IEEE 2015

Context-driven, Prescription-Based Personal Activity Classification: Methodology, Architecture, and End-to-End Implementation

Enabling accurate and low-cost classification of a range of motion activities is of significant importance for wireless health through body worn inertial sensors and smartphones, due to the need by healthcare and fitness professonals to monitor exercises for quality and compliance. This paper proposes a novel contextual multi-armed bandits approach for large-scale activity classification. The […]

Context-based Access Control Systems for Mobile Devices

The smart space is an aggregation of devices, which can share their resources (information and services) and operate in coalitions. This nature of smart space enables of appearance of cyber conflicts between different smart space devices (or participants) which can have different goals and situation understanding but common information space for trusted cyber relationships. Therefore, […]

Collaborative Policy Administration in Online Social Networks

Collaborative Policy Administration is one of the efficient methods of policy administration in order to protect sensitive data loss. In Collaborative Policy Administration, a policy administrator can refer to other similar policies to set up their own policies to protect privacy and other sensitive information. In this work an Improved Collaborative Policy Administration is proposed […]

A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks

Video streaming is gaining popularity among mobile users. The latest mobile devices, such as smart phones and tablets, are equipped with multiple wireless network interfaces. How to efficiently and cost-effectively utilize multiple links to improve video streaming quality needs investigation. In order to maintain high video streaming quality while reducing the wireless service cost, in […]

Catch Me if You Can: Evaluating Android Anti-malware against Transformation Attacks

Mobile malware threats (e.g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile malware […]

Wearout Resilience in NoCs Through an Aging Aware Adaptive Routing Algorithm

Continuous technology scaling has made aging mechanisms, such as negative bias temperature instability and electromigration primary concerns in network-on-chip (NoC) designs. In this paper, we extensively analyze the effects of these aging mechanisms on NoC routers and links. We observe a critical need of a robust aging-aware routing algorithm that not only reduces power-performance overheads […]

Signature Driven Hierarchical Post-Manufacture Tuning of RF Systems for Performance and Power

Signature Driven Hierarchical Post-Manufacture Tuning of RF Systems for Performance and Power

Integration of RF circuits in deeply scaled CMOS technologies and severe process variation in those technology nodes result in poor manufacturing yield. A post-manufacture tuning approach for yield improvement of RF systems is developed in this paper that uses hierarchical behavioral models of the RF systems. The proposed method first determines module-level performances from the […]