Now showing items 539-558 of 651

    • Seer Grid: privacy and utility implications of two-level load prediction in smart grids 

      Boustani, Arash; Maiti, Anindya; Jazi, Sina Yousefian; Jadliwala, Murtuza Shabbir; Namboodiri, Vinod (IEEE, 2017-02-01)
      We propose "Seer Grid", a novel two-level energy consumption prediction framework for smart grids, aimed to decrease the trade-off between privacy requirements (of the customer) and data utility requirements (of the energy ...
    • Selection of amplify-and-forward mobile relay under cascaded Rayleigh fading 

      Lee, Kanghee; Kwon, Hyuck M.; Sawan, M. Edwin; Shim, Yeonggyu; Park, Hyuncheol; Lee, Yong H. (IEEE, 2013)
      This paper assumes a practical channel model, called a cascaded Rayleigh fading channel, for a noncooperative distributed mobile relay network, which consists of one mobile source and one mobile destination, and multiple ...
    • Selective prefetching: prefetching when only required 

      Pendse, Ravi; Katta, H. (IEEE, 1999)
      Cache memories are commonly used to reduce the number of slower lower-level memory accesses, thereby improving the memory hierarchy performance. However, high cache miss-ratio can severely degrade system performance. It ...
    • Self-hiding behavior in Android apps: detection and characterization 

      Shan, Zhiyong; Neamtiu, Iulian; Samuel, Raina (Association for Computing Machinery, 2018)
      Applications (apps) that conceal their activities are fundamentally deceptive; app marketplaces and end-users should treat such apps as suspicious. However, due to its nature and intent, activity concealing is not disclosed ...
    • Self-learning ad-hoc routing protocol 

      Best, Patricia K.; Gundeti, S.; Pendse, Ravi (IEEE, 2003-10-06)
      As the technologies for ad-hoc networks emerge, an ad-hoc routing protocol that can supply connectivity to mobile devices while utilizing a minimal amount of bandwidth as overhead becomes increasingly important. Minimal ...
    • A self-routing technique for software-defined Networks 

      Almohaimeed, Abdulrahman; Asaduzzaman, Abu (IEEE, 2020-03-05)
      Software-defined networking (SDN) is a centralized organization of computer networking in which all network switches are controlled and monitored by a single remote controller. Similar to any other centralized designs, ...
    • Semantics comprehension of entities in dictionary corpora for robot scene understanding 

      Yan, Fujian; Zhang, Yinlong; He, Hongsheng (Springer Nature, 2018)
      This paper proposes a method to help robots understand object semantics. The method presented in this paper can enhance robot’s performance and efficiency while working with ambiguous instructions to interact with unfamiliar ...
    • Semiblind multiuser MIMO channel estimators using PM and RRQR methods 

      Pendse, Ravi; Hiren, G.; Sawan, M. Edwin; Qasaymeh, Mahmoud Mohammad; Nizar, T. (IEEE, 2009-05-11)
      Estimating the channel state information (CSI) of several transmitters that use orthogonal space-time block codes (OSTBC) to communicate with a single receiver is considered. Based on rank revealing QR (RRQR) factorization ...
    • Service differentiation mechanism via cooperative medium access control protocol 

      Orsun, Fatma; Topakkaya, Hakan; Tunc, Muharrem Ali; Cetinkaya, Coskun (Springer, 2006)
      Providing differentiated Quality of Service (QoS) levels is an important challenge for wireless ad hoc networks and wireless LANs when applications have diverse performance requirements. The IEEE 802.11e MAC protocol can ...
    • Shared entry logger to eliminate duplicate requests to SDN controller 

      Asaduzzaman, Abu; Almohaimeed, Abdulrahman; Chidella, Kishore K. (IEEE, 2019-03-14)
      In network architecture domain, software-defined networking (SDN) provides programmable network infrastructure and improves management at the controlling layer level. However, SDN structure is centralized and hence introduces ...
    • Side-channel inference attacks on mobile keypads using smartwatches 

