Categories

Mobile — 64
NSL — 19
NSL Project — 2

Presentation rehearsal for IEMEK conf' 2016

by Jinse Kwon on 2016-10-30 22:51:11

Date : 2016. 10. 31 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : A Disaster Warning System Using Ultrasound Modulation and Bluetooth Ad-hoc Network Author : Jinse Kwon, Jemin Lee, Hyungshin Kim   Abstract : A warning system is important to protect people and property from a disaster. Current disaster warning system could easily be collapsed by a disaster because it strongly depends on cell towers for mobile communication. In this paper, we present the ad hoc network to easily and rapidly update the disaster information using the ultrasound modulation and Bluetooth advertising mode in the communication failure state. Our system shows that a smartphone can detect modulation packets up to 720bit/s with bit-error-rate lower than 10-3. In addition, the Bluetooth ad hoc network in an advertising mode reduces the round trip delay between nodes and battery loss by adjusting the advertising period. Proceeding ... Continue reading →

239 Views

Learning sound location from a single microphone

by Do Trung Hai on 2016-10-27 11:07:44

Date : 2016. 11. 14 (Mon) 10:00 A.M. Location: EB5. 533 Presenter: Do Trung Hai   Seminar Title: Learning sound location from a single microphone Author: Ashutosh Saxena; Andrew Y. Ng  (Computer Science Department, Stanford University, CA 94305, USA) Abstract: We consider the problem of estimating the incident angle of a sound, using only a single microphone. The ability to perform monaural (single-ear) localization is important to many animals; indeed, monaural cues are also the primary method by which humans decide if a sound comes from the front or back, as well as estimate its elevation. Such monaural localization is made possible by the structure of the pinna (outer ear), which modifies sound in a way that is dependent on its incident angle. In this paper, we propose a machine learning approach to monaural localization, using only a single microphone and an “artificial pinna” (that distorts sound in a direction-dependent way). Our ... Continue reading →

217 Views

dOSEK: The Design and Implementation of a Dependability-Oriented Static Embedded Kernel

by SiHyeong Park on 2016-10-17 20:30:38

Date: 2016.11.24(Mon) 10:00 A.M. Locate: EB5. 533 Presenter: Sihyeong Park Title: dOSEK: The Design and Implementation of a Dependability-Oriented Static Embedded Kernel Author: Martin Hoffmann, Florian Lukas, Christian Dietrich, Daniel Lohmann Abstract: Because of shrinking structure sizes and operating voltages, computing hardware exhibits an increasing susceptibility against transient hardware faults: Issues previously only known from avionics systems, such as bit flips caused by cosmic radiation, nowadays also affect automotive and other cost-sensitive “ground-level” control systems. For such cost-sensitive systems, many software-based measures have been suggested to harden applications against transient effects. However, all these measures assume that the underlying operating system works reliably in all cases. We present software-based concepts for constructing an operating system ... Continue reading →

225 Views

An RF doormat for tracking people's room locations

by Jinse Kwon on 2016-10-16 19:41:39

Date : 2016. 10. 16 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : An RF doormat for tracking people's room locations Author : Juhi Ranjan,Yu Yao, Kamin Whitehouse (University of Virginia, Charlottesville, VA, USA)   Abstract : Many occupant-oriented smarthome applications such as automated lighting, heating and cooling, and activity recognition need room location information of residents within a building. Surveillance based tracking systems used to track people in commercial buildings, are privacy invasive in homes. In this paper, we present the RF Doormat - a RF threshold system that can accurately track people's room locations by monitoring their movement through the doorways in the home. We also present a set of guidelines and a visualization to easily and rapidly setup the RF-Doormat system on any doorway. To evaluate our system, we perform 580 doorway crossings across 11 different doorways in a home. ... Continue reading →

185 Views

Presentation rehearsal for Smarttention 2016

by Jemin Lee on 2016-08-30 16:26:18

Date : 2016. 08. 31 (Wed) 10:00 A.M. Locate: EB5. 533 Presenter: Jemin Lee Seminar Title: Presentation Rehearsal for Smarttention 2016 I am planning to do a presentation with regard to my work, entitled "Reducing Distraction of Smartwatch Users with Deep Learning" in upcoming workshop. For preperation, the rehearsal will be tomorrow. For more inforamtion, vist http://mhci16.smarttention.com/#program         Continue reading →

