This paper demonstrates a new technology that can infer a person's emotions from RF signals reflected off his body. EQ-Radio transmits an RF signal and analyzes its reflections off a person's body to recognize...
详细信息
ISBN:
(纸本)9781450342261
This paper demonstrates a new technology that can infer a person's emotions from RF signals reflected off his body. EQ-Radio transmits an RF signal and analyzes its reflections off a person's body to recognize his emotional state (happy, sad, etc.). The key enabler underlying EQ-Radio is a new algorithm for extracting the individual heartbeats from the wireless signal at an accuracy comparable to on-body ECG monitors. The resulting beats are then used to compute emotion-dependent features which feed a machine-learning emotion classifier. We describe the design and implementation of EQ-Radio, and demonstrate through a user study that its emotion recognition accuracy is on par with state-of-the-art emotion recognition systems that require a person to be hooked to an ECG monitor.
The middleware technology used as the foundation of Internet-enabled enterprise systems is becoming increasingly complex. In addition, the various technologies offer a number of standard architectures that can be used...
详细信息
ISBN:
(纸本)0769515886
The middleware technology used as the foundation of Internet-enabled enterprise systems is becoming increasingly complex. In addition, the various technologies offer a number of standard architectures that can be used by designers as templates to build applications. However, there is little concrete understanding in the soft-ware industry on the strengths and weaknesses of competing technologies, and the different trade-offs that various component architectures impose. The SACT Group at CSIRO has qualitatively and quantitatively evaluated a number of commercially available Message-Oriented Middleware (MOM) systems. This paper focuses on the results obtained from the performance evaluation of the IBM's MQSeries V5.2. It presents an overview of the technology, and discusses the metric used in this study for performance measurement The test results related to the sustainable performance of the system using various test configurations are described and their implications discussed.
With the increasing development of cloud computing, how to securely outsource prohibitively expensive computation to unfaithful clouds has caught more and more attention. Large-scale systems of linear matrix equations...
详细信息
ISBN:
(纸本)9781509044573
With the increasing development of cloud computing, how to securely outsource prohibitively expensive computation to unfaithful clouds has caught more and more attention. Large-scale systems of linear matrix equations (LME) are commonly deployed in scientific and engineering fields, which is a computationally complex task. Thus, it is necessary to design a protocol for practically outsourcing large-scale systems of LME to a malicious cloud. For this purpose, we propose a protocol called OutLME in this paper. In OutLME, we adopt a special permutation technique for the client to transform the original linear matrix equation into a randomized one and decrypt the result returned from cloud into the right one of original problem. As to robust cheating resistance, we propose an effective verification algorithm by utilizing the algebraic property of matrix-vector operations. In addition, both the chosen permutation technique and result verification mechanism incur close-to-zero additional cost on both the cloud and the client, so our proposed protocol is efficient. In the end, the theoretical analysis and the experimental evaluation are provided to demonstrate the validity of OutLME.
This paper addresses the fundamental tradeoffs in event systems between scalability (of event filtering, routing, and delivery mechanisms), expressiveness (when describing interests in events), and event safety (ensur...
详细信息
ISBN:
(纸本)0769515886
This paper addresses the fundamental tradeoffs in event systems between scalability (of event filtering, routing, and delivery mechanisms), expressiveness (when describing interests in events), and event safety (ensuring encapsulation and type-safe interaction with polymorphic events). We point out some ramifications underlying these tradeoffs and we propose a pragmatic approach to handle them. We achieve scalability using a multi-stage-filtering strategy that combines approximate and perfect matching techniques for the purpose of event routing and filtering. We achieve expressiveness and event safety by viewing events as objects, i.e., instances of application-defined abstract types.
A reliable multicast algorithm, called RMA, for mobile ad hoc networks is presented that is based on a new cost criterion, called link lifetime, for determining the optimal path between a pair of nodes. The algorithm ...
