Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 13 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
Time-efficient Missing Tag Identification in an Open RFID System
Article No.: 21, Pages 1–27https://doi.org/10.1145/3386242

Radio Frequency IDentification (RFID) technology has been widely used in missing tag identification to reduce the economic loss caused by theft. Although many advanced works have been proposed, they cannot work properly in an open RFID system with ...

research-article
Open Access
OPTICS: OPTimizing Irrigation Control at Scale
Article No.: 22, Pages 1–38https://doi.org/10.1145/3372024

Lawns, also known as turf, cover an estimated 128,000 km2 in North America alone, with landscape requirements representing 30% of freshwater consumed in the residential domain. With this consumption comes a large amount of environmental, economic, and ...

research-article
QoS-Aware VNF Placement and Service Chaining for IoT Applications in Multi-Tier Mobile Edge Networks
Article No.: 23, Pages 1–27https://doi.org/10.1145/3387705

Mobile edge computing and network function virtualization (NFV) paradigms enable new flexibility and possibilities of the deployment of extreme low-latency services for Internet-of-Things (IoT) applications within the proximity of their users. However, ...

research-article
Public Access
CoUAS: Enable Cooperation for Unmanned Aerial Systems
Article No.: 24, Pages 1–19https://doi.org/10.1145/3388323

In the past decade, unmanned aircraft systems (UASs) have been widely used in various civilian applications, most of which involve only a single unmanned aerial vehicle (UAV). In the near future, more and more UAS applications will be facilitated by the ...

research-article
Latency-efficient Data Collection Scheduling in Battery-free Wireless Sensor Networks
Article No.: 25, Pages 1–21https://doi.org/10.1145/3390956

The lifetime of battery-powered Wireless Sensor Networks (WSNs) are limited by the batteries equipped in sensors. The appearance of Battery-free Wireless Sensor Networks (BF-WSNs) breaks through this limitation, in which battery-free sensors harvest ...

research-article
A Prospect Theoretic Approach for Trust Management in IoT Networks Under Manipulation Attacks
Article No.: 26, Pages 1–26https://doi.org/10.1145/3392058

As Internet of Things (IoT) and Cyber-Physical systems become more ubiquitous in our daily lives, it necessitates the capability to measure the trustworthiness of the aggregate data from such systems to make fair decisions. However, the interpretation ...

research-article
iSleep: A Smartphone System for Unobtrusive Sleep Quality Monitoring
Article No.: 27, Pages 1–32https://doi.org/10.1145/3392049

The quality of sleep is an important factor in maintaining a healthy life style. A great deal of work has been done for designing sleep monitoring systems. However, most of existing solutions bring invasion to users more or less due to the exploration ...

research-article
Joint Modelling of Cyber Activities and Physical Context to Improve Prediction of Visitor Behaviors
Article No.: 28, Pages 1–25https://doi.org/10.1145/3393692

This article investigates the cyber-physical behavior of users in a large indoor shopping mall by leveraging anonymized (opt in) Wi-Fi association and browsing logs recorded by the mall operators. Our analysis shows that many users exhibit a high ...

research-article
SCANet: Sensor-based Continuous Authentication with Two-stream Convolutional Neural Networks
Article No.: 29, Pages 1–27https://doi.org/10.1145/3397179

Continuous authentication monitors the security of a system throughout the login session on mobile devices. In this article, we present SCANet, a two-stream convolutional neural network--based continuous authentication system that leverages the ...

research-article
Quality-aware Online Task Assignment in Mobile Crowdsourcing
Article No.: 30, Pages 1–21https://doi.org/10.1145/3397180

In recent years, mobile crowdsourcing has emerged as a powerful computation paradigm to harness human power to perform spatial tasks such as collecting real-time traffic information and checking product prices in a specific supermarket. A fundamental ...

Subjects

Comments