Skip to main content

Showing 1–11 of 11 results for author: Kindt, P H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.05988  [pdf, other

    cs.LG cs.HC

    A Comprehensive Review of Automated Data Annotation Techniques in Human Activity Recognition

    Authors: Florenc Demrozi, Cristian Turetta, Fadi Al Machot, Graziano Pravadelli, Philipp H. Kindt

    Abstract: Human Activity Recognition (HAR) has become one of the leading research topics of the last decade. As sensing technologies have matured and their economic costs have declined, a host of novel applications, e.g., in healthcare, industry, sports, and daily life activities have become popular. The design of HAR systems requires different time-consuming processing steps, such as data collection, annot… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: 37 pages, 5 figures, 20 tables

  2. arXiv:2204.01830  [pdf, other

    cs.NI eess.SP

    WiFiEye -- Seeing over WiFi Made Accessible

    Authors: Philipp H. Kindt, Cristian Turetta, Florenc Demrozi, Alejandro Masrur, Graziano Pravadelli, Samarjit Chakraborty

    Abstract: While commonly used for communication purposes, an increasing number of recent studies consider WiFi for sensing. In particular, wireless signals are altered (e.g., reflected and attenuated) by the human body and objects in the environment. This can be perceived by an observer to infer information on human activities or changes in the environment and, hence, to "see" over WiFi. Until now, works on… ▽ More

    Submitted 6 April, 2022; v1 submitted 4 April, 2022; originally announced April 2022.

  3. arXiv:2103.05026  [pdf, other

    cs.NI cs.IT

    Performance Limits of Neighbor Discovery in Wireless Networks

    Authors: Philipp H. Kindt, Samarjit Chakraborty

    Abstract: Neighbor Discovery (ND) is the process employed by two wireless devices to discover each other. There are many different ND protocols, both in the scientific literature and also those employed in practice. All ND protocols involve devices sending beacons, and also listening for them. Protocols differ in terms of how the beacon transmissions and reception windows are scheduled, and the device sleep… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1905.05220

  4. Estimating indoor occupancy through low-cost BLE devices

    Authors: Florenc Demrozi, Cristian Turetta, Fabio Chiarani, Philipp H. Kindt, Graziano Pravadelli

    Abstract: Detecting the presence of persons and estimating their quantity in an indoor environment has grown in importance recently. For example, the information if a room is unoccupied can be used for automatically switching off the light, air conditioning, and ventilation, thereby saving significant amounts of energy in public buildings. Most existing solutions rely on dedicated hardware installations, wh… ▽ More

    Submitted 17 May, 2021; v1 submitted 30 January, 2021; originally announced February 2021.

    Comments: 7 Tabels, 2 Figures, 9 Pages

  5. arXiv:2009.04199  [pdf, other

    cs.NI cs.DC

    Optimizing BLE-Like Neighbor Discovery

    Authors: Philipp H. Kindt, Swaminathan Narayanaswamy, Marco Saur, Samarjit Chakraborty

    Abstract: Neighbor discovery (ND) protocols are used for establishing a first contact between multiple wireless devices. The energy consumption and discovery latency of this procedure are determined by the parametrization of the protocol. In most existing protocols, reception and transmission are temporally coupled. Such schemes are referred to as \textit{slotted}, for which the problem of finding optimized… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

    Comments: To appear in the IEEE Transactions on Mobile Computing (TMC) 2020

  6. arXiv:2006.16960  [pdf, other

    cs.CY

    Digital Contact Tracing Service: An improved decentralized design for privacy and effectiveness

    Authors: Kilian Holzapfel, Martina Karl, Linus Lotz, Georg Carle, Christian Djeffal, Christian Fruck, Christian Haack, Dirk Heckmann, Philipp H. Kindt, Michael Köppl, Patrick Krause, Lolian Shtembari, Lorenz Marx, Stephan Meighen-Berger, Birgit Neumair, Matthias Neumair, Julia Pollmann, Tina Pollmann, Elisa Resconi, Stefan Schönert, Andrea Turcati, Christoph Wiesinger, Giovanni Zattera, Christopher Allan, Esteban Barco , et al. (12 additional authors not shown)

    Abstract: We propose a decentralized digital contact tracing service that preserves the users' privacy by design while complying to the highest security standards. Our approach is based on Bluetooth and measures actual encounters of people, the contact time period, and estimates the proximity of the contact. We trace the users' contacts and the possible spread of infectious diseases while preventing locatio… ▽ More

    Submitted 29 June, 2020; originally announced June 2020.