227 Views

전달 세미나 : RTCSA 2016

by Seula Hwang on 2016-08-23 20:13:41

Date : 2016. 08. 24 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Hwang Seula Seminar Title : Reviews for IWCPS 2016 and RTCSA 2016 Continue reading →

239 Views

Beetle: Flexible Communication for Bluetooth Low Energy

by Jinse Kwon on 2016-08-08 10:39:27

Date : 2016. 08. 10 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : Beetle: Flexible Communication for Bluetooth Low Energy Author : Amit Levy, James Hong, Laurynas Riliskis, Philip Levis, Keith Winstein   Abstract : The next generation of computing peripherals will be low power ubiquitous computing devices such as door locks, smart watches, and heart rate monitors. Bluetooth Low Energy is a primary protocol for connecting such peripherals to mobile and gateway devices. Current operating system support for Bluetooth Low Energy forces peripherals into vertical application silos. As a result, simple, intuitive applications such as opening a door with a smart watch or simultaneously logging and viewing heart rate data are impossible. We present Beetle, a new hardware interface that virtualizes peripherals at the application layer, allowing safe access by multiple programs without ... Continue reading →

277 Views

Understanding the Characteristics of AndroidWear OS

by Jemin Lee on 2016-08-01 17:29:16

Date : 2016. 08. 03. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: jemin lee   Title: Understanding the Characteristics of AndroidWear OS Author: Renju Liu and Felix Xiaozhu Lin Abstract  Interactive wearable devices bring dramatic changes to apps and hardware, leaving operating system (OS) design in the mist. To this end, we thoroughly examine the execution efficiency of Android Wear, a popular wearable OS. By running a suite of fifteen bench marks, we profile four system aspects: CPU usage, idle episodes, thread-level parallelism, and microarchitectural behaviors. We present the discovered inefficiencies and their root causes, together with a series of widespread, yet unknown OS design flaws. Towards designing future wearable OSes, our study has yielded a generic lesson, key insights, and specific action items.   Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services ... Continue reading →

276 Views

[Video] Surviving Peripheral Failures in Embedded Systems

by SiHyeong Park on 2016-07-25 19:02:29

Date: 2016. 07. 27. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: Sihyeong Park Title: Surviving Peripheral Failures in Embedded Systems Author: Rebecca Smith and Scott Rixner, Rice University Abstract:  Peripherals fail. Yet, modern embedded systems largely leave the burden of tolerating peripheral failures to the programmer. This paper presents Phoenix, a semi-automated peripheral recovery system for resource-constrained embedded systems. Phoenix introduces lightweight checkpointing mechanisms that transparently track both the internal program state and the external peripheral state. These mechanisms enable rollback to the precise point at which any failed peripheral access occurred using as little as 6 KB of memory, minimizing both recovery latency and memory utilization.   2015 USENIX Annual Technical Conference  https://www.usenix.org/conference/atc15/technical-session/presentation/smith Continue reading →

337 Views

[Video] Drowsy power management

by Jemin Lee on 2016-07-19 17:13:45

Date: 2016. 07. 20. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: jemin lee Title: Drowsy power management Author: Matthew Lentz, James Litton, Bobby Bhattacharjee   Abstract:  Portable computing devices have fast multi-core processors, large memories, and many on-board sensors and radio interfaces, but are often limited by their energy consumption. Traditional power management subsystems have been extended for smartphones and other portable devices, with the intention of maximizing the time that the devices are in a low-power "sleep" state. The approaches taken by these subsystems prove inefficient for many short-lived tasks common to portable devices, e.g., querying a sensor or polling a cloud service. We introduce Drowsy, a new power management state that replaces "awake." In the Drowsy state, not all system components are woken up, only the minimal set required for a pending task(s). Drowsy constructs and maintains the minimal task set by ... Continue reading →

