Browsing EECS Faculty Scholarship by Title
Now showing items 470-489 of 657
-
Preface -- Social Robotics: 11th International Conference, ICSR 2019
(Springer, 2019)The 11th International Conference on Social Robotics (ICSR 2019) was held in Madrid, Spain, during November 26–29, 2019. This book includes the proceedings of the conference, comprising 69 refereed papers, reviewed by the ... -
Preventing shoulder surfing using randomized augmented reality keyboards
(IEEE, 2017)Shoulder surfing or adversarial eavesdropping to infer users' keystrokes on physical QWERTY keyboards continues to be a serious privacy threat. Despite this, practical and efficient countermeasures against such attacks are ... -
Prior detection of explosives to defeat tragic attacks using knowledge based sensor networks
(IEEE, 2017)In recent years, the concern due to targeted acts of terrorism has grown rapidly. The consequences from a terrorist attack lead to critical economic infrastructure, public safety, and environment. Traditional intelligence ... -
Privacy of community pseudonyms in wireless peer-to-peer networks
(SPRINGER, 2013-06)Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current ... -
Privacy-preserving IoT devices
(IEEE, 2019-05)With the recent exponential increase in network-based devices, it is expected that billions of devices will be connected to the Internet. In enabling this growth, effectively securing Internet of Things (IoT) devices while ... -
Privacy-preserving optimal meeting location determination on mobile devices
(IEEE, 2014-07)Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely ... -
Private classical communication over quantum multiple-access channels
(IEEE, 2021-07-12)We study private classical communication over quantum multiple-access channels. For an arbitrary number of transmitters, we derive a regularized expression of the capacity region. In the case of degradable channels, we ... -
A probabilistic graphical model for system-wide analysis of gene regulatory networks
(NLM (Medline), 2020-02-25)The inference of gene regulatory networks (GRNs) from DNA microarray measurements forms a core element of systems biology-based phenotyping. In the recent past, numerous computational methodologies have been formalized to ... -
Probing fairness of mobile ocular biometrics methods across gender on VISOB 2.0 dataset
(Springer, Cham, 2021-02-21)Recent research has questioned the fairness of face-based recognition and attribute classification methods (such as gender and race) for dark-skinned people and women. Ocular biometrics in the visible spectrum is an alternate ... -
A promising parallel algorithm to manage the RSA decryption complexity
(IEEE, 2015)In the field of cryptography, public key algorithms are widely known to be slower than symmetric key alternatives for the reason of their basis in modular arithmetic. The modular arithmetic in RSA (short for Ron Rivest, ... -
Propagator method for joint time delay and frequency estimation
(IEEE, 2008-10-26)A novel method of estimating the differential delay of a sinusoidal signal is considered. The new method utilizes the propagator method (PM) which does not require the eigen-decomposition of the cross-spectral matrix (CSM) ... -
Pulsed ferrite magnetic field generator for through-the-earth communication systems for disaster situation in mines
(Korean Magnetics Society, 2013-03)A pulsed ferrite magnetic field generator (FMFG) was designed for the use in the 1000 m long through-theearth (TTE) communication system for mining disaster situations. To miniaturize the TTE system, a ferrite core having ... -
QAcon: single model quality assessment using protein structural and contact information with machine learning techniques
(Oxford University Press, 2017-02-15)Motivation: Protein model quality assessment (QA) plays a very important role in protein structure prediction. It can be divided into two groups of methods: single model and consensus QA method. The consensus QA methods ... -
QoS-aware adaptive routing in multi-layer hierarchical software defined networks: a reinforcement learning approach
(IEEE, 2016)Software-defined networks (SDNs) have been recognized as the next-generation networking paradigm that decouples the data forwarding from the centralized control. To realize the merits of dedicated QoS provisioning and fast ... -
A QoS-based broadcast protocol under blind information for multihop cognitive radio ad hoc networks
(IEEE, 2014-03)Broadcasting is an important operation in wireless networks where control information is usually propagated as broadcasts for the realization of most networking protocols. In traditional ad hoc networks, broadcasts are ... -
A quality-aware multi-level data aggregation approach to manage smart grid AMI traffic
(IEEE, 2019-02-01)The inclusion of various intelligent electronic devices such as smart meters for AMI is expected to result in intermittent or frequent communications network congestion if additional network infrastructure investments are ... -
Quantifying the cost of privately storing data in distributed storage systems
(IEEE, 2022-07-21)Consider a user who wishes to store a file in multiple servers such that at least t servers are needed to reconstruct the file, and z colluding servers cannot learn any information about the file. Unlike traditional ... -
Quantitative analysis of enhanced mobile IP
(2006-06)As the popularity of mobile computing grows, the associated protocols and their scalability are subject to much closer scrutiny. Mobile IP relies heavily on the use of IP-to-IP tunneling, requiring 20 bytes of overhead ... -
Quantitative analysis of security protocols in wireless networks
(IEEE, 2003-06-18)Security has been a major concern for computer networks, and required levels of security continue to increase and become more complicated to provide. Wireless devices face new challenges in securely exchanging information ... -
Quantizing the throughput reduction of IPSec with mobile IP
(IEEE, 2002-08-04)The demand for immediate and universal access to information is increasing rapidly, leading to the desire for mobile access to the Internet. The Mobile Internet Protocol (Mobile IP) provides mobility to Internet users with ...