…is performing secure user authentication with the intelligent surroundings. For example, a secure, efficient and user-friendly authentication mechanism is essential for elderly/disabled people or patients in critical conditions requiring medical…
…attention in the recent years. In our second “WellComp” (Computing for Well-being) workshop, we intensively discuss about the contribution of ubiquitous computing towards users’ well-being that covers physical, mental, and…
…popularity of interruptibility research within our discipline, research focused on attention is surprisingly scarce. This omission may be due to (a combination of) methodological, technological, or disciplinary constraints. In this…
…sources such as mobile weather sensors, mobile phones, and wireless sensor networks (WSN) of, for example, smart homes. The underlying computing paradigm is predominantly centralized, with all data collected and…
…systems. In the antenna design community, it is very common to evaluate the antenna correlation with isotropic or non-isotropic (e.g. Gaussian-distributed) angular power spectrum (APS) as baselines. On the other…
…different complexities relying on 1) compress-and-estimate, 2) estimate-and-compress, and 3) support-estimation-and-compress strategies are proposed. Simulation results demonstrate the RD performances of different schemes and compare them to the information-theoretic limits….
…framework, called fragmentary multi-instance classification (FIC), the fragmentary data are completed and the multi-instance classifier is learned jointly. To facilitate the integration between the completion and classifier learning, FIC establishes…
…mobile communication market. This paper analyses recent 5G spectrum decisions from the spectrum valuation view point and discusses the emerging role of local 5G networks to serve the needs of…
…to RSUs. It is shown that each independently trained RL performs the vehicle-RSU association action with low control overhead and less computational complexity compared to running an online complex algorithm…
We consider a two-phaseWireless-Powered Communication Network under Nakagami-m fading, where a wireless energy transfer process first powers a sensor node that then uses such energy to transmit its data in…