      Maiti, Anindya; Jadliwala, Murtuza Shabbir; He, Jibo; Bilogrevic, Igor (IEEE, 2018-09-01)
      Smartwatches enable many novel applications and are fast gaining popularity. However, the presence of a diverse set of onboard sensors provides an additional attack surface to malicious software and services on these ...
    • The sidelobe power suppression for the aircraft circle phase array radar 

      Wang, Dan (IEEE, 2018)
      As the air force becomes more and more important, it is very important to improve the performance of object tracking. The circle phase array radar is adopted to improve the object tracking ability. However, it is very ...
    • Simulating multisensor noninvasive blood glucose monitoring systems 

      Asaduzzaman, Abu; Samadarsinee, Soumyashree; Chidella, Kishore K. (IEEE, 2016)
      Diabetes and related complications are responsible for early death - one person in every 7 seconds. Long term and short term complications due to diabetes can be reduced through proper diet, physical exercise, and medication. ...
    • Simulation models for mobile-to-mobile channels with isotropic and nonisotropic scattering 

      Ding, Yanwu; Ibdah, Yazan (Springer, 2020-09-30)
      Recent radio channel measurements in peer-to-peer (P2P) and mobile-to-mobile network indicate that, depending on the mobility of the terminals and scattering properties of the environment, the predominate fading mechanism ...
    • Simulations on the statistical properties for cascaded Rayleigh fading channel 

      Ibdah, Yazan; Ding, Yanwu; Kwon, Hyuck M.; Lee, Kanghee (IEEE, 2011-11-07)
      In the past few years, mobile to mobile communication has gained much attention. Researchers have invested considerable effort in obtaining appropriate channel models to understand the statistical properties of the underlying ...
    • Single Network Adaptive Critic aided nonlinear dynamic inversion for suboptimal command tracking 

      Lakshmikanth, Geethalakshmi S.; Padhi, Radhakant; Watkins, John Michael; Steck, James E. (IEEE, 2011-09-28)
      Using the Approximate Dynamic Programming (ADP) approach, nonlinear optimal control problems can be solved by using a dual neural network architecture called the Adaptive Critic (AC). A Single Network Adaptive Critic (SNAC) ...
    • Six pass MapReduce implementation of Strassen's algorithm for matrix multiplication 

      Ramanan, Prakash (Association for Computing Machinery, Inc, 2018-06-15)
      Consider the multiplication of two n x n matrices. A straight-forward sequential algorithm for computing the product takes Θ(n3) time. Strassen [21] presented an algorithm that takes Θ(nlg 7) time; lg denotes logarithm to ...
    • A smart data logger for enhancing data communication in Wi-Fi based mobile systems 

      Asaduzzaman, Abu; Chidella, Kishore K.; Sibai, Fadi N. (IEEE, 2015)
      Accurate and complete data acquisition is a key challenge for mobile systems that use wireless sensor network (WSN) for communication. In a WSN system, data may be lost due to communication errors among receivers and the ...
    • Smart disaster management using software-defined unmanned aerial systems 

      Asaduzzaman, Abu; Telakapalli, Abhignan; Sibai, Fadi N. (IEEE, 2021-03-11)
      In this work, we introduce a software-defined unmanned aerial systems (UAS) model, which can provide access to sensitive places where Wi-Fi communication is most needed for rescue operations. The proposed UAS model is ...
    • Smartwatch-based keystroke inference attacks and context-aware protection mechanisms 

      Maiti, Anindya; Armbruster, Oscar; Jadliwala, Murtuza Shabbir; He, Jibo (Association for Computing Machinery, 2016)
      Wearable devices, such as smartwatches, are furnished with state-of-the-art sensors that enable a range of context-aware applications. However, malicious applications can misuse these sensors, if access is left unaudited. ...