A headache interface. My experience with the brain computer interface - from a complete failure to a moderate success.

Presumably a Brain Computer Interface may be used (among many other applications) for curing chronic headache. But BCIs are also good in giving you one. I tried out a consumer-grade electroencephalography set offering a C++ API. This meant lots of integration testing, many failures and moderate successes.

How to accidentally earn 5k $? Authorization bypass in Google Docs

What mistakes in architecture or implementation led to bug allowing you to bypass authentication in Google Docs app easily. I will show you a step-by-step case study how I found the bug in Google Forms. I will also share examples of similar bugs in other applications. You will learn how ...

Networking and Routing in Space Division Multiplexed Systems

Optical networks serve as the cornerstone of our connected society, enabling the information superhighway that delivers the Internet all across the globe. As the number of users and data services increase, the network technology and architecture must adapt for it to continue to efficiently and economically support the larger traffic ...

Interoperability Solution for IEEE 802.1X based Authentication unsupported Customer Premises Equipment

8021x based authentication enables node devices in network to perform AAA operation (Authentication, Authorization and Accounting). Authentication is made possible by a handshake mechanism between the node device and the CPE connected by means of a challenge of request and response exchange. The node device sends out a challenge request ...

Transmission of 30-GBd polarization-multiplexed probabilistically shaped 4096-QAM over 50.9-km SSMF

© 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement We demonstrate the transmission of a 30-GBd polarization-multiplexed probabilistically shaped 4096-ary quadrature amplitude modulation (QAM) signal over 50.9-km standard signal-mode fiber (SSMF), with a net single-carrier bit rate of 484.4 Gb/s carrying 16.1 information ...

Microservice Fingerprinting and Classification using Machine Learning

Application aware data centers promise various benefits for data center management in terms of resource provisioning, power estimation, network management and security protection. However, the emerging microservices make it challenging for data center operators to accurately identify what applications are run by tenants, due to the highly dynamic and heterogeneous ...

Estimation of groundwater storage from seismic data using deep learning

© 2019 European Association of Geoscientists & Engineers Convolutional neural networks can provide a potential framework to characterize groundwater storage from seismic data. Estimation of key components, such as the amount of groundwater stored in an aquifer and delineate water table level, from active-source seismic data are performed in this ...

Tiger: Wearable glasses for the 20-20-20 rule to alleviate computer vision syndrome

We propose Tiger, an eyewear system for helping users follow the 20-20-20 rule to alleviate the Computer Vision Syndrome symptoms. It monitors user's screen viewing activities and provides real-time feedback to help users follow the rule. For accurate screen viewing detection, we devise a light-weight multi-sensory fusion approach with three ...

Enhanced Resource Scheduling for Platooning in 5G V2X Systems

Vehicular platooning with short inter-vehicular distances promises to achieve better road traffic efficiency and high fuel savings. Manoeuvring and maintaining such Platoons is very challenging and requires mutual awareness and coordination between the vehicles through a highly reliable and low latency communication mechanism. Thus, cellular vehicle-to-vehicle communication is a key ...

Nicotine dependence among adolescents in the European Union: How many and who are affected?

© The Author(s) 2018. Published by Oxford University Press on behalf of Faculty of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com. BACKGROUND: Nicotine dependence during adolescence increases the risk of continuing smoking into adulthood. The magnitude of nicotine dependence among adolescents in the European Union (EU) has ...

5G New Radio User Equipment Power Modelling and Potential Energy Savings

Currently the 3rd generation partnership project (3GPP) is studying how user equipment power saving can be achieved for the upcoming fifth generation New Radio technology. To accomplish this objective a power model has been developed for evaluation of schemes related to Radio Resource Control (RRC) Connected mode, Radio Resource Management, ...

An early characterisation of wearing variability on motion signals for wearables

We explore a new variability observed in motion signals acquired from modern wearables. Wearing variability refers to the variations of the device orientation and placement across wearing events. We collect the accelerometer data on a smartwatch and an earbud and analyse how motion signals change due to the wearing variability. ...

Unsupervised Domain Adaptation for Design of Robust Sensory Systems

Despite significant advances in the performance of sensory inference models, their poor robustness to changing environmental conditions and hardware remains a major hurdle for widespread adoption. In this paper, we introduce the concept of unsupervised domain adaptation which is a technique to adapt sensory inference models to new domains only ...

The city as a personal assistant

Publication rights licensed to ACM. Conversational agents are increasingly becoming digital partners in our everyday computational experiences. Although rich, and fresh in content, they are oblivious to users? locality beyond geospatial weather and traffic conditions. We introduce conversational agents that are hyper-local, embedded deeply into the urban infrastructure providing rich, ...

WellComP 2019: Second international workshop on computing for well-being

Publication rights licensed to ACM. With the advancements in ubiquitous computing, ubicomp technology has deeply spread into our daily lives, including office work, home and house-keeping, health management, transportation, or even urban living environments. Furthermore, beyond the initial metric of computing, such as ?efficiency? and ?productivity?, the benefits that people ...

Capturing Attentional Problems with Smart Eyewear

Emerging smart eyewear solutions offer new ways to present information. In addition, new technology provides an unobtrusive way to study human cognitive and attentional functions in real life. This combination presents a unique possibility to design more usable and intuitive interfaces and information visualizations for the users. Flexible and fluent ...

Degradable inference for energy autonomous vision applications

Publication rights licensed to ACM. Mobile vision systems, often battery-powered, are now incredibly powerful in capturing, analyzing, and understanding real-world events uncovering interminable opportunities for new applications in the areas of life-logging, cognitive augmentation, security, safety, wildlife surveillance, etc. There are two complementary challenges in the design of a mobile ...

Formation of protein networks between mucins: Molecular dynamics study based on the interaction energy of the system

Molecular dynamics simulations have been performed for a model aqueous solution of mucin. As mucin is a central part of lubricin, a key component of synovial fluid, we investigate its ability to form cross-linked networks. Such network formation could be of major importance for the viscoelastic properties of the soft-matter ...

OSAA: On-Demand Source Authentication and Authorization in the Internet

Lack of ability to control inbound traffic is one of the essential security vulnerabilities of the present Internet. It is the consequence of the fundamental fact that the Internet was built as a highly distributed public network, in which every node may freely send arbitrary traffic to any other node. ...