Categories

Mobile — 71
NSL — 19
NSL Project — 2

전달세미나 : 2016 PRML winter school

by Jinse Kwon on 2016-02-12 11:15:12

Date : 2016. 02. 15 (Mon) 3:00 P.M. Locate : EB5. 533 Presenter : Jinse Kwon Seminar Title : Reviews for 2016 Pattern Recognition and Machine Learning winter school Continue reading →

307 Views

Heart rate variability & 전달세미나: HCI Korea 2016

by Jinyoung Choi on 2016-01-21 18:00:13

Date : 2016. 02. 01 (Mon) 3:00 P.M. Locate : EB5. 533 Presenter : Jinyoung Choi   Title : Heart rate variablity & 전달세미나: HCI Korea 2016 Author : Marek Malik, J. Thomas Bigger, A. John Camm, Robert E. Kleiger, Alberto Malliani, Arthur J. Moss, Peter J. Schwartz   Abstract   The last two decades have witnessed the recognition of a significant relationship between the autonomic nervous system and cardiovascular mortality, including sudden cardiac death. Experimental evidence for an association between a propensity for lethal arrhythmias and signs of either increased sympathetic or reduced vagal activity has encouraged the development of quantitative markers of autonomic activity. Heart rate variability (HRV) represents one of the most promising such markers. The apparently easy derivation of this measure has opularized its use. ... Continue reading →

395 Views

전달 세미나: 2016 CES and ICCE, KSCI

by Jinyoung Choi on 2016-01-16 19:26:11

Date : 2016. 01. 18 (Mon) 3:00 P.M. Locate : EB5. 533 Presenter : Jemin Lee, Jinyoung Choi Seminar Title : Reviews for 2016 CES and ICCE, KSCI 2016   Continue reading →

474 Views

An Open Source Space Hypervisor For Small Satellites

by Juyeob Kim on 2016-01-04 14:43:14

Date : 2016. 1. 4 (Mon) 3:00 P.M. Locate : EB5. 533 Presenter : Jooyeob Kim   Title : An Open Source Space Hypervisor For Small Satellites Author : Andrew D. Santangelo   Abstract The QuickSAT/Xen using the ARLX extensions is a space hypervisor that will support the virtualization of satellite payloads, systems and software modules on a full range of small satellites including CubeSATs and MicroSATs. ARLX is a set of extensions implemented in version 4.3 of the open source Xen hypervisor utilizing robust automation tools to test and validate the security and related safety of this environment. ARLX implements the ARINC 653 partitioning standard, isolating applications running on the same platform and providing high levels of certified safety and security. QuickSAT™ with the open source stepSATdb data architecture is a satellite design, mission planning, and product lifecycle management framework and environment. It is currently in use on ... Continue reading →

520 Views

MarketNet: An Asymmetric Transmission Power-based Wireless System for ...

by Wonjun Hwang on 2015-12-10 15:33:32

Date : 2015. 12. 10 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Wonjun Hwang   Title : MarketNet: An Asymmetric Transmission Power-based Wireless System for Managing e-Price Tags in Markets Author : Hyung-Sin Kim, Hosoo Cho, Myung-Sup Lee, Jeongyeup Paek, JeongGil Ko, Saewoong Bahk Seoul National University, Chung-Ang University, Ajou Univerisity   Abstract Updating price tags in a large-scale market is a recurrent task, still performed manually in most markets. Given that human-errors can easily lead to customer complaints and accounting inaccuracies, the ability to autonomously reconfigure price tags can be of significant benefit. With the introduction of low-power display techniques such as electronic ink, applications of enabling electronic, wirelessly reconfigurable price tags show potential for future deployment. In this work, we examine networking architectures that can be applied in such scenarios. ... Continue reading →