259 Views

Comparison of HRV Parameters Derived from Photoplethysmography and Electrocardiography Signals

by Jinyoung Choi on 2016-07-08 16:33:22

Date : 2016. 07. 13. (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Jinyoung Choi Title : Comparison of HRV Parameters Derived from Photoplethysmography and Electrocardiography Signals Author : Vala Jeyhani, Shadi Mahdiani, Mikko Peltokangas, Antti Vehkaoja   Abstract : Heart rate variability (HRV) has become a useful tool in analysis of cardiovascular system in both research and clinical fields. HRV has been also used in other applications such as stress level estimation in wearable devices. HRV is normally obtained from ECG as the time interval of two successive R waves. Recently PPG has been proposed as an alternative for ECG in HRV analysis to overcome some difficulties in measurement of ECG. In addition, PPG-HRV is also used in some commercial devices such as modern optical wrist-worn heart rate monitors. However, some  esearches have shown that PPG is not a surrogate for heart rate ... Continue reading →

299 Views

전달 세미나 : ATC 2016

by Wonjun Hwang on 2016-07-05 21:50:07

Date : 2016. 07. 6 (Wed) 10:00 P.M. Locate : EB5. 533 Presenter : Wonjun Hwang Seminar Title : Reviews for ATC 2016   Continue reading →

261 Views

Security Testing Methods and Techniques of Industrial Control Devices

by Sungyup Lee on 2016-06-13 14:00:46

Date : 2016. 07. 06(Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Sungyup Lee   Title : Security Testing Methods and Techniques of Industrial Control Devices Author : Wei Zhao, Feng Xie, Yong Peng, Yang Gao, Xuefeng Han, Haihui Gao, Dejin Wang   Abstract : “Stuxnet” event in 2010 causes the intense attention all over the world about information security problems of industrial control systems, how to assure the security of industrial control systems has become a hot topic both in the industry sectors and in academic community. In this paper, we focus on security testing of industrial control devices. We first review the existing security certifications in this area and analyze the features of these certifications. Then, we review and describe the existing security standards in this area. Furthermore, we review and compare the testing tools used for security testing of industrial control devices. Following this ... Continue reading →

279 Views

Security Crash Test - Practical Security Evaluations of Automotive Onboard IT Components

by Ikhee Shin on 2016-05-30 15:51:18

Date : 2016. 06. 01(Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Ikhee Shin   Title : Security Crash Test – Practical Security Evaluations of Automotive Onboard IT Components Author : Stephanie Bayer, Thomas Enderle, Dennis Kengo Oka*), Marko Wolf   Abstract : Modern vehicles consist of many interconnected, software-based IT components which are tested very carefully for correct functional behavior to avoid safety problems, e.g. that the brakes suddenly stop working. However, in contrast to safety testing systematic testing against potential security gaps is not yet a common procedure within the automotive domain. This however could eventually enable a malicious entity to be able to attack a safety-critical IT component or even the whole vehicle. Several real-world demonstrations have already shown that this risk is not only academic theory . Facing this challenge, the paper at hand first introduces some potential ... Continue reading →

397 Views

EchoTag: Accurate Infrastructure-Free Indoor Location Tagging with Smartphones

by Seula Hwang on 2016-05-16 17:09:28

Date : 2016. 05. 18 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Hwang Seula Title : EchoTag: Accurate Infrastructure-Free Indoor Location Tagging with Smartphones Author : Yu-Chih Tung and Kang G. Shin   Abstract : We propose a novel mobile system, called EchoTag, that enables phones to tag and remember indoor locations without requiring any additional sensors or pre-installed infrastructure. The main idea behind EchoTag is to actively generate acoustic signatures by transmitting a sound signal with a phone's speakers and sensing its reflections with the phone's microphones. This active sensing provides finer-grained control of the collected signatures than the widely-used passive sensing. For example, because the sensing signal is controlled by EchoTag, it can be intentionally chosen to enrich the sensed signatures and remove noises from useless reflections. Extensive experiments show that EchoTag distinguishes 11 tags at 1cm ... Continue reading →

321 Views