Browsing EECS Faculty Scholarship by Title
Now showing items 548-567 of 657
-
Self-hiding behavior in Android apps: detection and characterization
(Association for Computing Machinery, 2018)Applications (apps) that conceal their activities are fundamentally deceptive; app marketplaces and end-users should treat such apps as suspicious. However, due to its nature and intent, activity concealing is not disclosed ... -
Self-learning ad-hoc routing protocol
(IEEE, 2003-10-06)As the technologies for ad-hoc networks emerge, an ad-hoc routing protocol that can supply connectivity to mobile devices while utilizing a minimal amount of bandwidth as overhead becomes increasingly important. Minimal ... -
A self-routing technique for software-defined Networks
(IEEE, 2020-03-05)Software-defined networking (SDN) is a centralized organization of computer networking in which all network switches are controlled and monitored by a single remote controller. Similar to any other centralized designs, ... -
Semantics comprehension of entities in dictionary corpora for robot scene understanding
(Springer Nature, 2018)This paper proposes a method to help robots understand object semantics. The method presented in this paper can enhance robot’s performance and efficiency while working with ambiguous instructions to interact with unfamiliar ... -
Semiblind multiuser MIMO channel estimators using PM and RRQR methods
(IEEE, 2009-05-11)Estimating the channel state information (CSI) of several transmitters that use orthogonal space-time block codes (OSTBC) to communicate with a single receiver is considered. Based on rank revealing QR (RRQR) factorization ... -
Service differentiation mechanism via cooperative medium access control protocol
(Springer, 2006)Providing differentiated Quality of Service (QoS) levels is an important challenge for wireless ad hoc networks and wireless LANs when applications have diverse performance requirements. The IEEE 802.11e MAC protocol can ... -
Shared entry logger to eliminate duplicate requests to SDN controller
(IEEE, 2019-03-14)In network architecture domain, software-defined networking (SDN) provides programmable network infrastructure and improves management at the controlling layer level. However, SDN structure is centralized and hence introduces ... -
Side-channel inference attacks on mobile keypads using smartwatches
(IEEE, 2018-09-01)Smartwatches enable many novel applications and are fast gaining popularity. However, the presence of a diverse set of onboard sensors provides an additional attack surface to malicious software and services on these ... -
The sidelobe power suppression for the aircraft circle phase array radar
(IEEE, 2018)As the air force becomes more and more important, it is very important to improve the performance of object tracking. The circle phase array radar is adopted to improve the object tracking ability. However, it is very ... -
Simulating multisensor noninvasive blood glucose monitoring systems
(IEEE, 2016)Diabetes and related complications are responsible for early death - one person in every 7 seconds. Long term and short term complications due to diabetes can be reduced through proper diet, physical exercise, and medication. ... -
Simulation models for mobile-to-mobile channels with isotropic and nonisotropic scattering
(Springer, 2020-09-30)Recent radio channel measurements in peer-to-peer (P2P) and mobile-to-mobile network indicate that, depending on the mobility of the terminals and scattering properties of the environment, the predominate fading mechanism ... -
Simulations on the statistical properties for cascaded Rayleigh fading channel
(IEEE, 2011-11-07)In the past few years, mobile to mobile communication has gained much attention. Researchers have invested considerable effort in obtaining appropriate channel models to understand the statistical properties of the underlying ... -
Single Network Adaptive Critic aided nonlinear dynamic inversion for suboptimal command tracking
(IEEE, 2011-09-28)Using the Approximate Dynamic Programming (ADP) approach, nonlinear optimal control problems can be solved by using a dual neural network architecture called the Adaptive Critic (AC). A Single Network Adaptive Critic (SNAC) ... -
Six pass MapReduce implementation of Strassen's algorithm for matrix multiplication
(Association for Computing Machinery, Inc, 2018-06-15)Consider the multiplication of two n x n matrices. A straight-forward sequential algorithm for computing the product takes Θ(n3) time. Strassen [21] presented an algorithm that takes Θ(nlg 7) time; lg denotes logarithm to ... -
A smart data logger for enhancing data communication in Wi-Fi based mobile systems
(IEEE, 2015)Accurate and complete data acquisition is a key challenge for mobile systems that use wireless sensor network (WSN) for communication. In a WSN system, data may be lost due to communication errors among receivers and the ... -
Smart disaster management using software-defined unmanned aerial systems
(IEEE, 2021-03-11)In this work, we introduce a software-defined unmanned aerial systems (UAS) model, which can provide access to sensitive places where Wi-Fi communication is most needed for rescue operations. The proposed UAS model is ... -
Smartwatch-based keystroke inference attacks and context-aware protection mechanisms
(Association for Computing Machinery, 2016)Wearable devices, such as smartwatches, are furnished with state-of-the-art sensors that enable a range of context-aware applications. However, malicious applications can misuse these sensors, if access is left unaudited. ... -
Smooth shunt control of a Fuzzy based distributed power flow controller to improve power quality
(IEEE, 2016)Presently, the quality of power supplied is essential to many customers. Power quality (PQ) is a valued utility service where many customers are prepared to pay and get it. In the future, distribution system operators ought ... -
Social puzzles: context-based access control in online social networks
(IEEE, 2014-06-23)The increasing popularity of online social networks (OSNs) is spawning new security and privacy concerns. Currently, a majority of OSNs offer very naive access control mechanisms that are primarily based on static access ... -
Sociorobotics
(Springer Netherlands, 2018-04)This special issue provides researchers with the opportunity to describe their work and their latest progress in the field of social robotics, aimed at fostering discussions and potential collaborations on the development ...