomized augmented reality keyboards 

      Maiti, Anindya; Jadliwala, Murtuza Shabbir; Weber, Chase (IEEE, 2017)
      Shoulder surfing or adversarial eavesdropping to infer users' keystrokes on physical QWERTY keyboards continues to be a serious privacy threat. Despite this, practical and efficient countermeasures against such attacks are ...
    • Prior detection of explosives to defeat tragic attacks using knowledge based sensor networks 

      Chidella, Kishore K.; Asaduzzaman, Abu; Mashhadi, Farshad (IEEE, 2017)
      In recent years, the concern due to targeted acts of terrorism has grown rapidly. The consequences from a terrorist attack lead to critical economic infrastructure, public safety, and environment. Traditional intelligence ...
    • Privacy of community pseudonyms in wireless peer-to-peer networks 

      Freudiger, Julien; Jadliwala, Murtuza Shabbir; Hubaux, Jean-Pierre; Niemi, Valtteri; Ginzboorg, Philip (SPRINGER, 2013-06)
      Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current ...
    • Privacy-preserving IoT devices 

      Almohaimeed, Abdulrahman; Gampa, Srikanth; Singh, Gurtaj (IEEE, 2019-05)
      With the recent exponential increase in network-based devices, it is expected that billions of devices will be connected to the Internet. In enabling this growth, effectively securing Internet of Things (IoT) devices while ...
    • Privacy-preserving optimal meeting location determination on mobile devices 

      Bilogrevic, Igor; Jadliwala, Murtuza Shabbir; Joneja, Vishal; Kalkan, Kubra; Hubaux, Jean-Pierre; Aad, Imad (IEEE, 2014-07)
      Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely ...
    • Private classical communication over quantum multiple-access channels 

      Chou, Remi (IEEE, 2021-07-12)
      We study private classical communication over quantum multiple-access channels. For an arbitrary number of transmitters, we derive a regularized expression of the capacity region. In the case of degradable channels, we ...
    • A probabilistic graphical model for system-wide analysis of gene regulatory networks 

      Kotiang, Stephen; Eslami, Ali (NLM (Medline), 2020-02-25)
      The inference of gene regulatory networks (GRNs) from DNA microarray measurements forms a core element of systems biology-based phenotyping. In the recent past, numerous computational methodologies have been formalized to ...
    • Probing fairness of mobile ocular biometrics methods across gender on VISOB 2.0 dataset 

      Krishnan, Anoop; Almadan, Ali; Rattani, Ajita (Springer, Cham, 2021-02-21)
      Recent research has questioned the fairness of face-based recognition and attribute classification methods (such as gender and race) for dark-skinned people and women. Ocular biometrics in the visible spectrum is an alternate ...
    • A promising parallel algorithm to manage the RSA decryption complexity 

      Asaduzzaman, Abu; Gummadi, Deepthi; Waichal, Puskar (IEEE, 2015)
      In the field of cryptography, public key algorithms are widely known to be slower than symmetric key alternatives for the reason of their basis in modular arithmetic. The modular arithmetic in RSA (short for Ron Rivest, ...
    • Propagator method for joint time delay and frequency estimation 

      Qasaymeh, Mahmoud Mohammad; Hiren, G.; Tayem, Nizar Abdel-Hafeeth Mohammad; Pendse, Ravi; Sawan, M. Edwin (IEEE, 2008-10-26)
      A novel method of estimating the differential delay of a sinusoidal signal is considered. The new method utilizes the propagator method (PM) which does not require the eigen-decomposition of the cross-spectral matrix (CSM) ...
    • Pulsed ferrite magnetic field generator for through-the-earth communication systems for disaster situation in mines 

      Bae, Seok; Hong, Yang-Ki; Lee, Jaejin; Park, Jihoon; Jalli, Jeevan; Abo, Gavin S.; Kwon, Hyuck M.; Jayasooriya, Chandana K. K. (Korean Magnetics Society, 2013-03)
      A pulsed ferrite magnetic field generator (FMFG) was designed for the use in the 1000 m long through-theearth (TTE) communication system for mining disaster situations. To miniaturize the TTE system, a ferrite core having ...
    • QAcon: single model quality assessment using protein structural and contact information with machine learning techniques 

      Cao, Renzhi; Adhikari, Badri; Bhattacharya, Debswapna; Sun, Miao; Hou, Jie; Cheng, Jianlin (Oxford University Press, 2017-02-15)
      Motivation: Protein model quality assessment (QA) plays a very important role in protein structure prediction. It can be divided into two groups of methods: single model and consensus QA method. The consensus QA methods ...
    • QoS-aware adaptive routing in multi-layer hierarchical software defined networks: a reinforcement learning approach 

      Lin, Shih-Chun; Akyildiz, Ian F.; Wang, Pu; Luo, Min (IEEE, 2016)
      Software-defined networks (SDNs) have been recognized as the next-generation networking paradigm that decouples the data forwarding from the centralized control. To realize the merits of dedicated QoS provisioning and fast ...
    • A QoS-based broadcast protocol under blind information for multihop cognitive radio ad hoc networks 

      Song, Yi; Xie, Jiang (IEEE, 2014-03)
      Broadcasting is an important operation in wireless networks where control information is usually propagated as broadcasts for the realization of most networking protocols. In traditional ad hoc networks, broadcasts are ...
    • A quality-aware multi-level data aggregation approach to manage smart grid AMI traffic 

      Das, Uddipan; Namboodiri, Vinod (IEEE, 2019-02-01)
      The inclusion of various intelligent electronic devices such as smart meters for AMI is expected to result in intermittent or frequent communications network congestion if additional network infrastructure investments are ...
    • Quantitative analysis of enhanced mobile IP 

      Best, Patricia K.; Pendse, Ravi (2006-06)
      As the popularity of mobile computing grows, the associated protocols and their scalability are subject to much closer scrutiny. Mobile IP relies heavily on the use of IP-to-IP tunneling, requiring 20 bytes of overhead ...