By Topic

IEEE Journal on Selected Areas in Communications

Issue 5 • May 2017

Filter Results

Displaying Results 1 - 22 of 22
  • Table of contents

    Publication Year: 2017, Page(s):C1 - C4
    Request permission for commercial reuse | PDF file iconPDF (390 KB)
    Freely Available from IEEE
  • IEEE Journal on Selected Areas in Communications

    Publication Year: 2017, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • CAS: Context-Aware Background Application Scheduling in Interactive Mobile Systems

    Publication Year: 2017, Page(s):1013 - 1029
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7733 KB) | HTML iconHTML

    Each individual’s usage behavior on mobile devices depends on a variety of factors, such as time, location, and previous actions. Hence, context-awareness provides great opportunities to make the networking and computing capabilities of mobile systems more personalized and more efficient in managing their resources. To this end, we first reveal new findings from our own Android user experim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Small Cell Transmit Power Assignment Based on Correlated Bandit Learning

    Publication Year: 2017, Page(s):1030 - 1045
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2169 KB) | HTML iconHTML

    Judiciously setting the base station transmit power that matches its deployment environment is a key problem in ultra-dense networks and heterogeneous in-building cellular deployments. A unique characteristic of this problem is the tradeoff between sufficient indoor coverage and limited outdoor leakage, which has to be met without explicit knowledge of the environment. In this paper, we address th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Caching in the Sky: Proactive Deployment of Cache-Enabled Unmanned Aerial Vehicles for Optimized Quality-of-Experience

    Publication Year: 2017, Page(s):1046 - 1061
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2532 KB) | HTML iconHTML

    In this paper, the problem of proactive deployment of cache-enabled unmanned aerial vehicles (UAVs) for optimizing the quality-of-experience (QoE) of wireless devices in a cloud radio access network is studied. In the considered model, the network can leverage human-centric information, such as users’ visited locations, requested contents, gender, job, and device type to predict the content... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Prediction to Action: Improving User Experience With Data-Driven Resource Allocation

    Publication Year: 2017, Page(s):1062 - 1075
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1626 KB) | HTML iconHTML

    Driven by the desire for a better user experience and enabled by improved data storage and processing, much of the recent work has studied user experience prediction in cellular networks. In this paper, moving beyond the prediction-only approach, we propose a data-driven resource allocation framework that uses data-generated prediction models to explicitly guide resource allocation for user experi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Performance of Edge Content Caching for Mobile Video Streaming

    Publication Year: 2017, Page(s):1076 - 1089
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3078 KB) | HTML iconHTML

    Today’s Internet has witnessed an increase in the popularity of mobile video streaming, which is expected to exceed 3/4 of the global mobile data traffic by 2019. To satisfy the considerable amount of mobile video requests, video service providers have been pushing their content delivery infrastructure to edge networks—from regional content delivery network (CDN) servers to peer CDN ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • R-TTWD: Robust Device-Free Through-The-Wall Detection of Moving Human With WiFi

    Publication Year: 2017, Page(s):1090 - 1103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2312 KB) | HTML iconHTML

    Due to rapid developments of smart devices and mobile applications, there is an urgent need for a new human-in-the-loop architecture with better system efficiency and user experience. Compared with conventional device-based human–computer interactive (HCI) methods, device-free technology with WiFi provides a new HCI method and is promising for providing better user-perceived quality-of-expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stride-in-the-Loop Relative Positioning Between Users and Dummy Acoustic Speakers

    Publication Year: 2017, Page(s):1104 - 1117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2871 KB) | HTML iconHTML

    We propose and implement a novel positioning system, WalkieLokie, which directly calculates the relative position from a smart device to a target. The requirement of the target is simple: it is attached with a “dummy” acoustic speaker, which does not have any other rich capabilities, such as audio recording, communication, or computation. Hence, the proliferation of smart devices, to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Device-Free Human Activity Recognition Using Commercial WiFi Devices

    Publication Year: 2017, Page(s):1118 - 1131
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2770 KB) | HTML iconHTML

    Since human bodies are good reflectors of wireless signals, human activities can be recognized by monitoring changes in WiFi signals. However, existing WiFi-based human activity recognition systems do not build models that can quantify the correlation between WiFi signal dynamics and human activities. In this paper, we propose a Channel State Information (CSI)-based human Activity Recognition and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pervasive Floorplan Generation Based on Only Inertial Sensing: Feasibility, Design, and Implementation

    Publication Year: 2017, Page(s):1132 - 1140
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1912 KB) | HTML iconHTML

    Mobile crowdsourcing is deemed as a powerful technique to solve traditional problems. But the crowdsourced data from smartphones are generally low quality, which can induce crucial challenges and hurt the applicability of crowdsourcing applications. This paper presents our study to address such challenges in a concrete application, namely, floorplan generation. Existing proposals mostly rely on in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-to-Peer Indoor Navigation Using Smartphones

    Publication Year: 2017, Page(s):1141 - 1153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3747 KB) | HTML iconHTML

    Most of existing indoor navigation systems work in a client/server manner, which needs to deploy comprehensive localization services together with precise indoor maps a prior. In this paper, we design and realize a peer-to-peer navigation system (ppNav), on smartphones, which enables the fast-to-deploy navigation services, avoiding the requirements of pre-deployed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Martian: Message Broadcast via LED Lights to Heterogeneous Smartphones

    Publication Year: 2017, Page(s):1154 - 1162
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2275 KB) | HTML iconHTML

    Visible light communication (VLC) has been shown to have several advantages over traditional wireless communication. In this paper, we envision an LED-light-to-smartphone VLC protocol for delivering messages to a group of randomly arriving smartphone receivers. Our goal is to increase the throughput for large message delivery, as well as to reduce the delay of message broadcast. Key challenges for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Device-Free Counting via Wideband Signals

    Publication Year: 2017, Page(s):1163 - 1174
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1466 KB) | HTML iconHTML

    Counting people and things (targets) in a monitored area, also known as crowd-counting, enables several applications in diverse scenarios, including smart building, intelligent transportation, and public safety. In many scenarios, device-free systems relying on the signal backscattering from targets are preferred to device-based systems relying on the communication with the targets via dedicated o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognizing Keystrokes Using WiFi Devices

    Publication Year: 2017, Page(s):1175 - 1190
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2722 KB) | HTML iconHTML

    Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE JSAC Special Issue on Physical Layer Security for 5G Wireless

    Publication Year: 2017, Page(s): 1191
    Request permission for commercial reuse | PDF file iconPDF (911 KB)
    Freely Available from IEEE
  • Information for Authors

    Publication Year: 2017, Page(s): 1192
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • IEEE Open Access Publishing

    Publication Year: 2017, Page(s): 1193
    Request permission for commercial reuse | PDF file iconPDF (1328 KB)
    Freely Available from IEEE
  • Introducing IEEE Collabratec

    Publication Year: 2017, Page(s): 1194
    Request permission for commercial reuse | PDF file iconPDF (700 KB)
    Freely Available from IEEE
  • Member Get-A-Member (MGM) Program

    Publication Year: 2017, Page(s): 1195
    Request permission for commercial reuse | PDF file iconPDF (3463 KB)
    Freely Available from IEEE
  • Learning Has No Boundaries

    Publication Year: 2017, Page(s): 1196
    Request permission for commercial reuse | PDF file iconPDF (691 KB)
    Freely Available from IEEE
  • IEEE Communications Society Information

    Publication Year: 2017, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Journal on Selected Areas in Communications focuses on all telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Muriel Médard
MIT