Dynamic Task Allocation for Mobile Edge Learning
This paper introduces the new paradigm of Mobile Edge Learning ”MEL” that enables the implementation of realistic distributed machine learning (DML) tasks on wireless edge nodes while taking into consideration the heterogeneous computing and ...
<italic>DeepContext:</italic> Mobile Context Modeling and Prediction via HMMs and Deep Learning
Mobile context determination is an important step for many context-aware services such as location-based services, enterprise policy enforcement, building/room occupancy detection for power/HVAC operation, etc. Especially in enterprise scenarios where ...
MobiCharger: Optimal Scheduling for Cooperative EV-to-EV Dynamic Wireless Charging
With the advancement of dynamic wireless charging for Electric Vehicles (EVs), Mobile Energy Disseminator (MED), which can charge an EV in motion, becomes available. However, existing wireless charging scheduling methods for wireless sensors, which are ...
Completion Time Minimization for UAV-Enabled Surveillance Over Multiple Restricted Regions
This work examines a UAV-enabled surveillance mission over multiple restricted regions and aims to determine the optimal UAV trajectory that minimizes the mission completion time. The UAV is prohibited from entering the restricted regions due to ...
Hybrid P4 Programmable Pipelines for 5G gNodeB and User Plane Functions
- Suneet Kumar Singh,
- Christian Esteve Rothenberg,
- Jonatan Langlet,
- Andreas Kassler,
- Péter Vörös,
- Sándor Laki,
- Gergely Pongrácz
This paper focuses on hybrid pipeline designs for User Plane Function and next-generation NodeB leveraging target-specific features and an insightful discussion of P4 and target challenges and limitations. The entire or disaggregated UPF runs on P4 ...
Budget-Feasible Mechanisms in Two-Sided Crowdsensing Markets: Truthfulness, Fairness, and Efficiency
In a crowdsensing platform, users are invited to provide data services, and multiple requesters compete for desired services. Due to users’ costs of providing services, it is critical to design incentive mechanisms to incentivize users with (...
Dynamic User-Scheduling and Power Allocation for SWIPT Aided Federated Learning: A Deep Learning Approach
Federated learning (FL) has been considered as a promising paradigm for enabling distributed machine learning (ML) in wireless networks. To address the limited energy capacity of wireless devices, we propose a simultaneous wireless information and power ...
Towards Robust WiFi Fingerprint-Based Vehicle Tracking in Dynamic Indoor Parking Environments: An Online Learning Framework
The variation of wireless signal in dynamic indoor parking environments may seriously compromise the performance of fingerprint-based localization methods. In this regard, this paper investigates the problem of robust WiFi fingerprint-based vehicle ...
Edge Assisted Mobile Semantic Visual SLAM
Localization and navigation play a key role in many location-based services and have attracted numerous research efforts. In recent years, visual SLAM has been prevailing for autonomous driving. However, the ever-growing computation resources demanded by ...
A Multicriteria-Based Forwarding Strategy for Interest Flooding Mitigation on Named Data Wireless Networking
In wireless networks, the Named Data Networking (NDN) architecture maximizes contents’ availability throughout multiple network paths based on multicast-based communication combined with stateful forwarding and caching in intermediate nodes. ...
Cross Layer MAC Protocol for a Peer Conscious Opportunistic Network Coded Cooperation System
This article presents a peer conscious opportunistic network coded cooperation (PC-O-NCC) system that exploits multi-user diversity (MUD) gain in a simple network coded cooperation (NCC) based network. It prioritizes sources with better channel conditions ...
Age-Optimal Scheduling Over Hybrid Channels
We consider the problem of minimizing the age of information when a source can transmit status updates over two heterogeneous channels. Our work is motivated by recent developments in 5 G mmWave technology, where transmissions may occur over an unreliable ...
Self-Supervised Association of Wi-Fi Probe Requests Under MAC Address Randomization
Wi-Fi-on devices such as smartphones search for network availability by periodically broadcasting probe requests which encapsulate MAC addresses as device identifiers. To protect identity privacy, modern devices embed random MAC addresses in probe frames, ...
Budget-Aware User Satisfaction Maximization on Service Provisioning in Mobile Edge Computing
Mobile Edge Computing (MEC) promises to provide mobile users with delay-sensitive services at the edge of network, and each user service request usually is associated with a Service Function Chain (SFC) requirement that consists of Virtualized Network ...
<inline-formula><tex-math notation="LaTeX">$\mathtt {Radar}$</tex-math></inline-formula>: Adversarial Driving Style Representation Learning With Data Augmentation
Characterizing human driver's driving behaviors from global positioning system (GPS) trajectories is an important yet challenging trajectory mining task. Previous works heavily rely on high-quality GPS data to learn such driving style ...