详细信息
ISBN:
(纸本)0769515851
A reliable multicast algorithm, called RMA, for mobile ad hoc networks is presented that is based on a new cost criterion, called link lifetime, for determining the optimal path between a pair of nodes. The algorithm has the characteristics of using an undirected graph for its routing operations rather than a fixed structure like a tree or a mesh. Previously proposed routing metrics for mobile ad hoc networks were designed for use in wired environments, where link stability is not a concern. We propose a new metric, called the lifetime, which is more appropriate for mobile ad hoc networks. The lifetime metric is dependent on the predicted future life of the link under consideration. We developed a simulator for the mobile ad hoc networks, which is portable and scalable to a large number of nodes. Using the simulator, we carried out a simulation study to analyze the effectiveness of the routing metrics and the performance of the proposed reliable multicast algorithm. The simulation results show that the lifetime metric helps achieve better performance in mobile ad hoc environments than the hop count metric.
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Sp...
详细信息
ISBN:
(纸本)0769515886
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Spaces" augmented with intelligence and enhanced with services. This new exciting computing paradigm promises to revolutionize the way we interact with computers, services, and the surrounding physical spaces, yielding higher productivity and more seamless interaction between users andcomputing services. However, the deployment of this computing paradigm in real-life is hindered by poor security, particularly, the lack of proper authentication and access Control techniques and privacy presenting protocols. We propose an authentication framework that addresses this problem through the use of different wearable and embedded devices. These devices authenticate entities with varied levels of confidence, in a transparent, convenient, and private manner, allowing the framework to blend nicely into ubiquitous computing environments.
The fifth ACM international workshop on cloud data management is held in San Francisco, California, USA on October 28, 2013 and co-located with the ACM 22ndconference on Information and Knowledge Management (CIKM). T...
详细信息
ISBN:
(纸本)9781450322638
The fifth ACM international workshop on cloud data management is held in San Francisco, California, USA on October 28, 2013 and co-located with the ACM 22ndconference on Information and Knowledge Management (CIKM). The main objective of the workshop is to address the challenges of large scale data management based on the cloud computing infrastructure. The workshop brings together researchers and practitioners from cloud computing, distributed storage, query processing, parallel algorithms, data mining, and system analysis, all attendees share common research interests in maximizing performance, reducing cost of cloud data management and enlarging the scale of their endeavors. We have constructed an exciting program of four refereed papers and an invited keynote talk that will give participants a full dose of emerging research.
In recent years, with ubiquitous computing, the interconnection of MANET to Internet is getting more attention. Further, as use of multipath ad hoc routing protocols is favorable in many application, hybrid multipath ...
详细信息
ISBN:
(纸本)9781424442331
In recent years, with ubiquitous computing, the interconnection of MANET to Internet is getting more attention. Further, as use of multipath ad hoc routing protocols is favorable in many application, hybrid multipath MANET which is a MANET with multiple routes to the Internet, will also grow. Security issues in hybrid MANET however is still challenging task. This paper addresses security issues related to Internet connectivity and ad hoc routing. And we propose a secure framework for global connectivity for connected multipath MANET Security and performance analysis show that the proposed framework is effective.(1)
The advancement of personal devices such as PDAs and mobile phones become ubiquitous and their increasing computing capabilities allow users to perform tasks that used to be performed on workstations. However, we cann...
详细信息
ISBN:
(纸本)9781424442331
The advancement of personal devices such as PDAs and mobile phones become ubiquitous and their increasing computing capabilities allow users to perform tasks that used to be performed on workstations. However, we cannot expect to run all tasks on top of personal devices because of the limited resources. Application Offloading allow us to overcome this issue by porting part of an application to a nearby server or workstation with more capabilities. In this paper we present a new application offloading mechanism to perform offloading based on the execution history of applications, and adaptable to the current conditions of the environment and device. We record the consumed resources and the state of the device and surrogates, and we use that information to perform an adaptable offloading. We show that our scheme can prevent the overhead of profiling and also reduce the execution time of an application against pure runtime offloading.
This extended abstract outlines our research on quantum and emerging computing systems for next-generation wireless networks. The research aims to leverage quantum and quantum-inspired computation to expedite baseband...
详细信息
ISBN:
(纸本)9798400705816
This extended abstract outlines our research on quantum and emerging computing systems for next-generation wireless networks. The research aims to leverage quantum and quantum-inspired computation to expedite baseband processing at base stations. We introduce our system design directions and prototype systems that are implemented on analog quantum processors. The prototypes are designed for quantum-accelerated near-optimal multi-user detection processing in MIMO systems that could drastically increase wireless performance for tomorrow's NextG cellular networking standards, as well as in NextG wireless local area networks (LAN).
暂无评论