  7. arXiv:2006.09099  [pdf, other

    cs.NI cs.SI eess.SP

    Identifying the BLE Advertising Channel for Reliable Distance Estimation on Smartphones

    Authors: Christian Gentner, Daniel Günther, Philipp H. Kindt

    Abstract: As a response to the global COVID-19 surge in 2020, many countries have implemented lockdown or stay-at-home policies. If, however, the contact persons of every infected patient could be identified, the number of virus transmissions could be reduced, while the more incisive measures could be softened. For this purpose, contact tracing using smartphones is being considered as a promising technique.… ▽ More

    Submitted 27 July, 2020; v1 submitted 16 June, 2020; originally announced June 2020.

    ACM Class: C.2.2; C.3

  8. arXiv:2005.05625  [pdf, other

    cs.NI cs.CY eess.SP q-bio.PE

    How Reliable is Smartphone-based Electronic Contact Tracing for COVID-19?

    Authors: Philipp H. Kindt, Trinad Chakraborty, Samarjit Chakraborty

    Abstract: Smartphone-based electronic contact tracing is currently considered an essential tool towards easing lockdowns, curfews, and shelter-in-place orders issued by most governments around the world in response to the 2020 novel coronavirus (SARS-CoV-2) crisis. While the focus on develo** smartphone-based contact tracing applications or apps has been on privacy concerns stemming from the use of such a… ▽ More

    Submitted 22 May, 2020; v1 submitted 12 May, 2020; originally announced May 2020.

    Report number: Vol. 65, January 2022, pp. 56--67 ACM Class: C.2

    Journal ref: Communications of the ACM 2022

  9. On Optimal Neighbor Discovery

    Authors: Philipp H. Kindt, Samarjit Chakraborty

    Abstract: Mobile devices apply neighbor discovery (ND) protocols to wirelessly initiate a first contact within the shortest possible amount of time and with minimal energy consumption. For this purpose, over the last decade, a vast number of ND protocols have been proposed, which have progressively reduced the relation between the time within which discovery is guaranteed and the energy consumption. In spit… ▽ More

    Submitted 26 August, 2019; v1 submitted 13 May, 2019; originally announced May 2019.

    Comments: Conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM), 2019

  10. arXiv:1807.01645  [pdf, other

    cs.NI

    Fast Collision Simulation for Cyclic Wireless Protocols

    Authors: Philipp H. Kindt, Sangyoung Park, Samarjit Chakraborty

    Abstract: With most modern smartphones supporting wireless protocols such as Bluetooth Low Energy (BLE) or ANT+, the number of networks are growing rapidly. Therefore, collisions among multiple networks need to be considered for choosing the appropriate protocol parameters. With growing numbers of networks, simulations for estimating the collision rate become computationally very complex and lengthy. The la… ▽ More

    Submitted 4 July, 2018; originally announced July 2018.

  11. arXiv:1605.05614  [pdf, other

    cs.NI

    Slotless Protocols for Fast and Energy-Efficient Neighbor Discovery

    Authors: Philipp H. Kindt, Marco Saur, Samarjit Chakraborty

    Abstract: In mobile ad-hoc networks, neighbor discovery protocols are used to find surrounding devices and to establish a first contact between them. Since the clocks of the devices are not synchronized and their energy-budgets are limited, usually duty-cycled, asynchronous discovery protocols are applied. Only if two devices are awake at the same point in time, they can rendezvous. Currently, time-slotted… ▽ More

    Submitted 13 July, 2016; v1 submitted 18 May, 2016; originally announced May 2016.

    ACM Class: C.2.1