442 Views

ALPS: A Bluetooth and Ultrasound Platform for Mapping and Localization

by Jinse Kwon on 2015-12-03 11:56:42

Date : 2015. 12. 03 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : ALPS: A Bluetooth and Ultrasound Platform for Mapping and Localization Author : Patrick Lazik, Niranjini Rajagopal, Oliver Shih, Bruno Sinopoli, Anthony Rowe Carnegie Mellon University   Abstract   The proliferation of Bluetooth Low-Energy (BLE) chipsets on mobile devices has lead to a wide variety of userinstallable tags and beacons designed for location-aware applications. In this paper, we present the Acoustic Location Processing System (ALPS), a platform that augments BLE transmitters with ultrasound in a manner that improves ranging accuracy and can help users configure indoor localization systems with minimal effort. A user places three or more beacons in an environment and then walks through a calibration sequence with their mobile device where they touch key points in the environment ... Continue reading →

473 Views

Designing Content-driven Intelligent Notification Mechanisms for Mobile Applications

by Jemin Lee on 2015-11-26 21:21:36

Date : 2015. 11. 30. (Mon.) 10:00 A.M. Locate : EB5. 533 Presenter : Jemin Lee   Title: Designing Content-driven Intelligent Notification Mechanisms for Mobile Applications Author: Abhinav Mehrotra, Mirco Musolesi, Robert Hendley, Veljko Pejovic Abstract An increasing number of notifications demanding the smartphone user's attention, often arrive at an inappropriate moment, or carry irrelevant content. In this paper we present a study of mobile user interruptibility with respect to notification content, its sender, and the context in which a notification is received. In a real-world study we collect around 70,000 instances of notifications from 35 users. We group notifications according to the applications that initiated them, and the social relationship between the sender and the receiver. Then, by considering both content and context information, such as the current activity of a user, we discuss the design of classifiers for learning ... Continue reading →

372 Views

InterruptMe: Designing Intelligent Prompting Mechanisms for Pervasive Applications

by Jinyoung Choi on 2015-11-16 16:07:36

Date : 2015. 11. 23. (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinyoung Choi   Title : InterruptMe: Designing Intelligent Prompting Mechanisms for Pervasive Applications Author : Veljko Pejovic  University of Birmingham, United Kingdom   Abstract   The mobile phone represents a unique platform for interactive applications that can harness the opportunity of an immediate contact with a user in order to increase the impact of the delivered information. However, this accessibility does not necessarily translate to reachability, as recipients might refuse an initiated contact or disfavor a message that comes in an inappropriate moment. In this paper we seek to answer whether, and how, suitable moments for interruption can be identified and utilized in a mobile system. We gather and analyze a real-world smartphone data trace and show that users’ broader context, including their activity, location, time of day, emotions and ... Continue reading →

367 Views

Optimising Hot Paths in a Dynamic Binary Translator.

by Juyeob Kim on 2015-10-19 11:07:06

Date : 2015. 10. 26 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jooyeob Kim   Title : Optimising Hot Paths in a Dynamic Binary Translator. Author : David Ung , Cristina Cifuentes   Abstract   In dynamic binary translation, code is translated "on the fly" at run-time, while the user perceives ordinary execution of the program on the target machine. Code fragments that are frequently executed follow the same sequence of flow control over a period of time. These fragments form a hot path and are optimised to improve the overall performance of the program. Multiple hot paths may also exist in programs. A program may choose to execute in one hot path for some time, but later switch to another hot path, or even cycle between hot paths. Hence, each hot path is able to capture the most frequent execution pattern for a particular run-time stage of the program. The end result is that scattered code is collectec~ merged and optimised in a ... Continue reading →

387 Views

Non-obstructive Room-level Locating System in Home Environments ...

by Jinse Kwon on 2015-10-12 07:00:40

Date : 2015. 10. 12 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : Non-obstructive Room-level Locating System in Home Environments using Activity Fingerprints from Smartwatch Author : Lee Seungwoo   Abstract   Many smart home applications, such as monitoring for the elderly and home automation, require location information for individual occupants. Several techniques have been proposed for tracking occupants in a home environment. However, the current techniques do not provide a seamless in-home locating system owing to the occupants’ devicefree movement and the lack of cost-effective infrastructure for home location tracking. In this paper, we propose a home occupant tracking system that uses a smartphone and an off-the-shelf smartwatch without additional infrastructure. In our system, activity fingerprints are automatically generated from the microphone and the inertial sensors of the smartwatch, and ... Continue reading →

