Browsing by Subject "Telecommunications"
Now showing items 1-20 of 254
-
Adaptation in a Channel Access Game with Private Monitoring
(2013)Under the opportunistic spectrum access paradigm, the shared pool of spectrum bands that the multiple autonomous cognitive radios (CRs) need to compete for is not necessarily homogeneous. The non-homogeneity in channels ... -
Addressing Human Factors and Ethics in the Design of Future Work and Intelligent Systems for Use in Financial Services - Person Centered Operations, Intelligent Work & the Triple Bottom Line.
(Springer, 2021)New technologies are being introduced to support the future of work in Financial Services. Such technologies should enable work that is smart, healthy, and ethical. This paper presents an innovative and blended methodology ... -
Ambient Data Monitoring w/Generative Music Systems using EC & ML Techniques.
(2018)This is a position paper which describes work in progress to develop an AI/ML driven auditory ambient information system which incorporates generative music techniques and considers some of the factors involved the design ... -
An Analysis of Competition among Autonomous Devices in Multichannel Cognitive Radio Networks
(2012)We investigate an autonomous opportunistic spec- trum access (OSA) strategy for a multichannel cognitive radio (CR) network, where two or more autonomous CRs sense the channels sequentially in some sensing order to find ... -
Analyzing Distributed Deep Neural Network Deployment on Edge and Cloud Nodes in IoT Systems
(IEEE, 2020)For the efficient execution of Deep Neural Networks (DNN) in the Internet of Things, computation tasks can be distributed and deployed on edge nodes. In contrast to deploying all computation to the cloud, the ... -
Angle of Arrival Estimation Via Small IoT Devices: Miniaturized Arrays vs MIMO Antennas
(2022)This tutorial discusses the problem of Angle-of-Arrival (AoA) estimation from small Internet of Things (IoT) devices. It reviews the limitations and challenges of existing miniaturization strategies, which involve classical ... -
Anonymous FreeSpeech
(2014)In public and private discourse, some may be heard to express disquiet about the supposed dangers of anonymity. Anonymous suggestion boxes may be classed with anonymous accusation of crime with the accusation forming the ... -
Applying Blockchain Layer2 Technology to Mass E-Commerce
(International Association for Cryptologic Research, 2020)The emergence of e-commerce has changed the way people trade. However, merchants are charged high fees for their use of the platform and for payment services. These costs are passed on to customers in the form of higher ... -
AR cinema: Visual storytelling and embodied experiences with augmented reality filters and backgrounds
(2023)Through the simultaneous presence of graphically composed and materially existing elements, augmented reality (AR) offers ephemeral digital content that is the result of the momentary and, thus, unrepeatable alignment of ... -
Artificial Intelligence for Dynamical Systems in Wireless Communications: Modeling for the Future
(2021)Dynamical systems are no strangers in wireless communications. Our story will necessarily involve chaos, but not in the terms secure chaotic communications have introduced it: we will look for the chaos, complexity and ... -
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
(Springer-Verlag, 2016) -
Automatic Discovery and Geotagging of Objects from Street View Imagery
(2018)Many applications, such as autonomous navigation, urban planning, and asset monitoring, rely on the availability of accurate information about objects and their geolocations. In this paper, we propose the automatic detection ... -
Below Cross-Layer: An Alternative Approach to Service Discovery for MANETs
(2012)Service discovery protocols for mobile ad hoc networks at- tempt to overcome the inability to locate resources presented by networks in which prior knowledge of node identity and capability is not available. Existing ... -
Benchmarking Knowledge-based Context Delivery System
(2006)As context-aware systems become more widespread and mobile there is an increasing need for a common distributed event platform for gathering context information and delivering to context-aware applications. The likely ... -
Beyond the Role Model: Organisational modelling in policy based management systems
(2003)In this paper, we discuss recent developments in the field of Policy Based Management (PBM) and Role Based Access Control (RBAC).We postulate that PBM tends towards a total description of an organisation?s operations. We ...