Visible Light Integrated Positioning and Communication: A Multi-Task Federated Learning Framework
Recently, visible light positioning and visible light communication are becoming a promising technology for integrated sensing and communication. However, the isolated design of positioning and communication has limited the system efficiency and ...
GREEN: A Global Energy Efficiency Maximization Strategy for Multi-UAV Enabled Communication Systems
In the scenario of limited energy supply, unmanned aerial vehicles (UAVs) enabled communication systems must make efficient use of energy in order to provide long-term service. In this paper, we propose a global energy efficiency maximization (GREEN) ...
Optimal Pricing Design for Coordinated and Uncoordinated IoT Networks
An Internet of Things (IoT) system can include several different types of service providers, who sell IoT service, network service, and computation service to customers, either jointly or separately. A deep understanding of complicated coupling among ...
LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps
ARM TrustZone is widely deployed on commercial-off-the-shelf mobile devices for secure execution. However, many Apps cannot enjoy this feature because it brings many constraints to App developers. Previous works have been proposed to build a secure ...
Towards Impact of Chunk-Level Characteristics on Mobile Live Streaming Performance
Today, mobile live streaming is gaining a rapid growth in use, which refers to watching the media content recorded and broadcast in real time on mobile devices. In live streaming process, each video segment must go through recording, encoding, uploading, ...
Face-Based Authentication Using Computational Secure Sketch
Biometric features are quite suitable for identity authentication due to its inherent properties – universality, uniqueness and persistence. In fact, biometric authentication has been widely used in our daily life, especially in mobile devices. ...
InFit: Combination Movement Recognition for Intensive Fitness Assistant via Wi-Fi
Wi-Fi technology is becoming a promising enabler of device-free fitness tracking to provide reviews and recommendations for effective homely exercise. State-of-the-art Wi-Fi fitness assistants succeed in recognizing the simple meta-movements (e.g., Push-...
Distributed Estimation and Control for Jamming an Aerial Target With Multiple Agents
This work proposes a distributed estimation and control approach in which a team of aerial agents equipped with radio jamming devices collaborate in order to intercept and concurrently track-and-jam a malicious target, while at the same time minimizing ...
Admission Control and Scheduling of Isochronous Traffic With Guard Time in IEEE 802.11ad MAC
An upsurge of low latency and bandwidth hungry applications such as virtual reality, augmented reality and availability of unlicensed spectrum in the millimeter wave band at 60 GHz have led to standardization of the new generation WiFi systems such as ...
Learning From Images: Proactive Caching With Parallel Convolutional Neural Networks
With the continuous trend of data explosion, delivering packets from data servers to end users causes increased stress on both the fronthaul and backhaul traffic of mobile networks. To mitigate this problem, caching popular content closer to the end-users ...
mCore+: A Real-Time Design Achieving ∼ 500 μs Scheduling for 5G MU-MIMO Systems
Multi-User (MU)-MIMO technology plays a vital role in 5G NR. Under MU-MIMO transmission, multiple users can share the same time-frequency resources simultaneously. For 5G MU-MIMO systems, it is challenging to design a scheduler. The scheduler needs to ...
HearMe: Accurate and Real-Time Lip Reading Based on Commercial RFID Devices
- Shigeng Zhang,
- Zijing Ma,
- Kaixuan Lu,
- Xuan Liu,
- Jia Liu,
- Song Guo,
- Albert Y. Zomaya,
- Jian Zhang,
- Jianxin Wang
Lip reading can help people with speech disorders to communicate with others and provide them with a new channel to interact with the world. In this paper, we design and implement <italic>HearMe</italic>, an accurate and real-time lip-reading system built ...
Online Edge Computing Demand Response via Deadline-Aware V2G Discharging Auctions
Distributed edge computing systems that participate in emergency demand response (EDR) programs can adjust workload across heterogenous edges to reduce total energy consumption. Unfortunately, this approach may not always reduce sufficient energy as ...
A Large-Scale Measurement and Optimization of Mobile Live Streaming Services
Mobile Live Streaming (MLS) services are one of the most popular types of mobile apps. They involve a (often amateur) user broadcasting content to a potentially large online audience via unreliable networks. Nevertheless, we still lack a deep ...
<italic>RF-Ear</italic><inline-formula><tex-math notation="LaTeX">$^+$</tex-math></inline-formula>: A Mechanical Identification and Troubleshooting System Based on Contactless Vibration Sensing
Mechanical vibration monitoring plays a critical role in today's industrial Internet of Things (IoT) applications. Existing invasive solutions usually directly attach sensors to the target, which may affect the operations of delicate devices. Non-...