445 Views

[13:00 5, Oct] Analyzing real time performance of embedded system

by Hyungshin Kim on 2015-10-05 09:58:40

Kyungho will give a talk on how to monitor real time performance of embedded system. This is the talk from the ESC 2015, Silicon Valley. Continue reading →

356 Views

Generalized Just-In-Time Trace Compilation using a Parallel Task Farm in a Dynamic Binary Translator

by Wonjun Hwang on 2015-09-20 14:40:52

Date : 2015. 09. 21. (Monday) 10:00 A.M. Locate : EB5. 533 Presenter : Wonjun Hwang Title : Generalized Just-In-Time Trace Compilation using a Parallel Task Farm in a Dynamic Binary Translator   Author : Igor Böhm Tobias J.K. Edler von Koch Stephen Kyle Björn Franke Nigel Topham Abstract Dynamic Binary Translation (DBT) is the key technology behind cross-platform virtualization and allows software compiled for one Instruction Set Architecture (ISA) to be executed on a processor supporting a different ISA. Under the hood, DBT is typically implemented using Just-In-Time (JIT) compilation of frequently executed program regions, also called traces. The main challenge is translating frequently executed program regions as fast as possible into highly efficient native code. As time for JIT compilation adds to the overall execution time, the JIT compiler is often decoupled and operates in a separate thread independent from the main simulation ... Continue reading →

508 Views

Step-by-Step Detection of Personally Collocated Mobile Devices

by Jemin Lee on 2015-08-27 15:59:36

Date : 2015. 08. 28. (Friday) 10:30 A.M. Locate : EB5. 533 Presenter : Jemin Lee  Title : Step-by-Step Detection of Personally Collocated Mobile Devices   Author : A. Srivastava, J. Gummeson, M. Baker, and K.-H. Kim Abstract Many people now carry multiple mobile devices on a daily basis. Wearables, smartphones, tablets, and laptops all have their different advantages, but collectively they can increase a user’s device management burden. Management problems include leaving a device behind accidentally, receiving notifications on the wrong device, and failing to secure all of the devices as needed. Reducing this burden requires detecting which of a user’s devices are “personally collocated” – those devices he currently wears, carries, or has under his immediate physical control. We present a lightweight method to detect personal collocation by comparing accelerometer-based footstep ... Continue reading →

452 Views

lprof: A Non-intrusive Request Flow Profiler for Distributed Systems

by Jinyoung Choi on 2015-08-24 00:00:00

* 동영상 강의로 진행됩니다. (총 2편) Date: 2015. 08. 25. (Tue) 10:30 A.M. Locate: EB5. 533 Continue reading →

517 Views

ScreenPass: secure password entry on touchscreen devices

by Jinyoung Choi on 2015-08-17 10:57:29

Date : 2015. 08. 18. (Tue) 10:30 A.M. Locate : EB5. 533 Presenter : Jinyoung Choi   Title : ScreenPass: secure password entry on touchscreen devices Author : Dongtao Liu, Eduardo Cuervo, Valentin Pisto, Ryan Scudellari, Landon P. Cox    Abstract   Users routinely access cloud services through third-party apps on smartphones by giving apps login credentials (i.e., a username and password). Unfortunately, users have no assurance that their apps will properly handle this sensitive information. In this paper, we describe the design and implementation of ScreenPass, which significantly improves the security of passwords on touchscreen devices. ScreenPass secures passwords by ensuring that they are entered securely, and uses taint-tracking to monitor where apps send password data. The primary technical challenge addressed by ScreenPass is guaranteeing that trusted code is always aware of when a user is entering a password. ScreenPass ... Continue reading →

406 Views