Internetwork Time Synchronization of Mobile Ad Hoc Networks
…performance using a sensible metric called a mutual consensus. It is shown that the common time is achieved with a limited variance in the networks that operate in the master-slave,…
Now showing
…performance using a sensible metric called a mutual consensus. It is shown that the common time is achieved with a limited variance in the networks that operate in the master-slave,…
This paper focuses on the way to protect privacy of clients requesting datasets stored in data servers while keeping communication efficiency. To this end, we introduce a novel communication-efficient and…
Physical world enhancements through virtually drawn annotations on mobile devices are a core component of mobile augmented reality (MAR) experiences. However, resource intensive computer vision tasks typically limit the full…
…studies have examined the potential role of information technologies in preventing and mitigating Biodisaster X.Objective: This study aimed to explore (1) what Biodisaster X might entail and (2) solutions that…
…and examined their performance in a variety of applications such as computer vision (e.g., self-driving cars and object detection), image processing (e.g., image restoration), medical image analysis (e.g., medical image…
…compares to peer design feedback within a design-oriented HCI class and across two metrics: perceived quality and perceived fairness. We also examine the perceived monetary value of crowdsourced feedback, which…
The emergence of Multi-Access Edge Computing (MEC) technology aims to extend cloud computing capabilities to the edge of the wireless access networks, i.e., closer to the end-users. Thus, MEC-enabled 5G…
…only saves communication bandwidth, but also hides each worker’s exact model update trajectory from any eavesdropper including the honest-but-curious PS, thereby preserving data privacy against model inversion attacks. We formally…
The paper presents a new theory of combined moment invariants to Gaussian blur and spatial affine transformation. The blur kernel may be arbitrary oriented, scaled and elongated. No prior information…
Many computer vision applications require robust and efficient estimation of camera geometry. The robust estimation is usually based on solving camera geometry problems from a minimal number of input data…