Edge Computing and IoT: Systems, Management and Security
First EAI International Conference, ICECI 2020, Virtual Event, November 6, 2020, Proceedings
Article
One of the impacts of the COVID pandemic has been to force people to find alternates sources for daily supplies, turning to online to offline (O2O) platforms. The service quality of the O2O platform naturally ...
Article
Unmanned aerial vehicles (UAV) have been widely used in various fields because of their high mobility and portability. At the same time, due to the rapid development of artificial intelligence, people’s demand...
Article
Book and Conference Proceedings
First EAI International Conference, ICECI 2020, Virtual Event, November 6, 2020, Proceedings
Article
Book and Conference Proceedings
15th EAI International Conference, QShine 2019, Shenzhen, China, November 22–23, 2019, Proceedings
Article
Fog computing has been recently proposed to move certain cloud computing services down to edge networks especially for mobile applications, aiming at improving the throughput and delay through the collaboratio...
Chapter and Conference Paper
Content-aware image retargeting can preserve the quality of visually important objects during image resizing. However, some previous approaches fail to provide desired results as the sizes of the important obj...
Chapter and Conference Paper
With its continuous development, location information acquisition technology is able to collect more and more trajectory data, and the rich information contained therein is gradually attracting attention from ...
Chapter and Conference Paper
Traffic flow often contains massive amounts of information that is related to location and shows some regularity. And the traffic flow analysis based on trajectory data has become one of the most popular resea...
Article
Barrier coverage constructs a sensing barrier for detecting intruders crossing a belt region. Recent studies mostly focus on efficient algorithms to guarantee barrier coverage, with little consideration on the...
Article
Today, the media content delivery in intermittent connected networks has become increasingly critical. This paper studies content exchange among mobile commuters in urban transport systems. Our work is inspire...
Article
Video streaming has become one of the most popular networked applications and, with the increased bandwidth and computation power of mobile devices, anywhere and anytime streaming has become a reality. Unfortu...
Article
Being deployed in narrow but long area, strip wireless sensor networks (SWSNs) have drawn much attention in applications such as coal mines, pipeline and structure monitoring. One of typical characteristics of...
Article
In sensor networks community, the skeleton (or medial axis), as an important infrastructure which can correctly capture the topological and geometrical features of the underlying network, has been widely used...
Article
YouTube-like video sharing sites (VSSes) have gained increasing popularity in recent years. Meanwhile, Face-book-like online social networks (OSNs) have seen their tremendous success in connecting people of co...
Article
Wireless sensor networks (WSNs) have been increasingly available for monitoring the traffic, weather, pollution, etc. Outlier detection in WSNs is an essential step for many important applications, such as abn...
Article
Energy efficient broadcast is indispensable for many applications in wireless ad hoc networks. It has been proved that network coding has great potential to improve performance in terms of energy consumption i...
Article
Wireless sensor networks (WSNs), often composed of a large number of sensor nodes with limited power, have been widely used for environmental monitoring and battlefield surveillance. A basic operation in such ...
Book and Conference Proceedings
9th International Conference, MobiQuitous 2012, Bei**g, China, December 12-14, 2012. Revised Selected Papers